Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: Adding handling for multiple identitySource headers in the REST API. #1675

Merged

Conversation

kevinhankens
Copy link
Contributor

@kevinhankens kevinhankens commented Mar 23, 2023

Description

From #1674

According to the REST API docs:

In this case, your identitySource could contain multiple entries for your policy cache.

Currently on startup createAuthScheme() only allows for one header when validating the identitySource entry.

Motivation and Context

This is preventing us from running serverless offline with our production configuration of using multiple headers to cache auth.

How Has This Been Tested?

Tested locally and added integration tests.

Screenshots (if appropriate):

@dev-z
Copy link

dev-z commented Jul 26, 2023

Tested these changes locally as well and it works well, accepting multiple values in identitySource as a comma-separated string as specified in serverless framework docs here

@dev-z
Copy link

dev-z commented Jul 26, 2023

@dherault Can you please have a look?

@leanderpeter
Copy link

👍

@dnalborczyk
Copy link
Collaborator

close/re-open in order to run ci.

@dnalborczyk dnalborczyk reopened this Sep 24, 2023
@dnalborczyk dnalborczyk changed the title Adding handling for multiple identitySource headers in the REST API. feat: Adding handling for multiple identitySource headers in the REST API. Sep 24, 2023
@dnalborczyk dnalborczyk merged commit 6fceed3 into dherault:master Sep 25, 2023
0 of 6 checks passed
@dnalborczyk
Copy link
Collaborator

thank you @kevinhankens !

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

4 participants