Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: Add support for capturing OIDC refresh tokens #7220

Merged
merged 10 commits into from
Jun 15, 2022
Merged

feat: Add support for capturing OIDC refresh tokens #7220

merged 10 commits into from
Jun 15, 2022

Conversation

NMichas
Copy link
Contributor

@NMichas NMichas commented Jun 9, 2022

Add support for capturing OIDC refresh tokens in RP scenario. This is an important feature for people implementing BFF designs, especially considering refreshing the access token using previous techniques (such as hidden iframe) will, soon, not be available (Safari already blocks it).

This addition has been discussed in Slack and was implemented according to Zexuan Luo's recommendations:
https://the-asf.slack.com/archives/CUC5MN17A/p1654178597713989

The relevant English documentation is also updated.

Copy link
Member

@spacewander spacewander left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Let's update the test in

=== TEST 7: Access route w/o bearer token and go through the full OIDC Relying Party authentication process.
and fix the linters.

@spacewander
Copy link
Member

@spacewander
Copy link
Member

Please update the test to make CI pass

@spacewander
Copy link
Member

# x-real-ip: 127.0.0.1
# x-refresh-token: ***
# x-userinfo: eyJzdWIiOiJjMTU0YWVjMS01ZmJjLTQyNjktOTZkYS1iMDE4MTNmMWYyYzEiLCJwcmVmZXJyZWRfdXNlcm5hbWUiOiJ0ZWFjaGVyQGdtYWlsLmNvbSIsImVtYWlsX3ZlcmlmaWVkIjpmYWxzZX0=
# 
# '
#     doesn't match '(?^s:uri: /uri
# cookie: .*
# host: 127.0.0.1:1984
# user-agent: .*
# x-access-token: ey.*
# x-id-token: ey.*
# x-real-ip: 127.0.0.1
# x-userinfo: ey.*
# x-refresh-token: ey.*
# )'

You need to update the order of the expected headers (they should be in alphabetic order)

@spacewander spacewander merged commit 845c3c9 into apache:master Jun 15, 2022
hongbinhsu pushed a commit to fitphp/apix that referenced this pull request Jun 16, 2022
* upstream/master: (46 commits)
  docs: fix err in batch-processor (apache#7259)
  docs(deployment): sync design to online docs (apache#7256)
  feat(deployment): add structure of traditional role (apache#7249)
  fix(benchmark): write worker_processes into config.yaml (apache#7250)
  docs: correct the repo url (apache#7253)
  feat: Add support for capturing OIDC refresh tokens (apache#7220)
  feat(ssl): support get upstream cert from ssl object (apache#7221)
  chore: validate etcd conf strictly (apache#7245)
  fix(api-response): check response header format (apache#7238)
  fix: duplicate X-Forwarded-Proto will be sent as string (apache#7229)
  fix: distinguish different upstreams even they have the same addr (apache#7213)
  docs: make company on README more preciser (apache#7230)
  test: remove unused required etcd (apache#7225)
  fix: add debug yaml validation (apache#7201)
  change: remove upstream.enable_websocket which is deprecated since 2020 (apache#7222)
  docs: add re case on response-rewrite plugin (apache#7197)
  docs: add API Gateway keyword and AWS graviton3. (apache#7217)
  fix(response-rewrite): schema format error (apache#7212)
  docs(proxy-rewrite): remove empty space (apache#7210)
  chore: require http_stub_status_module exists (apache#7208)
  ...
Liu-Junlin pushed a commit to Liu-Junlin/apisix that referenced this pull request Nov 4, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants