-
Notifications
You must be signed in to change notification settings - Fork 11
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow for different sources of KeyPair #21
Comments
massenz
added a commit
that referenced
this issue
Oct 29, 2022
This also somewhat reworks the configuration and logic so as to simplify adding more sources for secrets (e.g., Vault, Azure, etc.).
massenz
added a commit
that referenced
this issue
Oct 29, 2022
Moved KeypairReader Bean creation outside of jwt-opa Library configuration should not get involved in deciding how and where the keys are loaded. Also removed the key properties from the token properties. so as to simplify adding more sources for secrets (e.g., Vault, Azure, etc.). Added fake AWS creds to Test GH Action
Completed with PR #42 |
massenz
added a commit
that referenced
this issue
Oct 29, 2022
Moved KeypairReader Bean creation outside of jwt-opa Library configuration should not get involved in deciding how and where the keys are loaded. Also removed the key properties from the token properties. so as to simplify adding more sources for secrets (e.g., Vault, Azure, etc.). Added fake AWS creds to Test GH Action
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Currently
KeyMaterialConfiguration
assumes thatkeypair
property must be non-null and it has two attributes (priv
andpub
) which point to respective key material files.We should allow for different configurations (e.g., a
secret-name
from AWS Secrets Manager, or Hashicorp Vault) to be used to specify how to retrieve the key material.The text was updated successfully, but these errors were encountered: