Skip to content
This repository has been archived by the owner on Dec 7, 2020. It is now read-only.

Adding Custom Header from claims #532

Merged
merged 4 commits into from
Jun 18, 2020
Merged

Adding Custom Header from claims #532

merged 4 commits into from
Jun 18, 2020

Conversation

allupaku
Copy link
Contributor

In order to add complete custom header parameter to upstream from claims. Currently claims header parameter is prefixied with "X-Auth", which may not be suitable in many cases. Also asked a question in issues: #531

middleware.go Outdated Show resolved Hide resolved
@jangaraj
Copy link
Contributor

Questions:

  • is the pipe | safe divider? Can be pipe used in the claim name?
  • doc/examples should be updated as well
  • how it will affect other default X-Auth- request headers? for example:
add-claims:
- given_name|X-Auth-Email

What will be in the X-Auth-Email header in this case: email or give_name or duplicated headers with the same name and different values?

@allupaku
Copy link
Contributor Author

allupaku commented Apr 17, 2020

pipe seem to be safe divider so far from my research, claims are usually scoped with : or - , not with pipe.

I have updated the docs and made a pull request in doc repository : keycloak/keycloak-documentation#918

Currently as it is using map , it will be over written by which ever is defined later part.

@mriedmann
Copy link

also relates to this issue: https://issues.redhat.com/projects/KEYCLOAK/issues/KEYCLOAK-12343 ... would really appreciate seeing this merged.

Copy link
Contributor

@jangaraj jangaraj left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@allupaku
Copy link
Contributor Author

Any updates on this ?

@abstractj abstractj merged commit 4c3331a into louketo:master Jun 18, 2020
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants