This repository was archived by the owner on Aug 7, 2023. It is now read-only.
File tree Expand file tree Collapse file tree 2 files changed +8
-2
lines changed Expand file tree Collapse file tree 2 files changed +8
-2
lines changed Original file line number Diff line number Diff line change @@ -41,7 +41,7 @@ security:
4141 # ...
4242```
4343
44- Configure your ` config/packages/security.yaml ` :
44+ Then, configure your ` config/packages/security.yaml ` :
4545
4646``` yaml
4747security :
@@ -82,6 +82,8 @@ In case your application have multi issuers:
8282Generate mock JWT token forwarded by Istio sidecar:
8383
8484``` shell
85+ #! /bin/bash
86+
8587payload=' {"issuer":"issuer_1", "sub": "test"}' ; \
8688base64_payload=$( echo -n $payload | base64 -) ; \
8789origin_token=$( echo " header.$base64_payload .signature" )
@@ -90,12 +92,16 @@ origin_token=$(echo "header.$base64_payload.signature")
9092You can test authenticate origin token with curl:
9193
9294``` shell
95+ #! /bin/bash
96+
9397curl -H " Authorization: $origin_token " http://localhost/
9498```
9599
96100Or authenticate base64 payload header:
97101
98102``` shell
103+ #! /bin/bash
104+
99105curl -H " X-Istio-JWT-Payload: $base64_header " http://localhost/
100106```
101107
Original file line number Diff line number Diff line change @@ -29,7 +29,7 @@ final class UserProvider implements JWTPayloadAwareUserProviderInterface {
2929
3030 //....
3131 public function loadUserByIdentifier(string $identifier, array $payload = null) {
32- // use $identifier and $payload to create `UserInterface` instance .
32+ // use $identifier and $payload to create instance of `UserInterface`.
3333 }
3434
3535}
You can’t perform that action at this time.
0 commit comments