Skip to content
This repository was archived by the owner on Aug 7, 2023. It is now read-only.

Commit 2d8f01d

Browse files
Update doc [skip ci].
1 parent 2cb9771 commit 2d8f01d

File tree

2 files changed

+8
-2
lines changed

2 files changed

+8
-2
lines changed

README.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ security:
4141
# ...
4242
```
4343

44-
Configure your `config/packages/security.yaml`:
44+
Then, configure your `config/packages/security.yaml`:
4545

4646
```yaml
4747
security:
@@ -82,6 +82,8 @@ In case your application have multi issuers:
8282
Generate mock JWT token forwarded by Istio sidecar:
8383

8484
```shell
85+
#!/bin/bash
86+
8587
payload='{"issuer":"issuer_1", "sub": "test"}'; \
8688
base64_payload=$(echo -n $payload | base64 -); \
8789
origin_token=$(echo "header.$base64_payload.signature")
@@ -90,12 +92,16 @@ origin_token=$(echo "header.$base64_payload.signature")
9092
You can test authenticate origin token with curl:
9193

9294
```shell
95+
#!/bin/bash
96+
9397
curl -H "Authorization: $origin_token" http://localhost/
9498
```
9599

96100
Or authenticate base64 payload header:
97101

98102
```shell
103+
#!/bin/bash
104+
99105
curl -H "X-Istio-JWT-Payload: $base64_header" http://localhost/
100106
```
101107

src/Resources/doc/create-custom-user-provider.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ final class UserProvider implements JWTPayloadAwareUserProviderInterface {
2929

3030
//....
3131
public function loadUserByIdentifier(string $identifier, array $payload = null) {
32-
// use $identifier and $payload to create `UserInterface` instance.
32+
// use $identifier and $payload to create instance of `UserInterface`.
3333
}
3434

3535
}

0 commit comments

Comments
 (0)