diff --git a/website/content/docs/connect/config-entries/jwt-provider.mdx b/website/content/docs/connect/config-entries/jwt-provider.mdx index 5fc75da4d300..b31427af4fff 100644 --- a/website/content/docs/connect/config-entries/jwt-provider.mdx +++ b/website/content/docs/connect/config-entries/jwt-provider.mdx @@ -108,53 +108,53 @@ Kind = "jwt-provider" # required Name = "" # required Issuer = "" # required JSONWebKeySet = { # required - Local = { # cannot specify with JWKS{}.Remote - JWKS = "" # cannot specify with JWKS{}.Local{}.Filename - Filename = "" # cannot specify with JWKS{}.Local{}.String - } + Local = { # cannot specify with JWKS{}.Remote + JWKS = "" # cannot specify with JWKS{}.Local{}.Filename + Filename = "" # cannot specify with JWKS{}.Local{}.String + } } JSONWebKeySet = { - Remote = { # cannot specify with JWKS{}.Local - URI = "" - RequestTimeoutMs = 1500 - CacheDuration = "5m" - FetchAsynchronously = false - RetryPolicy = { - NumRetries = 0 - RetryPolicyBackoff = { - BaseInterval = "1s" - MaxInterval = "10s" + Remote = { # cannot specify with JWKS{}.Local + URI = "" + RequestTimeoutMs = 1500 + CacheDuration = "5m" + FetchAsynchronously = false + RetryPolicy = { + NumRetries = 0 + RetryPolicyBackoff = { + BaseInterval = "1s" + MaxInterval = "10s" + } + } + } } - } - } -} Audiences = [""] Locations = [ - { - Header = { - Name = "" - ValuePrefix = "" - Forward = false - } - }, - { - QueryParam = { - Name = "" - } - }, - { - Cookie = { - Name = "" + { + Header = { + Name = "" + ValuePrefix = "" + Forward = false + } + }, + { + QueryParam = { + Name = "" + } + }, + { + Cookie = { + Name = "" + } } - } ] Forwarding = { - HeaderName = "" - PadForwardPayloadHeader = false + HeaderName = "" + PadForwardPayloadHeader = false } ClockSkewSeconds = 30 CacheConfig = { - Size = 0 + Size = 0 } ``` @@ -164,58 +164,58 @@ CacheConfig = { ```json { - "Kind": "jwt-provider", // required - "Name": "", // required - "Issuer": "", // required - "JSONWebKeySet": { // required - "Local": { // cannot specify with JWKS.Remote - "JWKS": "", // cannot specify with JWKS.Local.Filename - "Filename": "" // cannot specify with JWKS.Local.String +"Kind": "jwt-provider", // required +"Name": "", // required +"Issuer": "", // required +"JSONWebKeySet": { // required + "Local": { // cannot specify with JWKS.Remote + "JWKS": "", // cannot specify with JWKS.Local.Filename + "Filename": "" // cannot specify with JWKS.Local.String } - }, - "JSONWebKeySet": { - "Remote": { // cannot specify with JWKS.Local - "URI": "", - "RequestTimeoutMs": "1500", - "CacheDuration": "5m", - "FetchAsynchronously": "false", - "RetryPolicy": { - "NumRetries": "0", - "RetryPolicyBackOff": { - "BaseInterval": "1s", - "MaxInterval": "10s" +}, +"JSONWebKeySet": { + "Remote": { // cannot specify with JWKS.Local + "URI": "", + "RequestTimeoutMs": "1500", + "CacheDuration": "5m", + "FetchAsynchronously": "false", + "RetryPolicy": { + "NumRetries": "0", + "RetryPolicyBackOff": { + "BaseInterval": "1s", + "MaxInterval": "10s" + } + } } - } - } - }, - "Audiences": [""], - "Locations": [ +}, +"Audiences": [""], +"Locations": [ { - "Header": { - "Name": "", - "ValuePrefix": "", - "Forward": "false" - } + "Header": { + "Name": "", + "ValuePrefix": "", + "Forward": "false" + } }, { - "QueryParam": { - "Name":"", - } + "QueryParam": { + "Name":"", + } }, { - "Cookie": { - "Name": "" - } + "Cookie": { + "Name": "" + } } - ], - "Forwarding": { - "HeaderName": "", - "PadForwardPayloadHeader": "false" - }, - "ClockSkewSeconds": "30", - "CacheConfig": { +], +"Forwarding": { + "HeaderName": "", + "PadForwardPayloadHeader": "false" +}, +"ClockSkewSeconds": "30", +"CacheConfig": { "Size": "0" - } +} } ``` @@ -1014,7 +1014,7 @@ metadata: name: okta spec: issuer: okta - jsonWebKeySet: + jsonwebkeyset: remote: uri: https://.okta.com/oauth2/default/v1/keys cacheDuration: 30m diff --git a/website/content/docs/connect/config-entries/service-intentions.mdx b/website/content/docs/connect/config-entries/service-intentions.mdx index f8afda6e41da..180e3aaabd96 100644 --- a/website/content/docs/connect/config-entries/service-intentions.mdx +++ b/website/content/docs/connect/config-entries/service-intentions.mdx @@ -1506,64 +1506,64 @@ Sources = [ ``` ```yaml -apiVersion: consul.hashicorp.com/v1alpha1 -kind: ServiceIntentions -metadata: - name: backend -spec: - sources: - name: frontend - permissions: + apiVersion: consul.hashicorp.com/v1alpha1 + kind: ServiceIntentions + metadata: + name: backend + spec: + sources: + name: frontend + permissions: + http: + pathExact: /admin + jwt: + providers: + name: okta + verifyClaims: + path: + - perms + - role + value: admin + action: allow http: - pathExact: /admin - jwt: - providers: - name: okta - verifyClaims: - path: - - perms - - role - value: admin - action: allow - http: - pathPrefix: / + pathPrefix: / ``` ```json { - "Kind": "service-intentions", - "Name": "backend", - "Sources": [ - { - "Name": "frontend", - "Permissions": [ - { - "HTTP": { - "PathExact": "/admin" - }, - "JWT": { - "Providers": [ - { - "Name": "okta", - "VerifyClaims": [ - { - "Path": ["perms", "role"], - "Value": "admin" - } - ] - } - ] - } +"Kind": "service-intentions", +"Name": "backend", +"Sources": [ + { + "Name": "frontend", + "Permissions": [ + { + "HTTP": { + "PathExact": "/admin" }, - { - "Action": "allow", - "HTTP": { - "PathPrefix": "/" - } + "JWT": { + "Providers": [ + { + "Name": "okta", + "VerifyClaims": [ + { + "Path": ["perms", "role"], + "Value": "admin" + } + ] + } + ] } - ] - } - ] + }, + { + "Action": "allow", + "HTTP": { + "PathPrefix": "/" + } + } + ] + } +] } ``` diff --git a/website/content/docs/connect/intentions/jwt-authorization.mdx b/website/content/docs/connect/intentions/jwt-authorization.mdx index a58bd3af3e19..9a8458054ea2 100644 --- a/website/content/docs/connect/intentions/jwt-authorization.mdx +++ b/website/content/docs/connect/intentions/jwt-authorization.mdx @@ -98,4 +98,4 @@ After you update the service intention, write the configuration to Consul so tha ```shell-session $ consul config write web-intention.hcl -``` \ No newline at end of file +```