delightful-yak-60786
02/15/2024, 9:45 PMRequested url does not match any rules
error keeps showing up when i try to hit <http://locahost:4455/welcome>
witty-holiday-65473
02/16/2024, 8:57 AMaccess-rules.yml
that you have set up with your oathkeeper instance?delightful-yak-60786
02/16/2024, 9:27 AMwitty-holiday-65473
02/16/2024, 9:29 AM<http://locahost:4455/welcome>
?witty-holiday-65473
02/16/2024, 9:30 AMmatch:
url: "<http://127.0.0.1:4455/.ory/kratos/public/><**>"
127.0.0.1
!= localhost
. (it is logically but it is not strictly comparatively speaking - which is what matters because that's how oathkeeper does its comparison - no assumptions)delightful-yak-60786
02/16/2024, 9:33 AMwitty-holiday-65473
02/16/2024, 9:33 AMwitty-holiday-65473
02/16/2024, 9:33 AMwitty-holiday-65473
02/16/2024, 9:33 AMlocalhost
and use the ip.witty-holiday-65473
02/16/2024, 9:34 AM127.0.0.1
and putting the cart in front of the horse won't help much.delightful-yak-60786
02/16/2024, 9:36 AMlocalhost
but if was working for 127.0.0.1
delightful-yak-60786
02/16/2024, 9:37 AMwitty-holiday-65473
02/16/2024, 9:38 AMdelightful-yak-60786
02/16/2024, 9:39 AMdelightful-yak-60786
02/16/2024, 9:40 AMwitty-holiday-65473
02/16/2024, 9:47 AMmatch
. My branch solves this. (tldr; updates the regex engine parser to support multi-byte delimiters) - Note, the regexp engine oathkeeper uses (dlclark/regexp2) already supports lookbehinds/named captures etc. The only thing preventing their use in oathkeeper is their unfortunate collision with the '' and '' characters as those are required to start look-behinds or named captures within a regular expression.
2. added RegexpNamedCaptureGroups
to the MatchContext
3. added rule_id
to the .MatchContext.Extra
as a string entry to the Extra
field
4. fixed RegexpCaptureGroups
to not include named captures (annoying when you expect the capture groups to simply be numbered and not include ones you've named)
5. feature: HMAC and JWKS payload signing on remote
and remote_json
authorizers. This is a big one for me. I have a use case where i have to hit some old legacy system that is open to the whole freaking world (nice design guys). So when I send "auth" requests, i need a way for the boneheads to be able to verify / validate the request, indeed, came from "me" (as othkeeper). So i added the ability for oathkeeper to "sign" the payload using configured jwks keys or just a simple HMAC shared key if desired. The endpoint can verify the jwks key by checking the .well-known/jwks.json
of a pre-populated issuer
url (my oathkeeper public issuer) (and oathkeeper populates a ...-Kid
header for them to know which kid
signed the payload.