bitter-farmer-82819
04/07/2025, 8:17 AMsteep-lamp-91158
bitter-farmer-82819
04/07/2025, 8:38 AM'application/grpc+proto'
, then you could extract the authentication metadata from the gRPC headers (token for example) and proxy it upstream.
Ideally, you would perform this protocol detection at the very beginning of the request handling, then map everything in such a way that the rest of the business logic stays the same. After hitting the auth server or decision point (the authenticator/authorizer in Oathkeeper terms), you would remap HTTP headers to gRPC metadata for the upstream request, and handle the response body appropriately.
I think this is similar to what the ext_auth does in Envoy, which I have been using INSTEAD of oathkeeper, and it seems to work okay.
What do you think?bitter-farmer-82819
04/07/2025, 9:10 AMsteep-lamp-91158
bitter-farmer-82819
04/08/2025, 2:37 AMsteep-lamp-91158
bitter-farmer-82819
04/08/2025, 6:56 PMbitter-farmer-82819
04/09/2025, 1:53 AMbitter-farmer-82819
05/07/2025, 6:56 PMsteep-lamp-91158
bitter-farmer-82819
05/12/2025, 3:15 AM