|
87 | 87 | Must be a valid HTTPS URL (or HTTP for localhost) without query, fragment, or trailing slash. |
88 | 88 | pattern: ^https?://[^\s?#]+[^/\s?#]$ |
89 | 89 | type: string |
| 90 | + disableUpstreamTokenInjection: |
| 91 | + default: false |
| 92 | + description: |- |
| 93 | + DisableUpstreamTokenInjection prevents the embedded auth server from injecting |
| 94 | + upstream IdP tokens into requests forwarded to the backend MCP server. |
| 95 | + When true, the embedded auth server still handles OAuth flows for clients |
| 96 | + but does not swap ToolHive JWTs for upstream tokens on outgoing requests. |
| 97 | + This is useful when the backend MCP server does not require authentication |
| 98 | + (e.g., public documentation servers) but you still want client authentication. |
| 99 | + type: boolean |
90 | 100 | hmacSecretRefs: |
91 | 101 | description: |- |
92 | 102 | HMACSecretRefs references Kubernetes Secrets containing symmetric secrets for signing |
@@ -2723,6 +2733,16 @@ spec: |
2723 | 2733 | Must be a valid HTTPS URL (or HTTP for localhost) without query, fragment, or trailing slash. |
2724 | 2734 | pattern: ^https?://[^\s?#]+[^/\s?#]$ |
2725 | 2735 | type: string |
| 2736 | + disableUpstreamTokenInjection: |
| 2737 | + default: false |
| 2738 | + description: |- |
| 2739 | + DisableUpstreamTokenInjection prevents the embedded auth server from injecting |
| 2740 | + upstream IdP tokens into requests forwarded to the backend MCP server. |
| 2741 | + When true, the embedded auth server still handles OAuth flows for clients |
| 2742 | + but does not swap ToolHive JWTs for upstream tokens on outgoing requests. |
| 2743 | + This is useful when the backend MCP server does not require authentication |
| 2744 | + (e.g., public documentation servers) but you still want client authentication. |
| 2745 | + type: boolean |
2726 | 2746 | hmacSecretRefs: |
2727 | 2747 | description: |- |
2728 | 2748 | HMACSecretRefs references Kubernetes Secrets containing symmetric secrets for signing |
|
0 commit comments