Skip to content

Commit 6f6f405

Browse files
committed
chore: update crds
1 parent 559b2a3 commit 6f6f405

3 files changed

Lines changed: 40 additions & 0 deletions

File tree

deploy/charts/operator-crds/files/crds/toolhive.stacklok.dev_mcpexternalauthconfigs.yaml

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -214,6 +214,16 @@ spec:
214214
Must be a valid HTTPS URL (or HTTP for localhost) without query, fragment, or trailing slash.
215215
pattern: ^https?://[^\s?#]+[^/\s?#]$
216216
type: string
217+
disableUpstreamTokenInjection:
218+
default: false
219+
description: |-
220+
DisableUpstreamTokenInjection prevents the embedded auth server from injecting
221+
upstream IdP tokens into requests forwarded to the backend MCP server.
222+
When true, the embedded auth server still handles OAuth flows for clients
223+
but does not swap ToolHive JWTs for upstream tokens on outgoing requests.
224+
This is useful when the backend MCP server does not require authentication
225+
(e.g., public documentation servers) but you still want client authentication.
226+
type: boolean
217227
hmacSecretRefs:
218228
description: |-
219229
HMACSecretRefs references Kubernetes Secrets containing symmetric secrets for signing

deploy/charts/operator-crds/files/crds/toolhive.stacklok.dev_virtualmcpservers.yaml

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -87,6 +87,16 @@ spec:
8787
Must be a valid HTTPS URL (or HTTP for localhost) without query, fragment, or trailing slash.
8888
pattern: ^https?://[^\s?#]+[^/\s?#]$
8989
type: string
90+
disableUpstreamTokenInjection:
91+
default: false
92+
description: |-
93+
DisableUpstreamTokenInjection prevents the embedded auth server from injecting
94+
upstream IdP tokens into requests forwarded to the backend MCP server.
95+
When true, the embedded auth server still handles OAuth flows for clients
96+
but does not swap ToolHive JWTs for upstream tokens on outgoing requests.
97+
This is useful when the backend MCP server does not require authentication
98+
(e.g., public documentation servers) but you still want client authentication.
99+
type: boolean
90100
hmacSecretRefs:
91101
description: |-
92102
HMACSecretRefs references Kubernetes Secrets containing symmetric secrets for signing
@@ -2723,6 +2733,16 @@ spec:
27232733
Must be a valid HTTPS URL (or HTTP for localhost) without query, fragment, or trailing slash.
27242734
pattern: ^https?://[^\s?#]+[^/\s?#]$
27252735
type: string
2736+
disableUpstreamTokenInjection:
2737+
default: false
2738+
description: |-
2739+
DisableUpstreamTokenInjection prevents the embedded auth server from injecting
2740+
upstream IdP tokens into requests forwarded to the backend MCP server.
2741+
When true, the embedded auth server still handles OAuth flows for clients
2742+
but does not swap ToolHive JWTs for upstream tokens on outgoing requests.
2743+
This is useful when the backend MCP server does not require authentication
2744+
(e.g., public documentation servers) but you still want client authentication.
2745+
type: boolean
27262746
hmacSecretRefs:
27272747
description: |-
27282748
HMACSecretRefs references Kubernetes Secrets containing symmetric secrets for signing

deploy/charts/operator-crds/templates/toolhive.stacklok.dev_virtualmcpservers.yaml

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -90,6 +90,16 @@ spec:
9090
Must be a valid HTTPS URL (or HTTP for localhost) without query, fragment, or trailing slash.
9191
pattern: ^https?://[^\s?#]+[^/\s?#]$
9292
type: string
93+
disableUpstreamTokenInjection:
94+
default: false
95+
description: |-
96+
DisableUpstreamTokenInjection prevents the embedded auth server from injecting
97+
upstream IdP tokens into requests forwarded to the backend MCP server.
98+
When true, the embedded auth server still handles OAuth flows for clients
99+
but does not swap ToolHive JWTs for upstream tokens on outgoing requests.
100+
This is useful when the backend MCP server does not require authentication
101+
(e.g., public documentation servers) but you still want client authentication.
102+
type: boolean
93103
hmacSecretRefs:
94104
description: |-
95105
HMACSecretRefs references Kubernetes Secrets containing symmetric secrets for signing

0 commit comments

Comments
 (0)