Skip to content

feat: add HEADER_MAPPING_BASE flag to control JWT claims source for HEADER_MAPPING#144

Merged
hrntknr merged 2 commits intomainfrom
fix/header-mapping-fallback-to-top-level-claims
Apr 16, 2026
Merged

feat: add HEADER_MAPPING_BASE flag to control JWT claims source for HEADER_MAPPING#144
hrntknr merged 2 commits intomainfrom
fix/header-mapping-fallback-to-top-level-claims

Conversation

@hrntknr
Copy link
Copy Markdown
Member

@hrntknr hrntknr commented Apr 16, 2026

Summary

  • Add --header-mapping-base / HEADER_MAPPING_BASE flag (default: /userinfo) to explicitly control which JWT claims subtree HEADER_MAPPING reads from.
  • Set to / to read from top-level JWT claims, which fixes header mapping for OIDC providers (e.g. Azure AD) that do not include a userinfo claim in the JWT.
  • No implicit fallback — the base path is explicit and configurable.
  • Added tests covering base /, /userinfo, and missing base scenarios.
  • Added documentation for both --header-mapping and --header-mapping-base in the configuration reference.

Type of Change

  • feat: A new feature

Related Issues

Closes #143

@codecov
Copy link
Copy Markdown

codecov Bot commented Apr 16, 2026

Codecov Report

✅ All modified and coverable lines are covered by tests.

📢 Thoughts on this report? Let us know!

Instead of implicit fallback from userinfo to top-level claims,
add an explicit --header-mapping-base / HEADER_MAPPING_BASE flag
(default: /userinfo) that controls which JWT claims subtree
HEADER_MAPPING reads from. Set to / for top-level claims.

Closes #143
@hrntknr hrntknr changed the title fix: fall back to top-level JWT claims for HEADER_MAPPING feat: add HEADER_MAPPING_BASE flag to control JWT claims source for HEADER_MAPPING Apr 16, 2026
@hrntknr hrntknr merged commit a43f4f4 into main Apr 16, 2026
10 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

HEADER_MAPPING fails when userinfo claim is missing from JWT

1 participant