Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Remove and/or Whitelist Security For Merged APIs #70

Open
tmack8001 opened this issue Feb 28, 2019 · 2 comments
Open

Remove and/or Whitelist Security For Merged APIs #70

tmack8001 opened this issue Feb 28, 2019 · 2 comments

Comments

@tmack8001
Copy link
Contributor

It would be helpful to be able to throw away security definitions in each individual source and add new ones for all APIs (whitelist likely, similar to paths.include model). This way if you have a microservice architecture with a common gateway where authN is implemented within that Gateway the merged swagger file which is the union of everything exposed by the Gateway could own the security definitions of all the routes exposed. This would be opposed to exposing or keeping the security definitions which would typically define the protocol between "serviceA", "serviceB" and the "gateway".

@tmack8001
Copy link
Contributor Author

Looking at an approach for this. Have something that is quite dirty in approach right now. Want to clean it up a bit will post some details on how I'm envisioning the json to look trying to keep consistency with other features where it makes sense.

@maximeblaisjive
Copy link

maximeblaisjive commented Nov 5, 2019

I was looking at this also, we can rename a security def, but I would be interested in removing it all-together from the spec

i.e:
"apis": [ { "url": "http://localhost:8080/calls/v2/specs.yaml", "securityDefinitions": { "delete": { "oauth2" } },

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants