chore(kong): enable jwks/oidc plugin #545
Labels
No labels
1week
2weeks
Failed compliance check
IP cameras
NATS
Possible security concern
Review effort 1/5
Review effort 2/5
Review effort 3/5
Review effort 4/5
Review effort 5/5
UI
aardvark
accessibility
amd64
api
arm64
auth
back-end
bgp
blog
bug
build
checkers
ci-cd
cleanup
cnpg
codex
core
dependencies
device-management
documentation
duplicate
dusk
ebpf
enhancement
eta 1d
eta 1hr
eta 3d
eta 3hr
feature
fieldsurvey
github_actions
go
good first issue
help wanted
invalid
javascript
k8s
log-collector
mapper
mtr
needs-triage
netflow
network-sweep
observability
oracle
otel
plug-in
proton
python
question
reddit
redhat
research
rperf
rperf-checker
rust
sdk
security
serviceradar-agent
serviceradar-agent-gateway
serviceradar-web
serviceradar-web-ng
siem
snmp
sysmon
topology
ubiquiti
wasm
wontfix
zen-engine
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
carverauto/serviceradar#545
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Imported from GitHub.
Original GitHub issue: #1716
Original author: @mfreeman451
Original URL: https://github.com/carverauto/serviceradar/issues/1716
Original created: 2025-10-06T00:32:00Z
Title: Investigate using Kong’s OIDC/JWKS plugin for automatic key refresh
Summary
Core rotates its RS256 signing key on restart (when the key file is missing), but Kong only fetches
/auth/jwks.jsonduring pod init. Whenever Core comes up with a newkid, Kong keeps the old key and every JWT validation fails (401 “No credentials found for given ‘kid’”) until Kong is recycled. We recently hit this indemoafter restarting Core.Current Behavior
/auth/jwks.json.kong.ymlwith the public key and never reloads it.Why This Matters
--forceflag so Core retains its key on restart, but pod rescheduling or PVC recreation would still rotate the key and break auth.Proposal
Evaluate switching to a Kong plugin that supports JWKS refresh (e.g.
kong-oidc) or otherwise teaching the existing setup to re-pull JWKS on a timer. Key questions:Acceptance Criteria
kids without requiring a manual restart.demothat a forced Core key rotation doesn’t break auth.we would also need to roll back this https://github.com/carverauto/serviceradar/pull/1715
Imported GitHub comment.
Original author: @mfreeman451
Original URL: https://github.com/carverauto/serviceradar/issues/1716#issuecomment-3814009175
Original created: 2026-01-28T21:24:20Z
closing, stale