This is an automated email from the ASF dual-hosted git repository.
shreemaanabhishek pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/apisix.git
The following commit(s) were added to refs/heads/master by this push:
new 680e4afd2 chore(oidc): mention use_jwks in schema (#12964)
680e4afd2 is described below
commit 680e4afd273479cd64ddd75aba4fd576a5d09277
Author: Shreemaan Abhishek <[email protected]>
AuthorDate: Thu Feb 5 15:11:31 2026 +0545
chore(oidc): mention use_jwks in schema (#12964)
---
apisix/plugins/openid-connect.lua | 7 +++++++
t/plugin/openid-connect.t | 2 +-
2 files changed, 8 insertions(+), 1 deletion(-)
diff --git a/apisix/plugins/openid-connect.lua
b/apisix/plugins/openid-connect.lua
index 5744ec7a3..012dd02fe 100644
--- a/apisix/plugins/openid-connect.lua
+++ b/apisix/plugins/openid-connect.lua
@@ -155,6 +155,13 @@ local schema = {
"pass to allow the request regardless."
},
public_key = {type = "string"},
+ use_jwks = {
+ type = "boolean",
+ default = false,
+ description = "If true and if `public_key` is not set, use the
JWKS to verify JWT " ..
+ "signature and skip token introspection in client credentials
flow. The JWKS " ..
+ "endpoint is parsed from the discovery document."
+ },
token_signing_alg_values_expected = {type = "string"},
use_pkce = {
description = "when set to true the PKCE(Proof Key for Code
Exchange) will be used.",
diff --git a/t/plugin/openid-connect.t b/t/plugin/openid-connect.t
index 3843d71de..971b15823 100644
--- a/t/plugin/openid-connect.t
+++ b/t/plugin/openid-connect.t
@@ -937,7 +937,7 @@ OIDC introspection failed: invalid token
}
}
--- response_body
-{"accept_none_alg":false,"accept_unsupported_alg":true,"access_token_expires_leeway":0,"access_token_in_authorization_header":false,"bearer_only":false,"client_id":"kbyuFDidLLm280LIwVFiazOqjO3ty8KH","client_jwt_assertion_expires_in":60,"client_secret":"60Op4HFM0I8ajz0WdiStAbziZ-VFQttXuxixHHs2R7r7-CW8GR79l-mmLqMhc-Sa","discovery":"http://127.0.0.1:1980/.well-known/openid-configuration","force_reauthorize":false,"iat_slack":120,"introspection_endpoint_auth_method":"client_secret_basic","in
[...]
+{"accept_none_alg":false,"accept_unsupported_alg":true,"access_token_expires_leeway":0,"access_token_in_authorization_header":false,"bearer_only":false,"client_id":"kbyuFDidLLm280LIwVFiazOqjO3ty8KH","client_jwt_assertion_expires_in":60,"client_secret":"60Op4HFM0I8ajz0WdiStAbziZ-VFQttXuxixHHs2R7r7-CW8GR79l-mmLqMhc-Sa","discovery":"http://127.0.0.1:1980/.well-known/openid-configuration","force_reauthorize":false,"iat_slack":120,"introspection_endpoint_auth_method":"client_secret_basic","in
[...]