Skip to content

Commit 3b7c6e1

Browse files
committed
chore: update crds
1 parent e94e246 commit 3b7c6e1

File tree

2 files changed

+20
-0
lines changed

2 files changed

+20
-0
lines changed

deploy/charts/operator-crds/files/crds/toolhive.stacklok.dev_virtualmcpservers.yaml

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -86,6 +86,16 @@ spec:
8686
Must be a valid HTTPS URL (or HTTP for localhost) without query, fragment, or trailing slash.
8787
pattern: ^https?://[^\s?#]+[^/\s?#]$
8888
type: string
89+
disableUpstreamTokenInjection:
90+
default: false
91+
description: |-
92+
DisableUpstreamTokenInjection prevents the embedded auth server from injecting
93+
upstream IdP tokens into requests forwarded to the backend MCP server.
94+
When true, the embedded auth server still handles OAuth flows for clients
95+
but does not swap ToolHive JWTs for upstream tokens on outgoing requests.
96+
This is useful when the backend MCP server does not require authentication
97+
(e.g., public documentation servers) but you still want client authentication.
98+
type: boolean
8999
hmacSecretRefs:
90100
description: |-
91101
HMACSecretRefs references Kubernetes Secrets containing symmetric secrets for signing

deploy/charts/operator-crds/templates/toolhive.stacklok.dev_virtualmcpservers.yaml

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -89,6 +89,16 @@ spec:
8989
Must be a valid HTTPS URL (or HTTP for localhost) without query, fragment, or trailing slash.
9090
pattern: ^https?://[^\s?#]+[^/\s?#]$
9191
type: string
92+
disableUpstreamTokenInjection:
93+
default: false
94+
description: |-
95+
DisableUpstreamTokenInjection prevents the embedded auth server from injecting
96+
upstream IdP tokens into requests forwarded to the backend MCP server.
97+
When true, the embedded auth server still handles OAuth flows for clients
98+
but does not swap ToolHive JWTs for upstream tokens on outgoing requests.
99+
This is useful when the backend MCP server does not require authentication
100+
(e.g., public documentation servers) but you still want client authentication.
101+
type: boolean
92102
hmacSecretRefs:
93103
description: |-
94104
HMACSecretRefs references Kubernetes Secrets containing symmetric secrets for signing

0 commit comments

Comments
 (0)