You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: deploy/cloudrun/README.md
+19Lines changed: 19 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -667,6 +667,7 @@ Bearer token that is active and carries the `api.console` and `api.ocm` scopes.
667
667
| `MARKETPLACE_HANDLER_URL` | URL of the marketplace-handler service. Used to build the DCR endpoints in the AgentCard. If empty, falls back to `AGENT_PROVIDER_URL`. Set automatically by `deploy.sh`. |
668
668
| `AGENT_PROVIDER_ORGANIZATION_URL` | Provider's organization website URL (default: `https://www.redhat.com`). Used in AgentCard `provider.url` and as the expected JWT audience for Google DCR `software_statement` validation. Set in YAML configs, not changed by `deploy.sh`. |
| `AGENT_ALLOWED_SCOPES` | Comma-separated allowlist of permitted scopes (default: `openid,profile,email,api.console,api.ocm`). Tokens with scopes outside this list are rejected (403). |
670
671
671
672
### Development Mode
672
673
@@ -1128,6 +1129,24 @@ gcloud run services update ${SERVICE_NAME:-lightspeed-agent} \
1128
1129
This setting is also configurable in `service.yaml` via the
1129
1130
`AGENT_REQUIRED_SCOPE` environment variable.
1130
1131
1132
+
**"Token carries disallowed scope(s): ..."**
1133
+
1134
+
The agent enforces a scope allowlist (`AGENT_ALLOWED_SCOPES`) to prevent tokens
1135
+
with elevated privileges from being forwarded to downstream services. If the
1136
+
token carries scopes not in the allowlist, you will see a 403 error.
1137
+
1138
+
Add the missing scope(s) to the allowlist:
1139
+
1140
+
```bash
1141
+
gcloud run services update ${SERVICE_NAME:-lightspeed-agent} \
|`RED_HAT_SSO_CLIENT_ID`| - | Resource Server client ID (used for token introspection) |
40
40
|`RED_HAT_SSO_CLIENT_SECRET`| - | Resource Server client secret |
41
41
|`AGENT_REQUIRED_SCOPE`|`api.console,api.ocm`| Comma-separated OAuth scopes required in access tokens |
42
+
|`AGENT_ALLOWED_SCOPES`|`openid,profile,email,api.console,api.ocm`| Comma-separated allowlist of permitted scopes. Tokens with scopes outside this list are rejected (403). |
0 commit comments