Closed Chima-ThirdBridge closed 2 years ago
I have resolved this issue.
I need to explicity set the authorization_type on the route that uses the authorizer - adding authorization_type = "JWT" resolved this issue:
"ANY /{proxy+}" = {
connection_type = "VPC_LINK"
vpc_link = "${local.application_name}-vpc"
integration_uri = local.alb_http_listener_arn
integration_type = "HTTP_PROXY"
integration_method = "ANY"
authorization_type = "JWT"
authorizer_key = "auth0"
}
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further.
Description
I am using an JWT Authorizer on my APIGateways routes Reviewing the example set out in complete-http I can either:
Versions
Module version: 2.0.0:
Terraform version: v1.2.1 on darwin_amd64
Provider version(s):
provider registry.terraform.io/hashicorp/archive v2.2.0
provider registry.terraform.io/hashicorp/aws v4.18.0
provider registry.terraform.io/hashicorp/random v3.3.2
provider registry.terraform.io/hashicorp/template v2.2.0
Reproduction Code [Required]
Steps to reproduce the behavior:
Code is developed locally, formated and validated using terraform commands Code is pushed to branch in GitHub Code is deployed from GitHub using CICD pipelines run using Slack commands
Expected behavior
The created authorizer resource should be attached to the given route
Actual behavior
The authorizer is created as expected but never attached to the route
Workaround
Manually attach the authorizer to the route as required.
Screenshots