"Could not find a valid policy to apply to this token!
api-definition file:
{
“id”: “5”,
“name”: “My Test API”,
“slug”: “my-test-api”,
“listen_port”: 0,
“protocol”: “”,
“api_id”: “123”,
“org_id”: “345”,
“auth_configs”: {
“jwt”: {
“name”: “”,
“use_param”: false,
“param_name”: “”,
“use_cookie”: false,
“cookie_name”: “”,
“disable_header”: false,
“auth_header_name”: “Authorization”,
“secret_is_base64”: true,
“use_certificate”: false,
“validate_signature”: false,
“signature”: {
“algorithm”: “”,
“header”: “”,
“use_param”: false,
“param_name”: “”,
“secret”: “”,
“allowed_clock_skew”: 0,
“error_code”: 0,
“error_message”: “”
}
}
},
“enable_jwt”: true,
“jwt_signing_method”: “HS256”,
“jwt_source”: “bXktc3VwZXItc2VjcmV0LWQ==”,
“jwt_identity_base_field”: “sub”,
“jwt_client_base_field”: “”,
“jwt_policy_field_name”: “pol”,
“jwt_default_policies”: [“default”],
“jwt_issued_at_validation_skew”: 0,
“jwt_expires_at_validation_skew”: 0,
“jwt_not_before_validation_skew”: 0,
“jwt_skip_kid”: false,
“scopes”: {
“jwt”: {
“scope_claim_name”: “”,
“scope_to_policy”: {}
},
“oidc”: {
“scope_claim_name”: “”,
“scope_to_policy”: {}
}
},
“jwt_scope_to_policy_mapping”: {},
“jwt_scope_claim_name”: “”,
“enable_signature_checking”: false,
“hmac_allowed_clock_skew”: -1,
“hmac_allowed_algorithms”: ,
“request_signing”: {
“is_enabled”: false,
“secret”: “”,
“key_id”: “”,
“algorithm”: “”,
“header_list”: ,
“certificate_id”: “”,
“signature_header”: “”
},
“base_identity_provided_by”: “”,
“version_data”: {
“not_versioned”: true,
“default_version”: “”,
“versions”: {
“Default”: {
“name”: “Default”,
“expires”: “”,
“paths”: {
“ignored”: ,
“white_list”: ,
“black_list”:
},
“use_extended_paths”: true,
“extended_paths”: {}
}
}
},
“proxy”: {
“preserve_host_header”: false,
“listen_path”: “/api1/”,
“target_url”: “http://httpbin.org/”,
“disable_strip_slash”: true,
“strip_listen_path”: true
},
“session_lifetime_respects_key_expiration”: false,
“session_lifetime”: 0,
“active”: true,
“internal”: false,
“allowed_ips”: ,
“blacklisted_ips”: ,
“expire_analytics_after”: 0,
“response_processors”: ,
“config_data”: {},
“tag_headers”:
}
tyk.conf file :
{
“log_level”: “info”,
“listen_port”: 8090,
“secret”: “58de1402fbb76743f5527600e590bbf8d8f44463ae278f3034”,
“template_path”: “/opt/tyk-gateway/templates”,
“tyk_js_path”: “/opt/tyk-gateway/js/tyk.js”,
“middleware_path”: “/opt/tyk-gateway/middleware”,
“use_db_app_configs”: false,
“app_path”: “/opt/tyk-gateway/apps/”,
“storage”: {
“type”: “redis”,
“host”: “tyk-redis”,
“port”: 6379,
“username”: “”,
“password”: “”,
“database”: 0,
“optimisation_max_idle”: 2000,
“optimisation_max_active”: 4000
},
“enable_analytics”: false,
“analytics_config”: {
“type”: “”,
“ignored_ips”: ,
“enable_detailed_recording”: true
},
“health_check”: {
“enable_health_checks”: false,
“health_check_value_timeouts”: 60
},
“enable_non_transactional_rate_limiter”: true,
“enable_sentinel_rate_limiter”: false,
“enable_redis_rolling_limiter”: false,
“allow_master_keys”: false,
“policies”: {
“policy_source”: “file”,
“policy_path”: “/opt/tyk-gateway/policies/policies.json”
},
“hash_keys”: false,
“close_connections”: false,
“http_server_options”: {
“enable_websockets”: true
},
“allow_insecure_configs”: true,
“coprocess_options”: {
“enable_coprocess”: true,
“coprocess_grpc_server”: “”
},
“enable_bundle_downloader”: true,
“bundle_base_url”: “”,
“global_session_lifetime”: 100,
“force_global_session_lifetime”: false,
“max_idle_connections_per_host”: 500,
“enable_jsvm”: true
}
policies.json file -
{
“default”: {
“rate”: 1000,
“per”: 1,
“quota_max”: -1,
“quota_renewal_rate”: -1,
“access_rights”: {
“123”: {
“api_name”: “My API”,
“api_id”: “123”,
“versions”: [“Default”]
}
},
“org_id”: “345”,
“hmac_enabled”: false,
“allowed_urls”: [
{
“url”: “/api1/”,
“methods”: [“POST”]
}
]
}
}
docker compose file :
version: ‘3’
services:
tyk-gateway:
image: docker.tyk.io/tyk-gateway/tyk-gateway:latest
ports:
- “8091:8090”
environment: - TYK_GW_SECRET=58de1402fbb76743f552760053ba3d8d1625f8d8f44463ae278f3034
volumes: - C:\TykFreshSetup\tyk.conf:/opt/tyk-gateway/tyk.conf
- C:\TykFreshSetup\apps:/opt/tyk-gateway/apps
- C:\TykFreshSetup\policies:/opt/tyk-gateway/policies
networks: - tyk
depends_on: - tyk-redis
tyk-redis:
image: redis:4.0-alpine
ports: - “6390:6379”
volumes: - redis-data:/data
networks: - tyk
networks:
tyk:
external: true
volumes:
redis-data:
{
“error”: “key not authorized: no matching policy”
}
time=“Mar 06 06:36:30” level=error msg=“Could not find a valid policy to apply to this token!” api_id=0fba2962-98d0-468f384255b api_name=“My Test API” mw=JWTMiddleware org_id=2mSTfVorijgRU5tHuI origin=172.18.0.1 path=“/api1/”