-
Notifications
You must be signed in to change notification settings - Fork 8
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Various OAuth fixes #1187
Various OAuth fixes #1187
Conversation
internal/rpc/proxy.go
Outdated
if err != nil { | ||
return errorFnc(err) | ||
} | ||
|
||
// TODO(CSS-7081): Ensure for tests that the secret key can be configured. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think you can remove this TODO now.
pkg/names/service_account.go
Outdated
@@ -62,5 +56,5 @@ func ParseServiceAccountTag(tag string) (ServiceAccountTag, error) { | |||
|
|||
// IsValidServiceAccountId verifies the client id for a service account is valid according to a regex internally. | |||
func IsValidServiceAccountId(id string) bool { | |||
return validClientId.MatchString(id) | |||
return names.IsValidUser(id) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Shouldn't we also enforce that the id has a domain?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Just a debug leftover.
internal/rpc/proxy.go
Outdated
// TODO(CSS-7081): Ensure for tests that the secret key can be configured. | ||
// Or configure cmd tests to use the configured secret. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think this has already been fixed.
go.mod
Outdated
@@ -329,6 +328,7 @@ require ( | |||
|
|||
replace ( | |||
github.com/altoros/gosigma => github.com/juju/gosigma v0.0.0-20170523021020-a27b59fe2be9 | |||
github.com/juju/juju => ../juju |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Leftover from debugging.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
yes! thank you
@@ -693,7 +693,7 @@ | |||
] | |||
}, | |||
{ | |||
"clientId": "test-client-id", | |||
"clientId": "test-client-id@canonical.com", |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Why are we putting the @ here? I thought we'd append it to it internally?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
lgtm but bit confused why we're making client id look like email within idp itself
a662c48
to
349d2c9
Compare
- fixes the proxy session token verification - changes the format of the client credentials client id bringing it in line with juju user tags - various local testing fixes
d2f585b
to
0028df2
Compare
Description
Engineering checklist
Check only items that apply
Test instructions
Notes for code reviewers