-
Notifications
You must be signed in to change notification settings - Fork 138
fix: allow for auth with activedirectory again #1061
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Current /login is forced to use local auth. This change resolves this regression in a backwards compatible manner while still supporting alternative auth like OIDC. Auth methods compatible with /login are filtered out from the git-proxy config, if there isn't one /login is essentially disabled to avoid throwing. If there is multiple methods it'll prioritize the first. In the future we can support multiple user & password login methods simultaneously with relevant TODOs added.
loadFromGit should be sufficiently authenticated and if it isn't it's not expected to get interactive input. Inform git not to wait for interactive action. This also resolves an issue in the tests where "should throw error if repository is valid URL but not a git repository" test times out waiting for a username.
If we want to ensure this git repository isn't created it should be pointed at the FINOS org, the parent of this repo currently. In theory test-org (an org that currently exists) could add a repo called test-project.
✅ Deploy Preview for endearing-brigadeiros-63f9d0 canceled.
|
cc: @jescalada to double check this doesn't impact OIDC & also may be relevant to #1024 |
Codecov ReportAttention: Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## main #1061 +/- ##
==========================================
+ Coverage 76.73% 76.78% +0.04%
==========================================
Files 55 55
Lines 2244 2261 +17
Branches 251 251
==========================================
+ Hits 1722 1736 +14
- Misses 492 495 +3
Partials 30 30 ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM! 🍰
Draft because my commit signing seems to be playing up but should otherwise be ready for review.After actually posting the PR commit signatures look fine.
Main change - allow for auth with activedirectory again
Current /login is forced to use local auth.
This change resolves this regression in a backwards compatible manner while still supporting alternative auth like OIDC.
Auth methods compatible with /login are filtered out from the git-proxy config, if there isn't one /login is essentially disabled to avoid throwing.
If there is multiple methods it'll prioritize the first.
In the future we can support multiple user & password login methods simultaneously with relevant TODOs added.
other fixes: