-
Notifications
You must be signed in to change notification settings - Fork 356
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add OpenID-Connect authentication support #2855
Conversation
@miq-bot add_labels authentication, enhancement, gaprindashvili/no |
@jvlcek Cannot apply the following label because they are not recognized: authentication |
@miq-bot add_label wip |
def oidc_login | ||
request.env.each do |key, value| | ||
$log.info(" request.env[#{key}] = #{value}") if key =~ /^HTTP_/ | ||
end |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
probably left over from debugging all this fun stuff
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Good. Catch. 👍
93bc918
to
0d6d8ed
Compare
This pull request is not mergeable. Please rebase and repush. |
This pull request is not mergeable. Please rebase and repush. |
@jvlcek Cannot apply the following label because they are not recognized: authentication |
270ffe7
to
bf4a216
Compare
@miq-bot remove_label wip |
@eclarizio and @himdel Please review. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'm not super well versed in this area, but is there any way we can add specs to cover primarily the code that was moved into the #identity_provider_login
method? Maybe even extracting all of that logic out into a service so that it can be unit tested without having to set up a bunch of variables for the dashboard_controller?
This is a similar approach to the PrivilegeCheckerService
that I remember we were looking at while debugging this problem before, but again, not sure if you think that is a good strategy to employ here or not.
@eclarizio Thank you for the feedback. I'll take a look at JoeV |
@eclarizio As we discussed extracting logic in the new #identity_provider_login method into a service does not seem like a good solution. I believe I have addressed your fundamental concern of having spec tests to exercise the logic in the new #identity_provider_login method by adding a context "OIDC support" do test to the dashboard_controller_spec.rb. The existing context "SAML support" do test was already exercising some of the logic in the new #identity_provider_login method. Please let me know if this addresses your fundamental concern. Thank you! JoeV |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@jvlcek Yeah, sounds good to me! 👍
Some comments on commits jvlcek/manageiq-ui-classic@fd09be0~...ab0960a spec/controllers/dashboard_controller_spec.rb
|
Checked commits jvlcek/manageiq-ui-classic@fd09be0~...ab0960a with ruby 2.3.3, rubocop 0.52.1, haml-lint 0.20.0, and yamllint 1.10.0 **
|
https://www.pivotaltracker.com/n/projects/1610127/stories/121849185
The changes introduced by this PR will provide support for enabling OpenID-Connect
authentication.
This PR depends on PR16495
Steps for Testing/QA [Optional]