-
Notifications
You must be signed in to change notification settings - Fork 0
support more generic oidc #431
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
for more information, see https://pre-commit.ci
Codecov ReportAttention: Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## main #431 +/- ##
==========================================
- Coverage 93.75% 93.25% -0.51%
==========================================
Files 64 64
Lines 2435 2489 +54
==========================================
+ Hits 2283 2321 +38
- Misses 152 168 +16 ☔ View full report in Codecov by Sentry. |
FedericoNegri
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Left a minor comment about removing a warning, otherwise looks good to me.
Since this is backward compatible, can be merged at any time.
I guess proper testing against Ansys ID needs to happen elsewhere.
Description
Scaler uses PyHPS and pyHPS didn't support OIDC discovery, only hardcoded things for keycloak, add those new features and a new one to allow grabbing the auth_url from JMS instead of the client needing to know it.
Checklist