-
-
Notifications
You must be signed in to change notification settings - Fork 235
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Westminster] Add OpenID Connect single sign-on support #2523
Conversation
Codecov Report
@@ Coverage Diff @@
## westminster-reviewed #2523 +/- ##
========================================================
+ Coverage 82.32% 82.35% +0.03%
========================================================
Files 211 214 +3
Lines 13085 13187 +102
Branches 2417 2439 +22
========================================================
+ Hits 10772 10860 +88
- Misses 1476 1480 +4
- Partials 837 847 +10
Continue to review full report at Codecov.
|
97456ae
to
7b8d65c
Compare
7b8d65c
to
385bf4e
Compare
5e9c8f1
to
d1cd01c
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Have to dash, almost finished, just the OIDC::Lite ones to check over, but thought would submit now anyway. Looks good, main overall comment is can/should we refactor the different mechanisms together now we're at three. Plus other little bits.
$c->res->redirect($url); | ||
} | ||
|
||
sub oidc_callback: Path('/auth/OIDC') : Args(0) { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I realise they're all subtly different, but is there any worth in factoring the (now) three out to shared subclasses or something with variants for their differing parts?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
One question on setting the parser class is all.
7a65687
to
6790083
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks good, one suggested change is all!
Extends social login functionality to authenticate against an (MS Active Directory B2C-specific) OpenID Connect identity provider.