Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bug/okta OIDC configuration url fix #663

Open
wants to merge 5 commits into
base: master
Choose a base branch
from

Conversation

nickryand
Copy link

Proposed changes

Describe the big picture of your changes here to communicate to the maintainers
why we should accept this pull request. If it fixes a bug or resolves a feature
request, be sure to link to that issue.

Types of changes

Please check the type of change your PR introduces:

  • Release (new release request)
  • Bugfix (non-breaking change which fixes an issue)
  • New feature (non-breaking change which adds functionality)
  • Code style update (PEP8, lint, formatting, renaming, etc)
  • Refactoring (no functional changes, no api changes)
  • Breaking change (fix or feature that would cause existing functionality to not work as expected)
  • Build related changes (build process, tests runner, etc)
  • Other (please describe):

Checklist

Put an x in the boxes that apply. You can also fill these out after creating
the PR. If you're unsure about any of them, don't hesitate to ask. We're here to
help! This is simply a reminder of what we are going to look for before merging
your code.

  • Lint and unit tests pass locally with my changes
  • I have added tests that prove my fix is effective or that my feature works

Should fix #662 without breaking non-custom auth server configurations.

@oasys
Copy link

oasys commented Feb 3, 2022

@codecov
Copy link

codecov bot commented Feb 3, 2022

Codecov Report

Attention: 1 lines in your changes are missing coverage. Please review.

Comparison is base (044f3c1) 77.59% compared to head (edc34f2) 77.05%.

❗ Current head edc34f2 differs from pull request most recent head f985cb5. Consider uploading reports for the commit f985cb5 to get more accurate results

Files Patch % Lines
social_core/backends/okta.py 87.50% 1 Missing ⚠️
Additional details and impacted files
@@            Coverage Diff             @@
##           master     #663      +/-   ##
==========================================
- Coverage   77.59%   77.05%   -0.55%     
==========================================
  Files         343      319      -24     
  Lines       10521     9687     -834     
  Branches      699     1037     +338     
==========================================
- Hits         8164     7464     -700     
+ Misses       2200     2071     -129     
+ Partials      157      152       -5     
Flag Coverage Δ
unittests 77.05% <92.30%> (-0.55%) ⬇️

Flags with carried forward coverage won't be shown. Click here to find out more.

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

@UnityDG
Copy link

UnityDG commented Mar 7, 2022

Just tested this locally and seems to work

@nijel
Copy link
Member

nijel commented Mar 16, 2022

Can you please rebase on current master? I have no clue why GitHub didn't execute the checks...

* Added handling for properly generating the openid-configuration
  url when a custom authorization server is in use.
@nickryand nickryand force-pushed the bug/okta-oidc-configuration-url-fix branch from b39cb7d to edc34f2 Compare April 1, 2022 20:50
@nickryand
Copy link
Author

Sorry this took so long!!

@@ -147,6 +147,27 @@ def setUp(self):
def jwks(_request, _uri, headers):
return 200, headers, json.dumps({"keys": [self.key]})

def test_okta_oidc_config(self):
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This decoupled usage of oidc_config variable from its definition what causes test to fail.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Development

Successfully merging this pull request may close these issues.

Okta OpenID Connect Custom Auth Server Error
4 participants