Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

DXCDT-443: OIDC Back-channel logout #581

Merged
merged 10 commits into from
May 15, 2023
Merged

Conversation

willvedd
Copy link
Contributor

@willvedd willvedd commented May 12, 2023

🔧 Changes

Adding support for managing a tenant's OIDC back-channel logout urls. This feature requires a feature flag to be enabled on the tenant, when disabled, the API will return a Additional properties not allowed: oidc_backchannel_logout 400 error. For this reason, the test recordings were done against a tenant that had the feature flag enabled, but will not succeed when run against a live tenant without the feature flag enabled.

Note: Remaining as draft until Go Auth0 cuts a release with the depending support.

📚 References

🔬 Testing

Added assertions for empty value, adding a url and removing a url.

📝 Checklist

  • All new/changed/fixed functionality is covered by tests (or N/A)
  • I have added documentation for all new/changed functionality (or N/A)

@willvedd willvedd requested a review from a team as a code owner May 12, 2023 18:16
@willvedd willvedd marked this pull request as draft May 12, 2023 18:16
@willvedd willvedd changed the title Initial commit for backchannel logout DXCDT-443: OIDC Back-channel logout May 12, 2023
@sergiught sergiught force-pushed the DXCDT-443-oidc-back-channel-logout branch from 14a29c0 to ee79819 Compare May 15, 2023 08:24
internal/auth0/client/resource.go Outdated Show resolved Hide resolved
Elem: &schema.Schema{
Type: schema.TypeString,
},
Optional: true,
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We could consider adding a validation here to ensure we only pass 1 URL and error early, considering the API only accepts one url at the moment.

Co-authored-by: Sergiu Ghitea <28300158+sergiught@users.noreply.github.com>
@codecov-commenter
Copy link

codecov-commenter commented May 15, 2023

Codecov Report

Merging #581 (3661bfe) into main (f7ea5cb) will increase coverage by 0.02%.
The diff coverage is 100.00%.

Additional details and impacted files

Impacted file tree graph

@@            Coverage Diff             @@
##             main     #581      +/-   ##
==========================================
+ Coverage   87.42%   87.44%   +0.02%     
==========================================
  Files          68       68              
  Lines       10391    10412      +21     
==========================================
+ Hits         9084     9105      +21     
  Misses        988      988              
  Partials      319      319              
Impacted Files Coverage Δ
internal/auth0/client/expand.go 78.57% <100.00%> (+0.82%) ⬆️
internal/auth0/client/resource.go 97.19% <100.00%> (+0.03%) ⬆️

@willvedd willvedd marked this pull request as ready for review May 15, 2023 15:37
@willvedd willvedd enabled auto-merge (squash) May 15, 2023 15:37
@willvedd willvedd merged commit 0579003 into main May 15, 2023
@willvedd willvedd deleted the DXCDT-443-oidc-back-channel-logout branch May 15, 2023 15:39
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants