2 Commits

Author SHA1 Message Date
e232eb7d8d Merge branch 'main' of https://code.spamasaurus.com/djpbessems/ContainerImage.SpamasaurusRex
All checks were successful
Container & Helm chart / Semantic Release (Dry-run) (push) Successful in 29s
Container & Helm chart / Helm chart (push) Successful in 16s
Container & Helm chart / Container image (push) Successful in 8m46s
Container & Helm chart / Semantic Release (push) Successful in 34s
2024-03-09 21:58:57 +11:00
44bf4e4888 fix: Replace bogus scope with correct value 2024-03-09 21:58:56 +11:00

View File

@ -23,7 +23,9 @@ func handler(w http.ResponseWriter, r *http.Request) {
clientId := "dccb4b93-3f75-4775-a94a-da39216d7daf" clientId := "dccb4b93-3f75-4775-a94a-da39216d7daf"
tenantId := "ceeae22e-f163-4ac9-b7c2-45972d3aed4f" tenantId := "ceeae22e-f163-4ac9-b7c2-45972d3aed4f"
// redirectURI := "https://alias.spamasaurus.com/" // redirectURI := "https://alias.spamasaurus.com/"
scopes := []string{"email"} scopes := []string{"user.read"}
ctx := context.Background()
// confidential clients have a credential, such as a secret or a certificate // confidential clients have a credential, such as a secret or a certificate
cred, err := confidential.NewCredFromSecret("client_secret") cred, err := confidential.NewCredFromSecret("client_secret")
@ -36,10 +38,10 @@ func handler(w http.ResponseWriter, r *http.Request) {
// TODO: handle error // TODO: handle error
} }
result, err := confidentialClient.AcquireTokenSilent(context.TODO(), scopes) result, err := confidentialClient.AcquireTokenSilent(ctx, scopes)
if err != nil { if err != nil {
// cache miss, authenticate with another AcquireToken... method // cache miss, authenticate with another AcquireToken... method
result, err = confidentialClient.AcquireTokenByCredential(context.TODO(), scopes) result, err = confidentialClient.AcquireTokenByCredential(ctx, scopes)
if err != nil { if err != nil {
// TODO: handle error // TODO: handle error
} }