3 Commits

Author SHA1 Message Date
f787b14939 chore(release): 1.0.8 [skip ci]
## [1.0.8](http://gitea.gitea.svc.cluster.local:3000/djpbessems/ContainerImage.SpamasaurusRex/compare/v1.0.7...v1.0.8) (2024-03-09)

### Bug Fixes

* Replace bogus scope with correct value ([44bf4e4](44bf4e4888))
2024-03-09 11:08:48 +00:00
e232eb7d8d Merge branch 'main' of https://code.spamasaurus.com/djpbessems/ContainerImage.SpamasaurusRex
All checks were successful
Container & Helm chart / Semantic Release (Dry-run) (push) Successful in 29s
Container & Helm chart / Helm chart (push) Successful in 16s
Container & Helm chart / Container image (push) Successful in 8m46s
Container & Helm chart / Semantic Release (push) Successful in 34s
2024-03-09 21:58:57 +11:00
44bf4e4888 fix: Replace bogus scope with correct value 2024-03-09 21:58:56 +11:00
2 changed files with 12 additions and 3 deletions

View File

@ -1,3 +1,10 @@
## [1.0.8](http://gitea.gitea.svc.cluster.local:3000/djpbessems/ContainerImage.SpamasaurusRex/compare/v1.0.7...v1.0.8) (2024-03-09)
### Bug Fixes
* Replace bogus scope with correct value ([44bf4e4](http://gitea.gitea.svc.cluster.local:3000/djpbessems/ContainerImage.SpamasaurusRex/commit/44bf4e4888738afebd28ad717153113753afd5f2))
## [1.0.7](http://gitea.gitea.svc.cluster.local:3000/djpbessems/ContainerImage.SpamasaurusRex/compare/v1.0.6...v1.0.7) (2024-03-09)

View File

@ -23,7 +23,9 @@ func handler(w http.ResponseWriter, r *http.Request) {
clientId := "dccb4b93-3f75-4775-a94a-da39216d7daf"
tenantId := "ceeae22e-f163-4ac9-b7c2-45972d3aed4f"
// redirectURI := "https://alias.spamasaurus.com/"
scopes := []string{"email"}
scopes := []string{"user.read"}
ctx := context.Background()
// confidential clients have a credential, such as a secret or a certificate
cred, err := confidential.NewCredFromSecret("client_secret")
@ -36,10 +38,10 @@ func handler(w http.ResponseWriter, r *http.Request) {
// TODO: handle error
}
result, err := confidentialClient.AcquireTokenSilent(context.TODO(), scopes)
result, err := confidentialClient.AcquireTokenSilent(ctx, scopes)
if err != nil {
// cache miss, authenticate with another AcquireToken... method
result, err = confidentialClient.AcquireTokenByCredential(context.TODO(), scopes)
result, err = confidentialClient.AcquireTokenByCredential(ctx, scopes)
if err != nil {
// TODO: handle error
}