Compare commits
3 Commits
Author | SHA1 | Date | |
---|---|---|---|
f787b14939 | |||
e232eb7d8d | |||
44bf4e4888 |
@ -1,3 +1,10 @@
|
|||||||
|
## [1.0.8](http://gitea.gitea.svc.cluster.local:3000/djpbessems/ContainerImage.SpamasaurusRex/compare/v1.0.7...v1.0.8) (2024-03-09)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* Replace bogus scope with correct value ([44bf4e4](http://gitea.gitea.svc.cluster.local:3000/djpbessems/ContainerImage.SpamasaurusRex/commit/44bf4e4888738afebd28ad717153113753afd5f2))
|
||||||
|
|
||||||
## [1.0.7](http://gitea.gitea.svc.cluster.local:3000/djpbessems/ContainerImage.SpamasaurusRex/compare/v1.0.6...v1.0.7) (2024-03-09)
|
## [1.0.7](http://gitea.gitea.svc.cluster.local:3000/djpbessems/ContainerImage.SpamasaurusRex/compare/v1.0.6...v1.0.7) (2024-03-09)
|
||||||
|
|
||||||
|
|
||||||
|
@ -23,7 +23,9 @@ func handler(w http.ResponseWriter, r *http.Request) {
|
|||||||
clientId := "dccb4b93-3f75-4775-a94a-da39216d7daf"
|
clientId := "dccb4b93-3f75-4775-a94a-da39216d7daf"
|
||||||
tenantId := "ceeae22e-f163-4ac9-b7c2-45972d3aed4f"
|
tenantId := "ceeae22e-f163-4ac9-b7c2-45972d3aed4f"
|
||||||
// redirectURI := "https://alias.spamasaurus.com/"
|
// redirectURI := "https://alias.spamasaurus.com/"
|
||||||
scopes := []string{"email"}
|
scopes := []string{"user.read"}
|
||||||
|
|
||||||
|
ctx := context.Background()
|
||||||
|
|
||||||
// confidential clients have a credential, such as a secret or a certificate
|
// confidential clients have a credential, such as a secret or a certificate
|
||||||
cred, err := confidential.NewCredFromSecret("client_secret")
|
cred, err := confidential.NewCredFromSecret("client_secret")
|
||||||
@ -36,10 +38,10 @@ func handler(w http.ResponseWriter, r *http.Request) {
|
|||||||
// TODO: handle error
|
// TODO: handle error
|
||||||
}
|
}
|
||||||
|
|
||||||
result, err := confidentialClient.AcquireTokenSilent(context.TODO(), scopes)
|
result, err := confidentialClient.AcquireTokenSilent(ctx, scopes)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
// cache miss, authenticate with another AcquireToken... method
|
// cache miss, authenticate with another AcquireToken... method
|
||||||
result, err = confidentialClient.AcquireTokenByCredential(context.TODO(), scopes)
|
result, err = confidentialClient.AcquireTokenByCredential(ctx, scopes)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
// TODO: handle error
|
// TODO: handle error
|
||||||
}
|
}
|
||||||
|
Reference in New Issue
Block a user