8 Commits

Author SHA1 Message Date
d864e11320 chore(release): 1.0.9 [skip ci]
## [1.0.9](http://gitea.gitea.svc.cluster.local:3000/djpbessems/ContainerImage.SpamasaurusRex/compare/v1.0.8...v1.0.9) (2024-03-09)

### Bug Fixes

* Refactor to different client method ([216c955](216c955e68))
2024-03-09 11:41:29 +00:00
907fc9249c chore: Revert action extra_args
All checks were successful
Container & Helm chart / Semantic Release (Dry-run) (push) Successful in 24s
Container & Helm chart / Helm chart (push) Successful in 22s
Container & Helm chart / Container image (push) Successful in 10m39s
Container & Helm chart / Semantic Release (push) Successful in 33s
2024-03-09 22:29:45 +11:00
4adb8cd382 Merge branch 'main' of https://code.spamasaurus.com/djpbessems/ContainerImage.SpamasaurusRex
Some checks failed
Container & Helm chart / Semantic Release (Dry-run) (push) Successful in 29s
Container & Helm chart / Container image (push) Failing after 6s
Container & Helm chart / Helm chart (push) Successful in 16s
Container & Helm chart / Semantic Release (push) Has been skipped
2024-03-09 22:25:37 +11:00
216c955e68 fix: Refactor to different client method 2024-03-09 22:25:35 +11:00
d38686dc01 chore: Switch to verbose output for go build 2024-03-09 22:25:20 +11:00
f787b14939 chore(release): 1.0.8 [skip ci]
## [1.0.8](http://gitea.gitea.svc.cluster.local:3000/djpbessems/ContainerImage.SpamasaurusRex/compare/v1.0.7...v1.0.8) (2024-03-09)

### Bug Fixes

* Replace bogus scope with correct value ([44bf4e4](44bf4e4888))
2024-03-09 11:08:48 +00:00
e232eb7d8d Merge branch 'main' of https://code.spamasaurus.com/djpbessems/ContainerImage.SpamasaurusRex
All checks were successful
Container & Helm chart / Semantic Release (Dry-run) (push) Successful in 29s
Container & Helm chart / Helm chart (push) Successful in 16s
Container & Helm chart / Container image (push) Successful in 8m46s
Container & Helm chart / Semantic Release (push) Successful in 34s
2024-03-09 21:58:57 +11:00
44bf4e4888 fix: Replace bogus scope with correct value 2024-03-09 21:58:56 +11:00
3 changed files with 23 additions and 5 deletions

View File

@ -54,6 +54,7 @@ jobs:
- name: Kaniko build
uses: aevea/action-kaniko@master
with:
# extra_args: -v debug
registry: code.spamasaurus.com
image: djpbessems/spamasaurusrex
username: ${{ secrets.GIT_USERNAME }}

View File

@ -1,3 +1,17 @@
## [1.0.9](http://gitea.gitea.svc.cluster.local:3000/djpbessems/ContainerImage.SpamasaurusRex/compare/v1.0.8...v1.0.9) (2024-03-09)
### Bug Fixes
* Refactor to different client method ([216c955](http://gitea.gitea.svc.cluster.local:3000/djpbessems/ContainerImage.SpamasaurusRex/commit/216c955e68908d523a84cafd6cf182f9583e104e))
## [1.0.8](http://gitea.gitea.svc.cluster.local:3000/djpbessems/ContainerImage.SpamasaurusRex/compare/v1.0.7...v1.0.8) (2024-03-09)
### Bug Fixes
* Replace bogus scope with correct value ([44bf4e4](http://gitea.gitea.svc.cluster.local:3000/djpbessems/ContainerImage.SpamasaurusRex/commit/44bf4e4888738afebd28ad717153113753afd5f2))
## [1.0.7](http://gitea.gitea.svc.cluster.local:3000/djpbessems/ContainerImage.SpamasaurusRex/compare/v1.0.6...v1.0.7) (2024-03-09)

View File

@ -22,24 +22,27 @@ import (
func handler(w http.ResponseWriter, r *http.Request) {
clientId := "dccb4b93-3f75-4775-a94a-da39216d7daf"
tenantId := "ceeae22e-f163-4ac9-b7c2-45972d3aed4f"
// redirectURI := "https://alias.spamasaurus.com/"
scopes := []string{"email"}
redirectURI := "https://alias.spamasaurus.com/"
scopes := []string{"user.read"}
queryParams := r.URL.Query()
ctx := context.Background()
// confidential clients have a credential, such as a secret or a certificate
cred, err := confidential.NewCredFromSecret("client_secret")
if err != nil {
// TODO: handle error
}
confidentialClient, err := confidential.New("https://login.microsoftonline.com/"+tenantId, clientId, cred)
if err != nil {
// TODO: handle error
}
result, err := confidentialClient.AcquireTokenSilent(context.TODO(), scopes)
result, err := confidentialClient.AcquireTokenSilent(ctx, scopes)
if err != nil {
// cache miss, authenticate with another AcquireToken... method
result, err = confidentialClient.AcquireTokenByCredential(context.TODO(), scopes)
// result, err = confidentialClient.AcquireTokenByCredential(ctx, scopes)
result, err = confidentialClient.AcquireTokenByAuthCode(ctx, queryParams["code"][0], redirectURI, scopes)
if err != nil {
// TODO: handle error
}