Compare commits
5 Commits
Author | SHA1 | Date | |
---|---|---|---|
d864e11320 | |||
907fc9249c | |||
4adb8cd382 | |||
216c955e68 | |||
d38686dc01 |
@ -54,6 +54,7 @@ jobs:
|
||||
- name: Kaniko build
|
||||
uses: aevea/action-kaniko@master
|
||||
with:
|
||||
# extra_args: -v debug
|
||||
registry: code.spamasaurus.com
|
||||
image: djpbessems/spamasaurusrex
|
||||
username: ${{ secrets.GIT_USERNAME }}
|
||||
|
@ -1,3 +1,10 @@
|
||||
## [1.0.9](http://gitea.gitea.svc.cluster.local:3000/djpbessems/ContainerImage.SpamasaurusRex/compare/v1.0.8...v1.0.9) (2024-03-09)
|
||||
|
||||
|
||||
### Bug Fixes
|
||||
|
||||
* Refactor to different client method ([216c955](http://gitea.gitea.svc.cluster.local:3000/djpbessems/ContainerImage.SpamasaurusRex/commit/216c955e68908d523a84cafd6cf182f9583e104e))
|
||||
|
||||
## [1.0.8](http://gitea.gitea.svc.cluster.local:3000/djpbessems/ContainerImage.SpamasaurusRex/compare/v1.0.7...v1.0.8) (2024-03-09)
|
||||
|
||||
|
||||
|
@ -22,8 +22,9 @@ import (
|
||||
func handler(w http.ResponseWriter, r *http.Request) {
|
||||
clientId := "dccb4b93-3f75-4775-a94a-da39216d7daf"
|
||||
tenantId := "ceeae22e-f163-4ac9-b7c2-45972d3aed4f"
|
||||
// redirectURI := "https://alias.spamasaurus.com/"
|
||||
redirectURI := "https://alias.spamasaurus.com/"
|
||||
scopes := []string{"user.read"}
|
||||
queryParams := r.URL.Query()
|
||||
|
||||
ctx := context.Background()
|
||||
|
||||
@ -32,7 +33,6 @@ func handler(w http.ResponseWriter, r *http.Request) {
|
||||
if err != nil {
|
||||
// TODO: handle error
|
||||
}
|
||||
|
||||
confidentialClient, err := confidential.New("https://login.microsoftonline.com/"+tenantId, clientId, cred)
|
||||
if err != nil {
|
||||
// TODO: handle error
|
||||
@ -41,7 +41,8 @@ func handler(w http.ResponseWriter, r *http.Request) {
|
||||
result, err := confidentialClient.AcquireTokenSilent(ctx, scopes)
|
||||
if err != nil {
|
||||
// cache miss, authenticate with another AcquireToken... method
|
||||
result, err = confidentialClient.AcquireTokenByCredential(ctx, scopes)
|
||||
// result, err = confidentialClient.AcquireTokenByCredential(ctx, scopes)
|
||||
result, err = confidentialClient.AcquireTokenByAuthCode(ctx, queryParams["code"][0], redirectURI, scopes)
|
||||
if err != nil {
|
||||
// TODO: handle error
|
||||
}
|
||||
|
Reference in New Issue
Block a user