-
Notifications
You must be signed in to change notification settings - Fork 48
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
PXP-6617 Remove scopes from aud claim in tokens #839
Merged
Merged
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
The style in this PR agrees with This formatting comment was generated automatically by a script in uc-cdis/wool. |
Pull Request Test Coverage Report for Build 11137
💛 - Coveralls |
vpsx
force-pushed
the
fix/jwt-aud
branch
2 times, most recently
from
September 23, 2020 21:43
b46f5cb
to
69da6dd
Compare
This pull request fixes 1 alert when merging 69da6dd into ed8b837 - view on LGTM.com fixed alerts:
|
This pull request fixes 1 alert when merging 363a4a5 into 50ff568 - view on LGTM.com fixed alerts:
|
vpsx
force-pushed
the
fix/jwt-aud
branch
2 times, most recently
from
April 29, 2021 22:00
de3694a
to
9416236
Compare
This was referenced May 26, 2021
* Don't pass scope to audiences arg in generate_token_response * In generate_id_token itself: * Don't append to audiences itself; instead make a copy * Check if client_id is None * Don't include aud claim in token if aud is empty
* New scope arg in validate_jwt defaults to {'openid'} but allows None * No longer use aud claim for scopes
* add separate scope claim to id, refresh tkns (already in access tkns) * rm scopes from aud claim in all tokens * set aud claim to client_id in all oidc tokens * also do all of the above for user API key * update docstrings some fence.jwt.token functions
* see TECHDEBT.md for context * also rm unused has_oauth import
* previously passed 'openid' only to appease validation code, bc using aud for scopes
This was referenced Sep 23, 2021
This was referenced Oct 19, 2021
This was referenced Nov 29, 2021
This was referenced Mar 18, 2022
This was referenced Mar 29, 2022
This was referenced Apr 30, 2022
This was referenced Jun 23, 2022
This was referenced Dec 18, 2023
Open
Open
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Remove scopes from aud claim in Fence-issued tokens. Add custom scope claim for scopes, along with custom validation. Use and validate aud claim as originally intended. (Previously, the aud claim was being used for both audiences and scopes, and Fence/authutils had custom validation logic for the aud claim.)
Greater detail in the commit messages.
For a short definition of the aud claim see here.
Requires these changes to authutils: uc-cdis/authutils#47
New Features
Breaking Changes
Bug Fixes
Improvements
Dependency updates
Requires authutils 6.0.1.
Deployment changes