Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[ARXIVCE-2684] upstream develop to master #326

Merged
merged 38 commits into from
Oct 16, 2024
Merged

[ARXIVCE-2684] upstream develop to master #326

merged 38 commits into from
Oct 16, 2024

Conversation

dginev
Copy link
Contributor

@dginev dginev commented Oct 16, 2024

PR brings #299 and #325 from develop to master

…er buffer size is 4k, and the claim == token being bloated is not a good idea.
…rovide alternate logout URL.

claims gets id_token property.
2 - user_claims.py - token needs more diet. Gave up on including access and id tokens in the secret part. Only encrypt the user's property part. Access token is only needed for talking to Keycloak, and payload is for us.
3. Creating tapir session needs transaction. It is adding the tapir session successfully.
I'm not understanding why Keycloak made account has no "aud" while using legacy auth has it. In any rate, I think we don't care where the accounts come from.

Token pack/unpack was totally busted, and now fixed.
…toke for it. The payload size is a bit tight.
User claim's user ID "may not be integer" in rare occasion so be defensive.

 Fix the refresh token handling.
… This saves about 1k in size.

validate_access_token may not be RSA key. This isn't implementing the other key types but needs some research that which key type is the smallest.
@dginev dginev requested a review from a team October 16, 2024 15:54
@dginev dginev merged commit bb4edc4 into master Oct 16, 2024
1 check passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants