-
Notifications
You must be signed in to change notification settings - Fork 95
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow SecurityRealm#getUserIdStrategy to be customizable #493
Allow SecurityRealm#getUserIdStrategy to be customizable #493
Conversation
Codecov ReportAll modified and coverable lines are covered by tests ✅
Additional details and impacted files@@ Coverage Diff @@
## master #493 +/- ##
============================================
+ Coverage 71.73% 72.05% +0.32%
- Complexity 222 226 +4
============================================
Files 17 17
Lines 1033 1045 +12
Branches 148 148
============================================
+ Hits 741 753 +12
Misses 201 201
Partials 91 91 ☔ View full report in Codecov by Sentry. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
There is also the group strategy to cover.
There is code with all of this tested and ready that would conflict, so would recommend waiting for that rather than duplicating
Hi @jtnord - thanks for having a look at this PR.
Unfortunately, I do not understand your remark. Do you mean: There is a not-yet-pushed branch which will cover the customizable ID strategy? |
there is code that covers the id strategy changes for both users and groups that has not been pushed but will be shortly |
Ok. Good to know. Looking forward to see the feature soon. I assume, I can close this PR, right?! |
Already implemented but not yet pushed. |
@eva-mueller-coremedia do you have a Jenkins Jira ID? |
@jtnord No, I have no Jenkins Jira ID |
@eva-mueller-coremedia would you mind signing up at https://accounts.jenkins.io/signup? |
Done... My user name is |
@eva-mueller-coremedia can you perform a login on Jira, this is needed so that Jira sees your account. Appologies, I did not realize this was a necessary step. |
Successfully logged in... |
@jtnord - thanks for sharing. Looking forward to see the solution in a release! Thanks a lot. |
Allow SecurityRealm#getUserIdStrategy to be customizable. This way, the plugin can be aligned with the ID strategy of the configured Identity Provider.
This is necessary, when the configured Identity Provider works with case-sensitive usernames. The Jenkins default is
case-insensitive
. The default leads to unwanted behaviour, when the configured Identity Provider hascase-sensitive
usernames, i.e., if a user with nametest-user
logs in, then a new log-in by the userTest-User
will return the data of usertest-user
.Testing done
PluginTest.java
to cover the case-sensitive and case-insensitive case.Submitter checklist