You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The current approach relies on a fixed model object, while ESACO should be flexible enough to allow the validation of required claims and expose any other claim returned by the upstream introspection endpoint.
The text was updated successfully, but these errors were encountered:
Issue:
Esaco should not hide token introspection results claims
The current approach relies on a fixed model object,
while ESACO should be flexible enough to allow the
validation of required claims and expose any other claim
returned by the upstream introspection endpoint.
Solution:
- Splitted TokenInfoController into TokenInfoController,
TokenIntrospectController and TokenControllerUtils (to prevent
duplicated code)
- Re-arranged the logic on Services and Controllers to not
disserialize the introspection response into a json object,
pass it as json string to avoid restriction of parameters
- Adapt the tests
- Changed Jenkinsfile to work accordingly
- Fixed SonarQube bot reported issues
Resolves: indigo-iam#12
Issue:
Esaco should not hide token introspection results claims
The current approach relies on a fixed model object,
while ESACO should be flexible enough to allow the
validation of required claims and expose any other claim
returned by the upstream introspection endpoint.
Solution:
- Splitted TokenInfoController into TokenInfoController,
TokenIntrospectController and TokenControllerUtils (to prevent
duplicated code)
- Re-arranged the logic on Services and Controllers to not
disserialize the introspection response into a json object,
pass it as json string to avoid restriction of parameters
- Adapt the tests
- Changed Jenkinsfile to work accordingly
- Fixed SonarQube bot reported issues
- Fixed PR change requests
Resolves: indigo-iam#12
The current approach relies on a fixed model object, while ESACO should be flexible enough to allow the validation of required claims and expose any other claim returned by the upstream introspection endpoint.
The text was updated successfully, but these errors were encountered: