projects
/
arvados.git
/ blobdiff
summary
|
shortlog
|
log
|
commit
|
commitdiff
|
tree
raw
|
inline
| side by side
Fix panic when OIDC provider returns no name claim.
[arvados.git]
/
lib
/
controller
/
localdb
/
login_testuser.go
diff --git
a/lib/controller/localdb/login_testuser.go
b/lib/controller/localdb/login_testuser.go
index e9c6e82f6e2c8c6dac3255fce957ff28d199505f..c567a0668344b6eadc2d439f36a94147d3ae453f 100644
(file)
--- a/
lib/controller/localdb/login_testuser.go
+++ b/
lib/controller/localdb/login_testuser.go
@@
-17,8
+17,8
@@
import (
)
type testLoginController struct {
)
type testLoginController struct {
- Cluster
*arvados.Cluster
- RailsProxy *railsProxy
+ Cluster *arvados.Cluster
+ Parent *Conn
}
func (ctrl *testLoginController) Logout(ctx context.Context, opts arvados.LogoutOptions) (arvados.LogoutResponse, error) {
}
func (ctrl *testLoginController) Logout(ctx context.Context, opts arvados.LogoutOptions) (arvados.LogoutResponse, error) {
@@
-45,7
+45,7
@@
func (ctrl *testLoginController) UserAuthenticate(ctx context.Context, opts arva
"username": username,
"email": user.Email,
}).Debug("test authentication succeeded")
"username": username,
"email": user.Email,
}).Debug("test authentication succeeded")
- return c
reateAPIClientAuthorization(ctx, ctrl.RailsProxy
, ctrl.Cluster.SystemRootToken, rpc.UserSessionAuthInfo{
+ return c
trl.Parent.CreateAPIClientAuthorization(ctx
, ctrl.Cluster.SystemRootToken, rpc.UserSessionAuthInfo{
Username: username,
Email: user.Email,
})
Username: username,
Email: user.Email,
})
@@
-82,7
+82,7
@@
const loginform = `
redir += '?'
}
const respj = await resp.json()
redir += '?'
}
const respj = await resp.json()
- document.location = redir + "api_token=" + respj.api_token
+ document.location = redir + "api_token=
v2/" + respj.uuid + "/
" + respj.api_token
}
</script>
</head>
}
</script>
</head>