Uh oh!
There was an error while loading.Please reload this page.
- Notifications
You must be signed in to change notification settings - Fork9.7k
[Security] Fix loading user from UserBadge#51104
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to ourterms of service andprivacy statement. We’ll occasionally send you account related emails.
Already on GitHub?Sign in to your account
Uh oh!
There was an error while loading.Please reload this page.
Conversation
carsonbot commentedJul 25, 2023
Hey! I see that this is your first PR. That is great! Welcome! Symfony has acontribution guide which I suggest you to read. In short:
Review the GitHub status checks of your pull request and try to solve the reported issues. If some tests are failing, try to see if they are failing because of this change. When two Symfony core team members approve this change, it will be merged and you will become an official Symfony contributor! I am going to sit back now and wait for the reviews. Cheers! Carsonbot |
6f6bc12 to99a217fCompareguillaumesmo commentedJul 25, 2023 • edited
Loading Uh oh!
There was an error while loading.Please reload this page.
edited
Uh oh!
There was an error while loading.Please reload this page.
The fix is less clean than expected because the new OIDC feature relies on this bug. The Badge user loader used to have priority over the firewall user provider. This was changed so that the OIDC Badge user loader only kicks in when no user provider is set (not sure how, however). So the priorities are now as follows:
Alternative solutions:
|
nicolas-grekas commentedJul 26, 2023
Can you add a test case please? @vincentchalamon can you have a look please? |
vincentchalamon left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others.Learn more.
Nice catch! (and sorry for the bug introduced in my PR)
In addition to my review, can you also add a non-regression functional test onAccessTokenTest please?
Uh oh!
There was an error while loading.Please reload this page.
Uh oh!
There was an error while loading.Please reload this page.
src/Symfony/Component/Security/Http/Authenticator/FallbackUserLoader.php OutdatedShow resolvedHide resolved
Uh oh!
There was an error while loading.Please reload this page.
src/Symfony/Component/Security/Http/Authenticator/FallbackUserLoader.php OutdatedShow resolvedHide resolved
Uh oh!
There was an error while loading.Please reload this page.
AccessTokenAuthenticatorguillaumesmo commentedAug 23, 2023
Hi all, what can I do to move this PR forward? |
nicolas-grekas commentedAug 23, 2023
"BC break" is not a proper description when fixing a regression. It doesn't tell which case is solved. |
AccessTokenAuthenticatorguillaumesmo commentedAug 23, 2023
Sure, done |
wouterj left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others.Learn more.
Looks good to me.
fabpot commentedAug 25, 2023
Thank you@guillaumesmo. |
This PR was merged into the 6.3 branch.Discussion----------[Security] Fix security tests| Q | A| ------------- | ---| Branch? | 6.3| Bug fix? | yes| New feature? | no| Deprecations? | no| Tickets | Follows#51622| License | MIT| Doc PR | -Related to issue#51104, after it security bundle at least requires `symfony/security-http:6.3.4` to keep the tests is greenCommits-------26cff6c Fix security tests
Uh oh!
There was an error while loading.Please reload this page.
Fixed a breaking change fromhttps://github.com/symfony/symfony/pull/48272/files#diff-de9707bb338188f62878f2ebd42e7a7bf9547f6d0bf07a4fcd9c386c263c601b