-
Notifications
You must be signed in to change notification settings - Fork 663
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
dynamic oidc registration #8350
Conversation
d853a0e
to
6c0a397
Compare
6c0a397
to
4d150d8
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks good to me! 👍
@@ -35,6 +36,11 @@ void AbstractCredentials::setAccount(Account *account) | |||
_account = account; | |||
} | |||
|
|||
QString AbstractCredentials::keychainServerWhideKey(Account *acc, const QString &key) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Little typo here: …WhideKey
vs …WideKey
.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Last night I also thought about the fact that we can clash here if two accounts start the process at the same time...
Which is a reason against ServerWide keys, but during registration I don't know the username yet, if I use a uuid assigned to the account, I would need cleanup during account removal and.....
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
4d150d8
to
7f45934
Compare
Kudos, SonarCloud Quality Gate passed! |
No description provided.