You've already forked oauth2-proxy
mirror of
https://github.com/oauth2-proxy/oauth2-proxy.git
synced 2025-06-17 00:17:40 +02:00
Corrects request endpoint (#1650)
* Fixes typo in repo endpoint * Update CHANGELOG.md * Fix the test to mock the correct endpoint Co-authored-by: Joel Speed <Joel.speed@hotmail.co.uk>
This commit is contained in:
@ -41,6 +41,7 @@ If you are using an architecture specific tag (ex: v7.2.1-arm64) you should move
|
|||||||
- [#1594](https://github.com/oauth2-proxy/oauth2-proxy/pull/1594) Release ARMv8 docker images (@braunsonm)
|
- [#1594](https://github.com/oauth2-proxy/oauth2-proxy/pull/1594) Release ARMv8 docker images (@braunsonm)
|
||||||
- [#1649](https://github.com/oauth2-proxy/oauth2-proxy/pull/1649) Return a 400 instead of a 500 when a request contains an invalid redirect target (@niksko)
|
- [#1649](https://github.com/oauth2-proxy/oauth2-proxy/pull/1649) Return a 400 instead of a 500 when a request contains an invalid redirect target (@niksko)
|
||||||
- [#1638](https://github.com/oauth2-proxy/oauth2-proxy/pull/1638) Implement configurable upstream timeout (@jacksgt)
|
- [#1638](https://github.com/oauth2-proxy/oauth2-proxy/pull/1638) Implement configurable upstream timeout (@jacksgt)
|
||||||
|
- [#1650](https://github.com/oauth2-proxy/oauth2-proxy/pull/1650) Fixed 500 when checking if user has repo (@adamsong)
|
||||||
- [#1635](https://github.com/oauth2-proxy/oauth2-proxy/pull/1635) Added description and unit tests for ipv6 address (@t-katsumura)
|
- [#1635](https://github.com/oauth2-proxy/oauth2-proxy/pull/1635) Added description and unit tests for ipv6 address (@t-katsumura)
|
||||||
|
|
||||||
# V7.2.1
|
# V7.2.1
|
||||||
|
@ -312,7 +312,7 @@ func (p *GitHubProvider) hasRepo(ctx context.Context, accessToken string) (bool,
|
|||||||
endpoint := &url.URL{
|
endpoint := &url.URL{
|
||||||
Scheme: p.ValidateURL.Scheme,
|
Scheme: p.ValidateURL.Scheme,
|
||||||
Host: p.ValidateURL.Host,
|
Host: p.ValidateURL.Host,
|
||||||
Path: path.Join(p.ValidateURL.Path, "/repo/", p.Repo),
|
Path: path.Join(p.ValidateURL.Path, "/repos/", p.Repo),
|
||||||
}
|
}
|
||||||
|
|
||||||
var repo repository
|
var repo repository
|
||||||
|
@ -34,7 +34,7 @@ func testGitHubProvider(hostname string, opts options.GitHubOptions) *GitHubProv
|
|||||||
|
|
||||||
func testGitHubBackend(payloads map[string][]string) *httptest.Server {
|
func testGitHubBackend(payloads map[string][]string) *httptest.Server {
|
||||||
pathToQueryMap := map[string][]string{
|
pathToQueryMap := map[string][]string{
|
||||||
"/repo/oauth2-proxy/oauth2-proxy": {""},
|
"/repos/oauth2-proxy/oauth2-proxy": {""},
|
||||||
"/repos/oauth2-proxy/oauth2-proxy/collaborators/mbland": {""},
|
"/repos/oauth2-proxy/oauth2-proxy/collaborators/mbland": {""},
|
||||||
"/user": {""},
|
"/user": {""},
|
||||||
"/user/emails": {""},
|
"/user/emails": {""},
|
||||||
@ -229,7 +229,7 @@ func TestGitHubProvider_getEmailWithWriteAccessToPrivateRepo(t *testing.T) {
|
|||||||
|
|
||||||
func TestGitHubProvider_getEmailWithNoAccessToPrivateRepo(t *testing.T) {
|
func TestGitHubProvider_getEmailWithNoAccessToPrivateRepo(t *testing.T) {
|
||||||
b := testGitHubBackend(map[string][]string{
|
b := testGitHubBackend(map[string][]string{
|
||||||
"/repo/oauth2-proxy/oauth2-proxy": {`{}`},
|
"/repos/oauth2-proxy/oauth2-proxy": {`{}`},
|
||||||
})
|
})
|
||||||
defer b.Close()
|
defer b.Close()
|
||||||
|
|
||||||
|
Reference in New Issue
Block a user