Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[18.0][MIG] auth_jwt: Migration to 18.0 #752

Open
wants to merge 31 commits into
base: 18.0
Choose a base branch
from

Conversation

dnplkndll
Copy link

No description provided.

@dnplkndll dnplkndll changed the title [18.0][MIG] auth_jwt [18.0][MIG] auth_jwt: Migration 18.0 Jan 16, 2025
@dnplkndll dnplkndll changed the title [18.0][MIG] auth_jwt: Migration 18.0 [18.0][MIG] auth_jwt: Migration to 18.0 Jan 16, 2025
@lmignon
Copy link
Contributor

lmignon commented Jan 17, 2025

/ocabot migration auth_jwt

@sbidoul
Copy link
Member

sbidoul commented Jan 18, 2025

Thanks for working on this. Could you re-do the migration based on the merged 17.0 version? Your migration commit is ok, but the history of the 17.0 branch you started with is a bit messy and has been cleaned-up since.

Copy link

@kobros-tech kobros-tech left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@lmignon
@sbidoul

could you review this PR, we have merged migration for 17.0 and we can migrate it for 18.0

Copy link

@ChuwenSun ChuwenSun left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good to me.

sbidoul and others added 16 commits February 14, 2025 21:02
Because it allows validating with a list of audiences.
Make it work with pyjwt.
This method is useful for public endpoints that need
to work for anonymous user, but can be enhanced when
an authenticated user is know.

A typical use case is a "add to cart" enpoint that can
work for anonymous users, but can be enhanced by
binding the cart to a known customer when the authenticated
user is known.
The unit tests were broken for non-functional reasons (interaction with
the mock) and is easier to implement as integration test.
sbidoul and others added 15 commits February 14, 2025 21:02
Distinguish errors that lead to a 401
from internal configuration errors.
Extract _parse_bearer_authorization function for easier reuse by fastapi_auth_jwt
Currently translated at 100.0% (64 of 64 strings)

Translation: server-auth-16.0/server-auth-16.0-auth_jwt
Translate-URL: https://translation.odoo-community.org/projects/server-auth-16-0/server-auth-16-0-auth_jwt/es/
Currently translated at 89.0% (57 of 64 strings)

Translation: server-auth-16.0/server-auth-16.0-auth_jwt
Translate-URL: https://translation.odoo-community.org/projects/server-auth-16-0/server-auth-16-0-auth_jwt/it/
Currently translated at 100.0% (64 of 64 strings)

Translation: server-auth-16.0/server-auth-16.0-auth_jwt
Translate-URL: https://translation.odoo-community.org/projects/server-auth-16-0/server-auth-16-0-auth_jwt/it/
Currently translated at 100.0% (64 of 64 strings)

Translation: server-auth-16.0/server-auth-16.0-auth_jwt
Translate-URL: https://translation.odoo-community.org/projects/server-auth-16-0/server-auth-16-0-auth_jwt/it/
@dnplkndll
Copy link
Author

Thanks for working on this. Could you re-do the migration based on the merged 17.0 version? Your migration commit is ok, but the history of the 17.0 branch you started with is a bit messy and has been cleaned-up since.

@sbidoul rebased and squashed the bot commits.

@OCA-git-bot
Copy link
Contributor

This PR has the approved label and has been created more than 5 days ago. It should therefore be ready to merge by a maintainer (or a PSC member if the concerned addon has no declared maintainer). 🤖

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.