Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

correctly handle path escaping for connector IDs #2290

Merged
merged 3 commits into from
May 31, 2022

Conversation

bobcallaway
Copy link
Contributor

@bobcallaway bobcallaway commented Oct 1, 2021

Fixes: #2289

Signed-off-by: Bob Callaway bob.callaway@gmail.com

Overview

What this PR does / why we need it

Special notes for your reviewer

Does this PR introduce a user-facing change?

Correctly handle path escaping for connector IDs

Signed-off-by: Bob Callaway <bob.callaway@gmail.com>
@nabokihms nabokihms added this to the v2.31.0 milestone Oct 4, 2021
Signed-off-by: Bob Callaway <bob.callaway@gmail.com>
@bobcallaway
Copy link
Contributor Author

@nabokihms any update on the release date for this? I appreciate any help in nudging this along. TIA!

@nabokihms nabokihms self-requested a review November 11, 2021 20:35
Copy link
Member

@nabokihms nabokihms left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Good catch! Thank you a lot. I have only one moment to discuss, and then we will be able to move further with it.

server/server.go Show resolved Hide resolved
@sagikazarmark
Copy link
Member

As far as I can tell there are changes requested, so moving to next release.

@sagikazarmark sagikazarmark modified the milestones: v2.31.0, v2.32.0 Feb 8, 2022
@sagikazarmark
Copy link
Member

@bobcallaway @nabokihms any update about the status of this PR? From what I can tell there is a debate about the implementation.

@sagikazarmark sagikazarmark modified the milestones: v2.32.0, v2.33.0 May 30, 2022
@nabokihms nabokihms self-requested a review May 30, 2022 14:10
@nabokihms
Copy link
Member

We can still accept the current implementation. The debate is about details o internal component implementation and only about cosmetics.

@bobcallaway, I think we can accept this PR as is, yet rebasing the branch is still required.

@bobcallaway
Copy link
Contributor Author

ok, i will rebase it then

Copy link
Member

@nabokihms nabokihms left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thank you for your contribution.

@nabokihms nabokihms modified the milestones: v2.33.0, v2.32.0 May 31, 2022
@nabokihms nabokihms merged commit b6cc099 into dexidp:master May 31, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Connectors that have IDs with URL-unsafe characters cannot be used successfully
3 participants