-
Notifications
You must be signed in to change notification settings - Fork 32
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Checkin distributables, generate docs #78
Conversation
appRouter.get(UrlUtils.getPathFromUrl(this.webAppAuthConfig.auth.frontChannelLogoutUri), (req, res, next) => { | ||
if (req.authContext.isAuthenticated()) { | ||
return req.authContext.logout({ | ||
postLogoutRedirectUri: "/", | ||
idpLogout: false | ||
})(req, res, next); | ||
} | ||
return res.status(401).send("Unauthorized"); | ||
}); |
Check failure
Code scanning / CodeQL
Missing rate limiting
appRouter.use((req, res, next) => { | ||
if (!req.authContext.isAuthenticated()) { | ||
return req.authContext.login({ | ||
postLoginRedirectUri: req.originalUrl, | ||
scopes: [], | ||
})(req, res, next); | ||
} | ||
return next(); | ||
}); |
Check failure
Code scanning / CodeQL
Missing rate limiting
appRouter.get(UrlUtils.UrlUtils.getPathFromUrl(this.webAppAuthConfig.auth.frontChannelLogoutUri), (req, res, next) => { | ||
if (req.authContext.isAuthenticated()) { | ||
return req.authContext.logout({ | ||
postLogoutRedirectUri: "/", | ||
idpLogout: false | ||
})(req, res, next); | ||
} | ||
return res.status(401).send("Unauthorized"); | ||
}); |
Check failure
Code scanning / CodeQL
Missing rate limiting
appRouter.use((req, res, next) => { | ||
if (!req.authContext.isAuthenticated()) { | ||
return req.authContext.login({ | ||
postLoginRedirectUri: req.originalUrl, | ||
scopes: [], | ||
})(req, res, next); | ||
} | ||
return next(); | ||
}); |
Check failure
Code scanning / CodeQL
Missing rate limiting
* @returns | ||
*/ | ||
static isB2CAuthority(authority) { | ||
return authority.includes("b2clogin.com/"); |
Check failure
Code scanning / CodeQL
Incomplete URL substring sanitization
* @returns | ||
*/ | ||
static isB2CAuthority(authority) { | ||
return authority.includes("b2clogin.com/"); |
Check failure
Code scanning / CodeQL
Incomplete URL substring sanitization
Pull Request
Purpose
Does this introduce a breaking change
Pull request type
What kind of change does this Pull Request introduce?
How to test
What to check
ex: verify that the following are valid:
Other Information