-
Notifications
You must be signed in to change notification settings - Fork 371
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Configurable persistence of friendly name to KV #7572
Conversation
♻️ PR Preview 061bf05 has been successfully destroyed since this PR has been closed. 🤖 By surge-preview |
@Isan-Rivkin, I've refactored the implementation to align it with the new design. I would appreciate your re-review. Thanks! 🙏🏻 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
minor comments :)
api/authorization.yml
Outdated
put: | ||
tags: | ||
- auth | ||
operationId: updateFriendlyName |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Can we align both the swagger and the auth service to have the same name?
e.g updateUserFriendlyName
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Done
docs/reference/configuration.md
Outdated
@@ -101,11 +101,13 @@ This reference uses `.` to denote the nesting of values. | |||
* `auth.cookie_auth_verification.default_initial_groups` (string[] : [])` - By default, users will be assigned to these groups | |||
* `auth.cookie_auth_verification.initial_groups_claim_name` `(string[] : [])` - Use this claim from the ID token to provide the initial group for new users. This will take priority if `auth.cookie_auth_verification.default_initial_groups` is also set. | |||
* `auth.cookie_auth_verification.friendly_name_claim_name` `(string[] : )` - If specified, the value from the claim with this name will be used as the user's display name. | |||
* `auth.cookie_auth_verification.persist_friendly_name` `(string : false)` - If set to `true`, the friendly name is persisted to the KV store and can be displayed in the user list. This is meant to be used in conjunction with `auth.oidc.friendly_name_claim_name`. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
* `auth.cookie_auth_verification.persist_friendly_name` `(string : false)` - If set to `true`, the friendly name is persisted to the KV store and can be displayed in the user list. This is meant to be used in conjunction with `auth.oidc.friendly_name_claim_name`. | |
* `auth.cookie_auth_verification.persist_friendly_name` `(string : false)` - If set to `true`, the friendly name is persisted to the KV store and can be displayed in the user list. This is meant to be used in conjunction with `auth.cookie_auth_verification.friendly_name_claim_name`. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Fixed
pkg/api/auth_middleware.go
Outdated
func enhanceWithFriendlyName(ctx context.Context, user *model.User, friendlyName string, persistFriendlyName bool, authService auth.Service, logger logging.Logger) *model.User { | ||
if friendlyName != "" { | ||
user.FriendlyName = &friendlyName | ||
if persistFriendlyName && swag.StringValue(user.FriendlyName) != friendlyName { | ||
err := authService.UpdateUserFriendlyName(ctx, user.Username, friendlyName) | ||
if err != nil { | ||
logger.WithError(err).Error("update user friendly name") | ||
} | ||
} | ||
} | ||
return user | ||
} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
func enhanceWithFriendlyName(ctx context.Context, user *model.User, friendlyName string, persistFriendlyName bool, authService auth.Service, logger logging.Logger) *model.User { | |
if friendlyName != "" { | |
user.FriendlyName = &friendlyName | |
if persistFriendlyName && swag.StringValue(user.FriendlyName) != friendlyName { | |
err := authService.UpdateUserFriendlyName(ctx, user.Username, friendlyName) | |
if err != nil { | |
logger.WithError(err).Error("update user friendly name") | |
} | |
} | |
} | |
return user | |
} | |
func enhanceWithFriendlyName(ctx context.Context, user *model.User, friendlyName string, persistFriendlyName bool, authService auth.Service, logger logging.Logger) *model.User { | |
if swag.StringValue(user.FriendlyName) != friendlyName { | |
user.FriendlyName = swag.String(friendlyName) | |
if persistFriendlyName { | |
if err := authService.UpdateUserFriendlyName(ctx, user.Username, friendlyName); err != nil { | |
logger.WithError(err).Error("failed to update user friendly name") | |
} | |
} | |
} | |
return user | |
} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Done
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM!
* Configurable persistence of friendly name to KV * Update docs and sample config with new property
Closes #7562
Change Description
Background
Please see the linked issue for context.
New Feature
This PR adds two new configuration flags with a default value of
false
:cookie_auth_verification.persist_friendly_name
- SAML-based auth APIoidc.persist_friendly_name
- OIDC-based auth APIWhen this flag is set to
true
, the friendly name claim pointed to byfriendly_name_claim_name
is saved with the user's record in the KV store. Each of the flags is only relevant to its respective authentication method.Before:

After:

Note: domain prefix intentionally removed.
Testing Details
Both positive and negative tests were done manually.
Breaking Change?
None.