Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support custom RequestMatcher in WebAuthn filters #16517

Open
wants to merge 5 commits into
base: main
Choose a base branch
from

Conversation

leshalv
Copy link
Contributor

@leshalv leshalv commented Feb 1, 2025

No description provided.

@spring-projects-issues spring-projects-issues added the status: waiting-for-triage An issue we've not yet triaged label Feb 1, 2025
Copy link
Contributor

@jzheaux jzheaux left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hi, @leshalv, and thanks for this PR. I've left a inline checklist of JavaDoc polishes. Also, will you please add tests for each of these setter methods that confirm:

  1. They error appropriately when null is given
  2. The filter appropriately uses the provided request matcher.

Note that for the second test, the filter doesn't necessarily need to get triggered; it simply needs to be clear that the given requestMatcher was used to match the request.

@jzheaux jzheaux self-assigned this Feb 3, 2025
@jzheaux jzheaux added the type: enhancement A general enhancement label Feb 3, 2025
@leshalv leshalv changed the title Add setRequestMatcher to WebAuthn Add setRequestMatcher to the relevant filters. Feb 4, 2025
@jzheaux jzheaux changed the title Add setRequestMatcher to the relevant filters. Add setRequestMatcher to WebAuthn filters Feb 4, 2025
@jzheaux jzheaux changed the title Add setRequestMatcher to WebAuthn filters Support custom RequestMatcher in WebAuthn filters Feb 4, 2025
@jzheaux jzheaux added in: web An issue in web modules (web, webmvc) and removed status: waiting-for-triage An issue we've not yet triaged labels Feb 4, 2025
@leshalv
Copy link
Contributor Author

leshalv commented Feb 17, 2025

Is there anything else that needs to be changed now? @jzheaux

@jzheaux
Copy link
Contributor

jzheaux commented Feb 18, 2025

Thanks for the updates, @leshalv! Yes, please add the tests I described here: #16517 (review)

@leshalv
Copy link
Contributor Author

leshalv commented Feb 19, 2025

@jzheaux Take a look

Copy link
Contributor

@jzheaux jzheaux left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is coming along, @leshalv! Thanks for the updates. I've left some additional feedback inline to further improve the tests.

jzheaux pushed a commit to leshalv/spring-security that referenced this pull request Feb 25, 2025
jzheaux pushed a commit to leshalv/spring-security that referenced this pull request Feb 25, 2025
@jzheaux
Copy link
Contributor

jzheaux commented Feb 25, 2025

Nice work, @leshalv! Note that I've rebased your branch and squashed the commits down to one.

The last thing that is needed is for you to do is correct the commit signature. It appears your git username and email don't match the signature:

Author: topiam <[email protected]>
Date:   Sat Feb 1 23:04:04 2025 +0800

...

Signed-off-by: smallbun <[email protected]>

The author and the signature need to be the same. Because you are working on main, your next pull will require a hard reset. If your fork is mapped to origin, then the command is: git fetch origin && git reset --hard origin/main

@leshalv leshalv force-pushed the main branch 3 times, most recently from f4fa2ff to 929b4a8 Compare February 25, 2025 01:49
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
in: web An issue in web modules (web, webmvc) type: enhancement A general enhancement
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants