forked from TrueCloudLab/certificates
Revert using preferred_username
It might present a security issue if the users can change this value for themselves. Needs further investigation
This commit is contained in:
parent
e5b206c1de
commit
bb1e051b27
1 changed files with 2 additions and 1 deletions
|
@ -389,7 +389,8 @@ func (o *OIDC) AuthorizeSSHSign(ctx context.Context, token string) ([]SignOption
|
||||||
|
|
||||||
// Get the identity using either the default identityFunc or one injected
|
// Get the identity using either the default identityFunc or one injected
|
||||||
// externally. Note that the PreferredUsername might be empty.
|
// externally. Note that the PreferredUsername might be empty.
|
||||||
iden, err := o.getIdentityFunc(ctx, o, claims.Email, claims.PreferredUsername)
|
// TBD: Would preferred_username present a safety issue here?
|
||||||
|
iden, err := o.getIdentityFunc(ctx, o, claims.Email)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, errs.Wrap(http.StatusInternalServerError, err, "oidc.AuthorizeSSHSign")
|
return nil, errs.Wrap(http.StatusInternalServerError, err, "oidc.AuthorizeSSHSign")
|
||||||
}
|
}
|
||||||
|
|
Loading…
Add table
Reference in a new issue