Skip to content

Commit d70d6b2

Browse files
Rename jkws_url to jwks_uri
1 parent 2215126 commit d70d6b2

File tree

2 files changed

+15
-10
lines changed

2 files changed

+15
-10
lines changed

deps/oauth2_client/src/oauth2_client.erl

Lines changed: 13 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -218,7 +218,7 @@ do_update_oauth_provider_endpoints_configuration(OAuthProvider) when
218218
List = get_env(key_config, []),
219219
ModifiedList = case OAuthProvider#oauth_provider.jwks_uri of
220220
undefined -> List;
221-
JwksEndPoint -> [{jwks_url, JwksEndPoint} | proplists:delete(jwks_url, List)]
221+
JwksEndPoint -> [{jwks_uri, JwksEndPoint} | proplists:delete(jwks_uri, List)]
222222
end,
223223
set_env(key_config, ModifiedList),
224224
rabbit_log:debug("Updated oauth_provider details: ~p ",
@@ -393,7 +393,7 @@ lookup_oauth_provider_from_keyconfig() ->
393393
id = root,
394394
issuer = Issuer,
395395
discovery_endpoint = DiscoverEndpoint,
396-
jwks_uri = maps:get(jwks_url, Map, undefined), %% jwks_url not uri . _url is the legacy name
396+
jwks_uri = maps:get(jwks_uri, Map, undefined),
397397
token_endpoint = get_env(token_endpoint),
398398
authorization_endpoint = get_env(authorization_endpoint),
399399
end_session_endpoint = get_env(end_session_endpoint),
@@ -437,15 +437,17 @@ extract_ssl_options_as_list(Map) ->
437437
++
438438
case maps:get(hostname_verification, Map, none) of
439439
wildcard ->
440-
[{customize_hostname_check, [{match_fun, public_key:pkix_verify_hostname_match_fun(https)}]}];
440+
[{customize_hostname_check, [{match_fun,
441+
public_key:pkix_verify_hostname_match_fun(https)}]}];
441442
none ->
442443
[]
443444
end.
444445

445446
% Replace peer_verification with verify to make it more consistent with other
446447
% ssl_options in RabbitMQ and Erlang's ssl options
447448
% Eventually, peer_verification will be removed. For now, both are allowed
448-
-spec get_verify_or_peer_verification(#{atom() => any()}, verify_none | verify_peer ) -> verify_none | verify_peer.
449+
-spec get_verify_or_peer_verification(#{atom() =>
450+
any()}, verify_none | verify_peer ) -> verify_none | verify_peer.
449451
get_verify_or_peer_verification(Ssl_options, Default) ->
450452
case maps:get(verify, Ssl_options, undefined) of
451453
undefined ->
@@ -464,7 +466,8 @@ lookup_oauth_provider_config(OAuth2ProviderId) ->
464466
undefined ->
465467
{error, {oauth_provider_not_found, OAuth2ProviderId}};
466468
OAuthProvider ->
467-
ensure_oauth_provider_has_id_property(OAuth2ProviderId, OAuthProvider)
469+
ensure_oauth_provider_has_id_property(OAuth2ProviderId,
470+
OAuthProvider)
468471
end;
469472
_ -> {error, invalid_oauth_provider_configuration}
470473
end.
@@ -535,8 +538,9 @@ get_timeout_of_default(Timeout) ->
535538
is_json(?CONTENT_JSON) -> true;
536539
is_json(_) -> false.
537540

538-
-spec decode_body(string(), string() | binary() | term()) -> 'false' | 'null' | 'true' |
539-
binary() | [any()] | number() | map() | {error, term()}.
541+
-spec decode_body(string(), string() | binary() | term()) ->
542+
'false' | 'null' | 'true' | binary() | [any()] | number() | map() |
543+
{error, term()}.
540544

541545
decode_body(_, []) -> [];
542546
decode_body(?CONTENT_JSON, Body) ->
@@ -615,7 +619,8 @@ format_ssl_options(TlsOptions) ->
615619
[] -> 0;
616620
Certs -> length(Certs)
617621
end,
618-
lists:flatten(io_lib:format("{verify: ~p, fail_if_no_peer_cert: ~p, crl_check: ~p, depth: ~p, cacertfile: ~p, cacerts(count): ~p }", [
622+
lists:flatten(io_lib:format("{verify: ~p, fail_if_no_peer_cert: ~p, " ++
623+
"crl_check: ~p, depth: ~p, cacertfile: ~p, cacerts(count): ~p }", [
619624
proplists:get_value(verify, TlsOptions),
620625
proplists:get_value(fail_if_no_peer_cert, TlsOptions),
621626
proplists:get_value(crl_check, TlsOptions),

deps/oauth2_client/test/system_SUITE.erl

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -198,7 +198,7 @@ configure_all_oauth_provider_settings(Config) ->
198198
OAuthProvider#oauth_provider.end_session_endpoint),
199199
application:set_env(rabbitmq_auth_backend_oauth2, authorization_endpoint,
200200
OAuthProvider#oauth_provider.authorization_endpoint),
201-
KeyConfig = [ { jwks_url, OAuthProvider#oauth_provider.jwks_uri } ] ++
201+
KeyConfig = [ { jwks_uri, OAuthProvider#oauth_provider.jwks_uri } ] ++
202202
case OAuthProvider#oauth_provider.ssl_options of
203203
undefined ->
204204
[];
@@ -474,7 +474,7 @@ verify_get_oauth_provider_returns_oauth_provider_from_key_config() ->
474474
oauth2_client:get_oauth_provider([issuer, token_endpoint, jwks_uri]),
475475
ExpectedIssuer = application:get_env(rabbitmq_auth_backend_oauth2, issuer, undefined),
476476
ExpectedTokenEndPoint = application:get_env(rabbitmq_auth_backend_oauth2, token_endpoint, undefined),
477-
ExpectedJwks_uri = proplists:get_value(jwks_url,
477+
ExpectedJwks_uri = proplists:get_value(jwks_uri,
478478
application:get_env(rabbitmq_auth_backend_oauth2, key_config, [])),
479479
?assertEqual(root, Id),
480480
?assertEqual(ExpectedIssuer, Issuer),

0 commit comments

Comments
 (0)