Skip to content

FIC+OIDC credential provider#3255

Merged
jmprieur merged 35 commits intomasterfrom
jmprieur/protoFicPlusOidc
Mar 4, 2025
Merged

FIC+OIDC credential provider#3255
jmprieur merged 35 commits intomasterfrom
jmprieur/protoFicPlusOidc

Conversation

@jmprieur
Copy link
Copy Markdown
Collaborator

Proto for FIC+OIDC

@jmprieur jmprieur marked this pull request as ready for review February 25, 2025 23:18
@jmprieur jmprieur requested a review from a team as a code owner February 25, 2025 23:18
@jmprieur
Copy link
Copy Markdown
Collaborator Author

@bgavrilMS
What are the next steps? do we want to have a new CredentialSource? and new property in CredentialDescription?

@bgavrilMS bgavrilMS force-pushed the jmprieur/protoFicPlusOidc branch from 90ddea8 to f91691d Compare February 28, 2025 16:51
@github-actions
Copy link
Copy Markdown

Summary

Summary
Generated on: 2/28/2025 - 5:06:20 PM
Coverage date: 2/28/2025 - 5:05:24 PM - 2/28/2025 - 5:06:14 PM
Parser: MultiReport (3x Cobertura)
Assemblies: 0
Classes: 0
Files: 0
Line coverage:
Covered lines: 0
Uncovered lines: 0
Coverable lines: 0
Total lines: 0
Covered branches: 0
Total branches: 0
Method coverage: Feature is only available for sponsors

Coverage

No assemblies have been covered.

jmprieur and others added 3 commits March 3, 2025 16:51
 - `GetValue(key, out IConfidentialClientApplication? application) && application != null)` was not right because if `TryGetValue` returns `false`, application will necessarilly be **null**. So the condition `!TryGetValue(...) && application != null` can never be true.
- which implies that we'll have a race condition: `BuildConfidentialClientApplicationAsync to be executed multiple times concurrently for the same key. The pattern used here:`

The propsed code with a semaphore per key released on all cases should prevents multiple concurrent builds while still allowing concurrent access to different applications.
Moves the xcloud fix code to a new assembly
Fixes #3243 (Certr otation test bug due to SFI)
Adds a TestOnly namespace to reset the TokenAcquirerFactory
Co-authored-by: Jean-Marc Prieur <jmprieur@microsoft.com>
@jmprieur jmprieur changed the title Proto for FIC+OIDC FIC+OIDC credential provider Mar 3, 2025
This was referenced Dec 5, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants