Support email usernames in API access validation #63
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Change the JSON schema to accept
.
,@
,-
, and+
, in usernames.Description
In our LDAP implementation, our email address can be used in the place of the username, and that includes both
.
and@
in them. Of course, an email can have other symbols still, but those two cover the vast majority of cases already.So, to use
DictionaryAPIAccessControl
authorization together with our LDAP-based authentication, this change is welcome. Also, I can't see how accepting those characters could be an issue, though I know next to nothing about that stuff, so please boop me if I'm wrong 🙂Summary of Changes for Release Notes
Added
Added
.
,@
,-
, and+
, to the allowed character list ofBasicAPIAccessControl
andDictionaryAPIAccessControl
username validations.How Has This Been Tested?
We tested this change in our local test deploy of HTTP server, and after those changes, we managed to successfully authenticate a user using their email address.