Skip to content

Allow overriding the maximum length when parsing refresh tokens #1454

Allow overriding the maximum length when parsing refresh tokens

Allow overriding the maximum length when parsing refresh tokens #1454

# This was generated by tool. Edits will be overwritten.
name: access-token-management/ci
on:
workflow_dispatch:
push:
paths:
- .github/workflows/access-token-management-**
- access-token-management/**
- .editorconfig
- Directory.Packages.props
- global.json
- src.props
- test.props
pull_request:
paths:
- .github/workflows/access-token-management-**
- access-token-management/**
- .editorconfig
- Directory.Packages.props
- global.json
- src.props
- test.props
env:
DOTNET_NOLOGO: true
DOTNET_CLI_TELEMETRY_OPTOUT: true
jobs:
build:
name: Build
runs-on: ubuntu-latest
permissions:
actions: read
checks: write
contents: read
packages: write
defaults:
run:
shell: bash
working-directory: access-token-management
timeout-minutes: 15
steps:
- name: Checkout
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683
with:
fetch-depth: 0
- name: Setup .NET
uses: actions/setup-dotnet@d4c94342e560b34958eacfc5d055d21461ed1c5d
with:
global-json-file: global.json
- name: Restore
run: dotnet restore *.slnf
- name: Verify Formatting
run: dotnet format *.slnf --verify-no-changes --no-restore
- name: Build - AccessTokenManagement.Tests
run: dotnet build -c Release test/AccessTokenManagement.Tests
- name: Test - AccessTokenManagement.Tests
run: >-
for tfm in net10.0; do
dotnet run --project test/AccessTokenManagement.Tests -c Release --no-build -f $tfm -- \
--report-xunit-trx --report-xunit-trx-filename AccessTokenManagement.Tests-$tfm.trx \
--coverage --coverage-output-format cobertura \
--coverage-output AccessTokenManagement.Tests-$tfm.cobertura.xml
done
- name: Test report
if: success() || failure()
uses: actions/upload-artifact@b4b15b8c7c6ac21ea08fcf65892d2ee8f75cf882
with:
name: test-results
path: access-token-management/test/AccessTokenManagement.Tests/TestResults/AccessTokenManagement.Tests-net10.0.trx
retention-days: 5
- name: Tool restore
run: dotnet tool restore
- name: Pack AccessTokenManagement
run: dotnet pack -c Release src/AccessTokenManagement -o artifacts
- name: Pack AccessTokenManagement.OpenIdConnect
run: dotnet pack -c Release src/AccessTokenManagement.OpenIdConnect -o artifacts
- name: Sign packages
if: github.event_name == 'push'
run: |-
for file in artifacts/*.nupkg; do
dotnet NuGetKeyVaultSignTool sign "$file" --file-digest sha256 --timestamp-rfc3161 http://timestamp.digicert.com --azure-key-vault-url https://duendecodesigninghsm.vault.azure.net/ --azure-key-vault-client-id 18e3de68-2556-4345-8076-a46fad79e474 --azure-key-vault-tenant-id ed3089f0-5401-4758-90eb-066124e2d907 --azure-key-vault-client-secret ${{ secrets.SignClientSecret }} --azure-key-vault-certificate NuGetPackageSigning
done
- name: Push packages to GitHub
if: github.ref == 'refs/heads/main'
run: dotnet nuget push artifacts/*.nupkg --source https://nuget.pkg.github.com/DuendeSoftware/index.json --api-key ${{ secrets.GITHUB_TOKEN }} --skip-duplicate
env:
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
NUGET_AUTH_TOKEN: ${{ secrets.GITHUB_TOKEN }}
- name: Upload Artifacts
if: github.event_name == 'push'
uses: actions/upload-artifact@b4b15b8c7c6ac21ea08fcf65892d2ee8f75cf882
with:
name: artifacts
path: access-token-management/artifacts/*.nupkg
overwrite: true
retention-days: 15