Skip to content

Fix: SSO checks report 'not configured' instead of 'NOT logged in' when SSO type is absent#82

Open
bigdoodr wants to merge 1 commit intodan-snelson:bugfix/81from
bigdoodr:bugfix/81
Open

Fix: SSO checks report 'not configured' instead of 'NOT logged in' when SSO type is absent#82
bigdoodr wants to merge 1 commit intodan-snelson:bugfix/81from
bigdoodr:bugfix/81

Conversation

@bigdoodr
Copy link
Contributor

Addresses the companion case to #81 where SSO checks display "NOT logged in" results when a particular SSO type isn't configured on the machine.

Changes:

  • Added file-existence check alongside xmllint, so a missing or empty plist falls through to "Kerberos SSO not configured" rather than "NOT logged in"
  • Changed Kerberos SSOe fallback message from "${loggedInUser} NOT logged in" to "Kerberos SSO not configured"
  • Changed Platform SSOe fallback from "${loggedInUser} NOT logged in" to "Platform SSO not configured"

Tested against:

  • PSSO-active / Kerberos-inactive machine: previously showed first.last NOT logged in, now shows Kerberos SSO not configured
  • Kerberos-active / PSSO-inactive machine: previously showed netID NOT logged in, now shows Platform SSO not configured

Added a file-existence check alongside xmllint, so a missing or empty plist cleanly falls through to "Kerberos SSO not configured" rather than "NOT logged in"
Changed the Kerberos fallback message from "${loggedInUser} NOT logged in" to "Kerberos SSO not configured" for the invalid-plist case
Changed the Platform SSOe fallback from "${loggedInUser} NOT logged in" to "Platform SSO not configured"
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant