-
Notifications
You must be signed in to change notification settings - Fork 1.3k
docs: example of testing pkce against split resource server #1600
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
@xenoterracide I don't understand what you are looking for? The heading says "testing pkce against split resource server" but PKCE is validated by the authorization server.
Are you just looking to standup an authorization server for integration testing purposes? If so, see gh-258 |
Yes, partially, same use case. I had assumed this was a matter of documentation at this point. My plan was to start a separate server which would avoid the bean conflict. Although I don't particularly have a problem with an in JVM approach... I could say that I also don't think this particular flow is simply documented. Maybe it's just me that I prefer my docs to exist largely as "curl"/raw http instead of having to write a full fronted app in addition to my separated resource/idp server (other examples also seem to be bundling these into one server). Note: I appreciate that example existing, it's just a lot to traverse to get to the simplest thing that can possibly work. |
What I'm looking for is something like these details (when using the defaults). https://developer.okta.com/blog/2019/08/22/okta-authjs-pkce#replace-implicit-flow-with-pkce one could argue that an example test of the server here might be enough, or at least a major step in the right direction. https://docs.spring.io/spring-authorization-server/reference/guides/how-to-pkce.html |
@xenoterracide See gh-258 as I provided an "UPDATE" to the integration test support forthcoming. There is a branch and link to an integration test that shows how to startup a Spring Authorization Server (with custom config) for integration testing purposes. I'll close this as a duplicate. |
So what's wrong with this request?
from what I can tell I'm calling with the correct parameters I'm guessing it's the 3rd message
but explicitly in PKCE /login happens AFTER /authorize there's some things in there that aren't standard, but I'm not certain they should affect anything. |
So I'd like to isolate this from a complete e2e example. I'm aware of that example, it's just kind of huge.
What'd I'd like is a lite example of "stub servers" that could be used to fake something like auth0. Mostly for "integration" testing to avoid exposing the real auth0 tokens. I don't want to use a real web browser to test that my configuration is correct, and stays that way.
Looking at #426 I need to go see if I ever figured it out as my last comment was about 30 seconds before my life went sideways. I don't think I actually did though.
The text was updated successfully, but these errors were encountered: