-
Notifications
You must be signed in to change notification settings - Fork 6k
Introduce OAuth2AuthorizationRequest.attributes #6508
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
@@ -105,7 +105,7 @@ public void resolveWhenAuthorizationRequestWithValidClientThenResolves() { | |||
.isEqualTo("http://localhost/login/oauth2/code/" + clientRegistration.getRegistrationId()); | |||
assertThat(authorizationRequest.getScopes()).isEqualTo(clientRegistration.getScopes()); | |||
assertThat(authorizationRequest.getState()).isNotNull(); | |||
assertThat(authorizationRequest.getAdditionalParameters()) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Since this is to fix gh-5940 we should assert that the additional parameters do not contain the registration id (just because it is in the attributes -- the next assertion -- doesn't mean it isn't also in the parameters)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Makes sense. Applied and pushed.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks! It looks good to me now. Can you please squash and merge when you are ready?
NOTE: It looks like travis had an error (couldn't find the .travis.yml file). Obviously this isn't an issue with this PR, but we don't know if it passes either. You might double check that it builds locally or kick off another build.
Thanks @rwinch. I tried building locally and it passed. |
Merged via 594a169 |
Fixes #5940