Skip to content
This repository has been archived by the owner on Dec 24, 2020. It is now read-only.

Commit

Permalink
Update the samples to use ASOS 1.0.0
Browse files Browse the repository at this point in the history
  • Loading branch information
kevinchalet committed Jun 4, 2017
1 parent c79f8c0 commit 62184bc
Show file tree
Hide file tree
Showing 6 changed files with 33 additions and 47 deletions.
4 changes: 2 additions & 2 deletions build/dependencies.props
Original file line number Diff line number Diff line change
Expand Up @@ -2,8 +2,8 @@

<PropertyGroup>
<AspNetCoreVersion>1.0.0</AspNetCoreVersion>
<AspNetContribOpenIdExtensionsVersion>1.0.0-beta1-final</AspNetContribOpenIdExtensionsVersion>
<AspNetContribOpenIdServerVersion>1.0.0-rc1-final</AspNetContribOpenIdServerVersion>
<AspNetContribOpenIdExtensionsVersion>1.0.0</AspNetContribOpenIdExtensionsVersion>
<AspNetContribOpenIdServerVersion>1.0.0</AspNetContribOpenIdServerVersion>
<NetStandardImplicitPackageVersion>1.6.0</NetStandardImplicitPackageVersion>
<RuntimeFrameworkVersion>1.0.0</RuntimeFrameworkVersion>
<SignalRVersion>0.1.0-*</SignalRVersion>
Expand Down
28 changes: 11 additions & 17 deletions samples/Cordova/Backend/Providers/AuthorizationProvider.cs
Original file line number Diff line number Diff line change
Expand Up @@ -35,7 +35,7 @@ public override async Task ValidateAuthorizationRequest(ValidateAuthorizationReq
{
context.Reject(
error: OpenIdConnectConstants.Errors.InvalidRequest,
description: "The specified response_mode is unsupported.");
description: "The specified 'response_mode' is unsupported.");

return;
}
Expand All @@ -51,7 +51,7 @@ public override async Task ValidateAuthorizationRequest(ValidateAuthorizationReq
{
context.Reject(
error: OpenIdConnectConstants.Errors.InvalidClient,
description: "Application not found in the database: ensure that your client_id is correct.");
description: "The specified client identifier is invalid.");

return;
}
Expand All @@ -61,7 +61,7 @@ public override async Task ValidateAuthorizationRequest(ValidateAuthorizationReq
{
context.Reject(
error: OpenIdConnectConstants.Errors.InvalidClient,
description: "Invalid redirect_uri.");
description: "The specified 'redirect_uri' is invalid.");

return;
}
Expand Down Expand Up @@ -89,7 +89,7 @@ public override async Task ValidateTokenRequest(ValidateTokenRequestContext cont
{
context.Reject(
error: OpenIdConnectConstants.Errors.InvalidRequest,
description: "The mandatory client_id parameter was missing");
description: "The mandatory 'client_id'/'client_secret' parameters are missing.");

return;
}
Expand All @@ -105,7 +105,7 @@ public override async Task ValidateTokenRequest(ValidateTokenRequestContext cont
{
context.Reject(
error: OpenIdConnectConstants.Errors.InvalidClient,
description: "Application not found in the database: ensure that your client_id is correct.");
description: "The specified client identifier is invalid.");

return;
}
Expand All @@ -119,20 +119,14 @@ public override async Task ValidateLogoutRequest(ValidateLogoutRequestContext co
{
var database = context.HttpContext.RequestServices.GetRequiredService<ApplicationContext>();

// Skip validation if the post_logout_redirect_uri parameter was missing.
if (string.IsNullOrEmpty(context.PostLogoutRedirectUri))
{
context.Skip();

return;
}

// When provided, post_logout_redirect_uri must exactly match the address registered by the client application.
if (!await database.Applications.AnyAsync(application => application.LogoutRedirectUri == context.PostLogoutRedirectUri))
// When provided, post_logout_redirect_uri must exactly
// match the address registered by the client application.
if (!string.IsNullOrEmpty(context.PostLogoutRedirectUri) &&
!await database.Applications.AnyAsync(application => application.LogoutRedirectUri == context.PostLogoutRedirectUri))
{
context.Reject(
error: OpenIdConnectConstants.Errors.InvalidClient,
description: "Invalid post_logout_redirect_uri.");
error: OpenIdConnectConstants.Errors.InvalidRequest,
description: "The specified 'post_logout_redirect_uri' is invalid.");

return;
}
Expand Down
35 changes: 14 additions & 21 deletions samples/Mvc/Mvc.Server/Providers/AuthorizationProvider.cs
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ public override async Task ValidateAuthorizationRequest(ValidateAuthorizationReq
{
context.Reject(
error: OpenIdConnectConstants.Errors.UnsupportedResponseType,
description: "Only the authorization code flow is supported by this authorization server");
description: "Only the authorization code flow is supported by this authorization server.");

return;
}
Expand All @@ -35,7 +35,7 @@ public override async Task ValidateAuthorizationRequest(ValidateAuthorizationReq
{
context.Reject(
error: OpenIdConnectConstants.Errors.InvalidRequest,
description: "The specified response_mode is unsupported.");
description: "The specified 'response_mode' is unsupported.");

return;
}
Expand All @@ -51,7 +51,7 @@ public override async Task ValidateAuthorizationRequest(ValidateAuthorizationReq
{
context.Reject(
error: OpenIdConnectConstants.Errors.InvalidClient,
description: "Application not found in the database: ensure that your client_id is correct");
description: "The specified client identifier is invalid.");

return;
}
Expand All @@ -61,7 +61,7 @@ public override async Task ValidateAuthorizationRequest(ValidateAuthorizationReq
{
context.Reject(
error: OpenIdConnectConstants.Errors.InvalidClient,
description: "Invalid redirect_uri");
description: "The specified 'redirect_uri' is invalid.");

return;
}
Expand All @@ -79,7 +79,7 @@ public override async Task ValidateTokenRequest(ValidateTokenRequestContext cont
context.Reject(
error: OpenIdConnectConstants.Errors.UnsupportedGrantType,
description: "Only authorization code and refresh token grant types " +
"are accepted by this authorization server");
"are accepted by this authorization server.");

return;
}
Expand All @@ -94,8 +94,7 @@ public override async Task ValidateTokenRequest(ValidateTokenRequestContext cont
{
context.Reject(
error: OpenIdConnectConstants.Errors.InvalidRequest,
description: "Missing credentials: ensure that your credentials were correctly " +
"flowed in the request body or in the authorization header");
description: "The mandatory 'client_id'/'client_secret' parameters are missing.");

return;
}
Expand All @@ -111,7 +110,7 @@ public override async Task ValidateTokenRequest(ValidateTokenRequestContext cont
{
context.Reject(
error: OpenIdConnectConstants.Errors.InvalidClient,
description: "Application not found in the database: ensure that your client_id is correct");
description: "The specified client identifier is invalid.");

return;
}
Expand All @@ -126,7 +125,7 @@ public override async Task ValidateTokenRequest(ValidateTokenRequestContext cont
{
context.Reject(
error: OpenIdConnectConstants.Errors.InvalidClient,
description: "Invalid credentials: ensure that you specified a correct client_secret");
description: "The specified client credentials are invalid.");

return;
}
Expand All @@ -138,20 +137,14 @@ public override async Task ValidateLogoutRequest(ValidateLogoutRequestContext co
{
var database = context.HttpContext.RequestServices.GetRequiredService<ApplicationContext>();

// Skip validation if the post_logout_redirect_uri parameter was missing.
if (string.IsNullOrEmpty(context.PostLogoutRedirectUri))
{
context.Skip();

return;
}

// When provided, post_logout_redirect_uri must exactly match the address registered by the client application.
if (!await database.Applications.AnyAsync(application => application.LogoutRedirectUri == context.PostLogoutRedirectUri))
// When provided, post_logout_redirect_uri must exactly
// match the address registered by the client application.
if (!string.IsNullOrEmpty(context.PostLogoutRedirectUri) &&
!await database.Applications.AnyAsync(application => application.LogoutRedirectUri == context.PostLogoutRedirectUri))
{
context.Reject(
error: OpenIdConnectConstants.Errors.InvalidClient,
description: "Invalid post_logout_redirect_uri");
error: OpenIdConnectConstants.Errors.InvalidRequest,
description: "The specified 'post_logout_redirect_uri' is invalid.");

return;
}
Expand Down
8 changes: 4 additions & 4 deletions samples/Postman/Providers/AuthorizationProvider.cs
Original file line number Diff line number Diff line change
Expand Up @@ -36,7 +36,7 @@ public override Task ValidateAuthorizationRequest(ValidateAuthorizationRequestCo
{
context.Reject(
error: OpenIdConnectConstants.Errors.InvalidRequest,
description: "The specified response_mode is unsupported.");
description: "The specified 'response_mode' is unsupported.");

return Task.FromResult(0);
}
Expand All @@ -46,7 +46,7 @@ public override Task ValidateAuthorizationRequest(ValidateAuthorizationRequestCo
{
context.Reject(
error: OpenIdConnectConstants.Errors.InvalidClient,
description: "The specified client_id is unknown.");
description: "The specified client identifier is invalid.");

return Task.FromResult(0);
}
Expand All @@ -56,7 +56,7 @@ public override Task ValidateAuthorizationRequest(ValidateAuthorizationRequestCo
{
context.Reject(
error: OpenIdConnectConstants.Errors.InvalidClient,
description: "The specified redirect_uri is invalid.");
description: "The specified 'redirect_uri' is invalid.");

return Task.FromResult(0);
}
Expand Down Expand Up @@ -103,7 +103,7 @@ public override Task HandleTokenRequest(HandleTokenRequestContext context)
{
context.Reject(
error: OpenIdConnectConstants.Errors.InvalidGrant,
description: "Invalid user credentials.");
description: "The specified user credentials are invalid.");

return Task.FromResult(0);
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -52,7 +52,7 @@ public override Task HandleTokenRequest(HandleTokenRequestContext context)
{
context.Reject(
error: OpenIdConnectConstants.Errors.InvalidGrant,
description: "Invalid username or password.");
description: "The specified user credentials are invalid.");

return Task.FromResult(0);
}
Expand Down
3 changes: 1 addition & 2 deletions samples/SignalR/HelloSignalR/wwwroot/index.html
Original file line number Diff line number Diff line change
Expand Up @@ -45,8 +45,7 @@
data: "client_id=AspNetContribSample"
+ "&grant_type=password"
+ "&username=AspNet"
+ "&password=contrib"
+ "&resource=" + encodeURIComponent(connectionBase),
+ "&password=contrib",
contentType: "application/x-www-form-urlencoded"
}).then(function (data) {
connectToSignalR(data.access_token);
Expand Down

0 comments on commit 62184bc

Please sign in to comment.