-
Notifications
You must be signed in to change notification settings - Fork 599
Remove default tasks for OIDC notifications, perform null check before any work. #307
Comments
Hum, I'm not sure about this change: is the perf gain worth it, compared to the noise it will add to the code? If we decide to bring back an |
What does IOpenIdConnectAuthenticationNotifications change look like? |
Exactly like the OAuth2 client middleware: https://github.com/aspnet/Security/blob/dev/src/Microsoft.AspNet.Authentication.OAuth/Notifications/IOAuthAuthenticationNotifications.cs |
@PinpointTownes What is the reason for changing the notification model? |
@Tratcher you added a 'need-design' tag. Does that indicate some type of deliverable? If so what does it look like? |
I never said it was supposed to address a performance issue 😄 It will only be changed for consistency: #257 (comment) |
@PinpointTownes on the performance issue, I want to be able to determine if a notification was set by the user. |
Cookies, OAuth2 and Twitter already have their own interface: Only OAuth2 bearer and OIDC will need to be updated. |
Yes each having it's own interface was something we tried to avoid when we introduced WsFed and OIDC into Katana. Either way, I would not set a default no-op. |
|
@Eilon @davidfowl |
I'm not sure to understand how this thing can be blocking for the code flow support. |
@PinpointTownes there is another PR to follow. |
That doesn't tell me why not being able to have |
More correctly, blocking to get in the beta6 release. |
So why is this blocking? Both patterns can work... it's just a matter of a null check, no? |
Design review: declined. Revert the change in OIDC that did this. |
The constructor sets no-op notifications.
This results in the handler doing a bunch of work for nothing. Wrap the whole thing in:
if (... != null ) { do work }
instead of:
The text was updated successfully, but these errors were encountered: