Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

URL decode the client_id and client_secret in Authz header #175

Merged
merged 1 commit into from
Feb 22, 2018
Merged

URL decode the client_id and client_secret in Authz header #175

merged 1 commit into from
Feb 22, 2018

Conversation

weters
Copy link
Contributor

@weters weters commented Feb 20, 2018

According to the OAuth2 spec
(https://tools.ietf.org/html/rfc6749#section-2.3.1), the client_id
and client_secret are first separately encoded using the
application/x-www-form-urlencoded algorithm and then base64 encoded.

#174

According to the OAuth2 spec
(https://tools.ietf.org/html/rfc6749#section-2.3.1), the client_id
and client_secret are first separately encoded using the
application/x-www-form-urlencoded algorithm and then base64 encoded.
@RangelReale RangelReale merged commit a05b753 into openshift:master Feb 22, 2018
arjunrn added a commit to arjunrn/oauth-server that referenced this pull request Mar 11, 2022
Contains the following prominent changes:

1. [Reworked redirect uri validation, resolving uri references to base
   url, and returning the resolved url to the requesting
   function](openshift/osin@06cbf43).
2. [URL decode the client_id and client_secret in Authz
   header](openshift/osin#175).
3. [Changing GET params to
   FormValue](openshift/osin#180).
4. [Ignore port when the redirect URI is a loopback
   address](openshift/osin#210).
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants