-
-
Notifications
You must be signed in to change notification settings - Fork 237
[Bug fixes] For issues #859, 860, 861, 862, 863, 864, 865, 866 #867
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Changes from all commits
e674297
59c7e1f
514fee1
6fe533a
0945e47
0325777
e2507e5
728c7de
6988987
06063e4
dd42743
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -57,8 +57,7 @@ func TestWellKnownController(t *testing.T) { | |
| TokenEndpointAuthMethodsSupported: []string{"client_secret_basic", "client_secret_post"}, | ||
| ClaimsSupported: []string{"sub", "updated_at", "name", "preferred_username", "email", "email_verified", "groups", "phone_number", "phone_number_verified", "address", "given_name", "family_name", "middle_name", "nickname", "profile", "picture", "website", "gender", "birthdate", "zoneinfo", "locale"}, | ||
| ServiceDocumentation: "https://tinyauth.app/docs/guides/oidc", | ||
| RequestParameterSupported: true, | ||
| RequestObjectSigningAlgValuesSupported: []string{"none"}, | ||
|
Comment on lines
-60
to
-61
Member
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. |
||
| RequestParameterSupported: false, | ||
| } | ||
|
|
||
| assert.Equal(t, expected, res) | ||
|
|
||
|
Member
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. It's better to keep the public key loaded from file, not that it makes a big difference but we should let users specify their own. Call it more predictable behavior. Code-wise just use the loaded public key instead of deriving one from the private key. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ah #864 is a false positive, the frontend does the JWT parsing so it works just fine.