-
Notifications
You must be signed in to change notification settings - Fork 4
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix(oauth2): allow confidential auth code http #189
Conversation
This allows confidential clients to use the http scheme for a redirect URI.
WalkthroughThe pull request introduces modifications to the OAuth2 authorization code flow handler in the Changes
Sequence DiagramsequenceDiagram
participant Client
participant AuthorizationServer
participant RedirectURIChecker
Client->>AuthorizationServer: Authorization Request
AuthorizationServer->>RedirectURIChecker: Check Redirect URI Security
alt Custom Checker Available
RedirectURIChecker-->>AuthorizationServer: Use Custom Checker
else Default Checker
RedirectURIChecker-->>AuthorizationServer: Use Default Secure Checker
end
alt URI is Secure
AuthorizationServer->>Client: Authorization Code
else URI is Insecure
AuthorizationServer->>Client: Error Response
end
Tip CodeRabbit's docstrings feature is now available as part of our Early Access Program! Simply use the command Thank you for using CodeRabbit. We offer it for free to the OSS community and would appreciate your support in helping us grow. If you find it useful, would you consider giving us a shout-out on your favorite social media? 🪧 TipsChatThere are 3 ways to chat with CodeRabbit:
Note: Be mindful of the bot's finite context window. It's strongly recommended to break down tasks such as reading entire modules into smaller chunks. For a focused discussion, use review comments to chat about specific files and their changes, instead of using the PR comments. CodeRabbit Commands (Invoked using PR comments)
Other keywords and placeholders
CodeRabbit Configuration File (
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Actionable comments posted: 0
🧹 Nitpick comments (2)
handler/oauth2/flow_authorize_code_auth.go (2)
47-48
: Optional: In-line documentation could clarify fallback behavior.Consider adding a short comment about why the fallback is necessary and under what circumstances a custom checker might be provided.
62-62
: Clarify error messaging for more user-friendly guidance.The error hint is concise, but consider adding a note on how to configure or register a confidential client for http usage. This might help developers troubleshoot quickly.
📜 Review details
Configuration used: CodeRabbit UI
Review profile: CHILL
Plan: Pro
📒 Files selected for processing (2)
handler/oauth2/flow_authorize_code_auth.go
(2 hunks)handler/oauth2/flow_authorize_code_auth_test.go
(2 hunks)
🔇 Additional comments (4)
handler/oauth2/flow_authorize_code_auth.go (2)
43-45
: Rename method appears consistent with best practices.
Renaming secureChecker
to GetRedirectSecureChecker
clarifies the method’s purpose. The fallback logic using oauth2.IsRedirectURISecure
is a clean way to ensure a default checker is in place.
59-61
: Ensure thorough testing for insecure protocols.
This check properly enforces HTTPS for public clients but allows HTTP for confidential clients. Confirm that edge cases like IP addresses or localhost usage are correctly handled, as local dev environments sometimes rely on http://127.0.0.1.
Would you like additional test coverage to validate IP-based redirect URIs or other local development usage?
handler/oauth2/flow_authorize_code_auth_test.go (2)
69-75
: Test scenario captures the intended error for public client over HTTP.
This negative test effectively verifies that a public client's HTTP redirect is disallowed. The coverage is appropriate and ensures the error is properly raised.
99-128
: Thorough validation of HTTP-based redirect for confidential clients.
The test covers:
- Successful issuance of authorization code.
- Properly captured granted scopes and state.
It's a good addition ensuring HTTP usage is valid for confidential clients.
This allows confidential clients to use the http scheme for a redirect URI.