Skip to content

Ensure that request.client_id is set during Refresh Token Grant. #853

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 1 commit into from
Sep 2, 2023

Conversation

luhn
Copy link
Contributor

@luhn luhn commented Aug 11, 2023

If a confidential client authenticates via Authorization header, request.client_id will be null. This change ensures that request.client_id is always set.

Authorization Code Grant has similar behavior, see 335d9e8

@auvipy auvipy self-requested a review August 13, 2023 05:40
@auvipy auvipy closed this Aug 27, 2023
@auvipy auvipy reopened this Aug 27, 2023
@luhn luhn force-pushed the refresh-grant-ensure-client-id branch from 010707c to 21b457e Compare September 1, 2023 16:36
@auvipy auvipy added this to the 3.3.0 milestone Sep 2, 2023
@auvipy auvipy merged commit 00f9a21 into oauthlib:master Sep 2, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants
pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy