[OID4VCI] Revisit invalid authorization requests handling#47850
[OID4VCI] Revisit invalid authorization requests handling#47850mposolda merged 1 commit intokeycloak:mainfrom
Conversation
1141e97 to
489d062
Compare
|
@tdiesler Replied on the issue #47649 (comment) |
|
This would also work for me ... However, information from all other url params would be lost. |
3b4fa83 to
9a75e83
Compare
For me, this does not work. Please see #47649 (comment) |
39d4c67 to
cd1dac7
Compare
|
@tdiesler As you suggested yesterday, I've updated tdiesler#3 with the javadoc for |
ec8b49a to
a96188c
Compare
15bbe31 to
f7273fc
Compare
2a01e26 to
2454642
Compare
Unreported flaky test detectedIf the flaky tests below are affected by the changes, please review and update the changes accordingly. Otherwise, a maintainer should report the flaky tests prior to merging the PR. org.keycloak.testsuite.adapter.servlet.SAMLServletAdapterTest#employeeSigPostNoIdpKeyTestKeyIdAsKeyNameInKeyInfoKeycloak CI - Adapter IT Strict Cookies |
158a885 to
4066756
Compare
Signed-off-by: Thomas Diesler <[email protected]>
|
@mposolda This now incorporates your idea about low level APIs on the The supplier use case now looks like this ... The check for early request parsing/integrity errors stays with AuthorizationEndpointRequest for now. Depending on whether that proves useful, we can promote it later or not. The OID4VCPublicClientTest does this ... |
closes #47649
This PR is about these three lines of code in
LoginUrlBuilder...It fixes the incorrect assumption that a login form can always be filled regardless of the http response resulting from sending an authorization request.
The second step is now conditioned on success of the first step.
A related discussion is here: #48308
Depends on