summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorAndrew Arnott <andrewarnott@gmail.com>2009-12-01 22:35:59 -0800
committerAndrew Arnott <andrewarnott@gmail.com>2009-12-01 22:35:59 -0800
commitbc6714786258281d9f144f96e795d06c31a16846 (patch)
treee6a88ad3156f5fa64311da4ba031326b25a192c6
parent979eaae1722e8c65a7c6b366892f96a1e1d2b34b (diff)
downloadDotNetOpenAuth-bc6714786258281d9f144f96e795d06c31a16846.zip
DotNetOpenAuth-bc6714786258281d9f144f96e795d06c31a16846.tar.gz
DotNetOpenAuth-bc6714786258281d9f144f96e795d06c31a16846.tar.bz2
Eliminated a couple of compiler warnings.
-rw-r--r--samples/OAuthConsumerWpf/MainWindow.xaml.cs2
-rw-r--r--samples/OpenIdProviderWebForms/decide.aspx.cs4
2 files changed, 2 insertions, 4 deletions
diff --git a/samples/OAuthConsumerWpf/MainWindow.xaml.cs b/samples/OAuthConsumerWpf/MainWindow.xaml.cs
index ee393c1..c917288 100644
--- a/samples/OAuthConsumerWpf/MainWindow.xaml.cs
+++ b/samples/OAuthConsumerWpf/MainWindow.xaml.cs
@@ -172,7 +172,7 @@
Uri authorizeUrl = consumer.RequestUserAuthorization(null, null, out requestToken);
Process.Start(authorizeUrl.AbsoluteUri);
MessageBox.Show(this, "Click OK when you've authorized the app.");
- var authorizationResponse = consumer.ProcessUserAuthorization(requestToken);
+ var authorizationResponse = consumer.ProcessUserAuthorization(requestToken, null);
accessToken = authorizationResponse.AccessToken;
} else {
var authorizePopup = new Authorize(
diff --git a/samples/OpenIdProviderWebForms/decide.aspx.cs b/samples/OpenIdProviderWebForms/decide.aspx.cs
index 6146bd2..b392d85 100644
--- a/samples/OpenIdProviderWebForms/decide.aspx.cs
+++ b/samples/OpenIdProviderWebForms/decide.aspx.cs
@@ -62,17 +62,15 @@ namespace OpenIdProviderWebForms {
}
if (this.OAuthPanel.Visible) {
- string consumerKey = null;
string grantedScope = null;
if (this.oauthPermission.Checked) {
// This SIMPLE sample merely uses the realm as the consumerKey,
// but in a real app this will probably involve a database lookup to translate
// the realm to a known consumerKey.
- consumerKey = ProviderEndpoint.PendingRequest.Realm;
grantedScope = string.Empty; // we don't scope individual access rights on this sample
}
- OAuthHybrid.ServiceProvider.AttachAuthorizationResponse(ProviderEndpoint.PendingRequest, consumerKey, grantedScope);
+ OAuthHybrid.ServiceProvider.AttachAuthorizationResponse(ProviderEndpoint.PendingRequest, grantedScope);
}
var sregRequest = ProviderEndpoint.PendingRequest.GetExtension<ClaimsRequest>();