summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorAndrew Arnott <andrewarnott@gmail.com>2011-06-11 21:51:10 -0700
committerAndrew Arnott <andrewarnott@gmail.com>2011-06-11 21:51:10 -0700
commitda045c9dadb94d7bb5c62b1b3dd4613031a4c856 (patch)
tree148e4d96668f99d6a06ef19874c9f6af2811849e
parent02399ba17dafb981143c8c5e6e83e43f7c7fe4b2 (diff)
downloadDotNetOpenAuth-da045c9dadb94d7bb5c62b1b3dd4613031a4c856.zip
DotNetOpenAuth-da045c9dadb94d7bb5c62b1b3dd4613031a4c856.tar.gz
DotNetOpenAuth-da045c9dadb94d7bb5c62b1b3dd4613031a4c856.tar.bz2
Fixed a few build breaks.
-rw-r--r--projecttemplates/RelyingPartyLogic/OAuthAuthorizationServer.cs2
-rw-r--r--samples/OAuthAuthorizationServer/Code/OAuth2AuthorizationServer.cs2
-rw-r--r--src/DotNetOpenAuth.Test/OAuth2/MessageFactoryTests.cs12
3 files changed, 2 insertions, 14 deletions
diff --git a/projecttemplates/RelyingPartyLogic/OAuthAuthorizationServer.cs b/projecttemplates/RelyingPartyLogic/OAuthAuthorizationServer.cs
index 724b752..f0608d5 100644
--- a/projecttemplates/RelyingPartyLogic/OAuthAuthorizationServer.cs
+++ b/projecttemplates/RelyingPartyLogic/OAuthAuthorizationServer.cs
@@ -98,7 +98,7 @@ namespace RelyingPartyLogic {
// NEVER issue an auto-approval to a client that would end up getting an access token immediately
// (without a client secret), as that would allow ANY client to spoof an approved client's identity
// and obtain unauthorized access to user data.
- if (EndUserAuthorizationRequest.ResponseType == EndUserAuthorizationResponseType.AuthorizationCode) {
+ if (authorizationRequest.ResponseType == EndUserAuthorizationResponseType.AuthorizationCode) {
// Never issue auto-approval if the client secret is blank, since that too makes it easy to spoof
// a client's identity and obtain unauthorized access.
var requestingClient = Database.DataContext.Clients.First(c => c.ClientIdentifier == authorizationRequest.ClientIdentifier);
diff --git a/samples/OAuthAuthorizationServer/Code/OAuth2AuthorizationServer.cs b/samples/OAuthAuthorizationServer/Code/OAuth2AuthorizationServer.cs
index a29f63a..e2e4325 100644
--- a/samples/OAuthAuthorizationServer/Code/OAuth2AuthorizationServer.cs
+++ b/samples/OAuthAuthorizationServer/Code/OAuth2AuthorizationServer.cs
@@ -53,7 +53,7 @@
// NEVER issue an auto-approval to a client that would end up getting an access token immediately
// (without a client secret), as that would allow ANY client to spoof an approved client's identity
// and obtain unauthorized access to user data.
- if (EndUserAuthorizationRequest.ResponseType == EndUserAuthorizationResponseType.AuthorizationCode) {
+ if (authorizationRequest.ResponseType == EndUserAuthorizationResponseType.AuthorizationCode) {
// Never issue auto-approval if the client secret is blank, since that too makes it easy to spoof
// a client's identity and obtain unauthorized access.
var requestingClient = MvcApplication.DataContext.Clients.First(c => c.ClientIdentifier == authorizationRequest.ClientIdentifier);
diff --git a/src/DotNetOpenAuth.Test/OAuth2/MessageFactoryTests.cs b/src/DotNetOpenAuth.Test/OAuth2/MessageFactoryTests.cs
index 0e82154..e6237ca 100644
--- a/src/DotNetOpenAuth.Test/OAuth2/MessageFactoryTests.cs
+++ b/src/DotNetOpenAuth.Test/OAuth2/MessageFactoryTests.cs
@@ -122,18 +122,6 @@ namespace DotNetOpenAuth.Test.OAuth2 {
Assert.IsInstanceOf(typeof(AccessTokenClientCredentialsRequest), request);
}
- [TestCase]
- public void AccessTokenAssertionRequest() {
- var fields = new Dictionary<string, string> {
- { Protocol.client_id, "abc" },
- { Protocol.assertion_type, "abc" },
- { Protocol.assertion, "abc" },
- { Protocol.grant_type, "assertion" },
- };
- IDirectedProtocolMessage request = this.messageFactory.GetNewRequestMessage(this.recipient, fields);
- Assert.IsInstanceOf(typeof(AccessTokenAssertionRequest), request);
- }
-
#endregion
}
}