diff options
author | Andrew Arnott <andrewarnott@gmail.com> | 2011-06-11 21:51:10 -0700 |
---|---|---|
committer | Andrew Arnott <andrewarnott@gmail.com> | 2011-06-11 21:51:10 -0700 |
commit | da045c9dadb94d7bb5c62b1b3dd4613031a4c856 (patch) | |
tree | 148e4d96668f99d6a06ef19874c9f6af2811849e | |
parent | 02399ba17dafb981143c8c5e6e83e43f7c7fe4b2 (diff) | |
download | DotNetOpenAuth-da045c9dadb94d7bb5c62b1b3dd4613031a4c856.zip DotNetOpenAuth-da045c9dadb94d7bb5c62b1b3dd4613031a4c856.tar.gz DotNetOpenAuth-da045c9dadb94d7bb5c62b1b3dd4613031a4c856.tar.bz2 |
Fixed a few build breaks.
3 files changed, 2 insertions, 14 deletions
diff --git a/projecttemplates/RelyingPartyLogic/OAuthAuthorizationServer.cs b/projecttemplates/RelyingPartyLogic/OAuthAuthorizationServer.cs index 724b752..f0608d5 100644 --- a/projecttemplates/RelyingPartyLogic/OAuthAuthorizationServer.cs +++ b/projecttemplates/RelyingPartyLogic/OAuthAuthorizationServer.cs @@ -98,7 +98,7 @@ namespace RelyingPartyLogic { // NEVER issue an auto-approval to a client that would end up getting an access token immediately // (without a client secret), as that would allow ANY client to spoof an approved client's identity // and obtain unauthorized access to user data. - if (EndUserAuthorizationRequest.ResponseType == EndUserAuthorizationResponseType.AuthorizationCode) { + if (authorizationRequest.ResponseType == EndUserAuthorizationResponseType.AuthorizationCode) { // Never issue auto-approval if the client secret is blank, since that too makes it easy to spoof // a client's identity and obtain unauthorized access. var requestingClient = Database.DataContext.Clients.First(c => c.ClientIdentifier == authorizationRequest.ClientIdentifier); diff --git a/samples/OAuthAuthorizationServer/Code/OAuth2AuthorizationServer.cs b/samples/OAuthAuthorizationServer/Code/OAuth2AuthorizationServer.cs index a29f63a..e2e4325 100644 --- a/samples/OAuthAuthorizationServer/Code/OAuth2AuthorizationServer.cs +++ b/samples/OAuthAuthorizationServer/Code/OAuth2AuthorizationServer.cs @@ -53,7 +53,7 @@ // NEVER issue an auto-approval to a client that would end up getting an access token immediately // (without a client secret), as that would allow ANY client to spoof an approved client's identity // and obtain unauthorized access to user data. - if (EndUserAuthorizationRequest.ResponseType == EndUserAuthorizationResponseType.AuthorizationCode) { + if (authorizationRequest.ResponseType == EndUserAuthorizationResponseType.AuthorizationCode) { // Never issue auto-approval if the client secret is blank, since that too makes it easy to spoof // a client's identity and obtain unauthorized access. var requestingClient = MvcApplication.DataContext.Clients.First(c => c.ClientIdentifier == authorizationRequest.ClientIdentifier); diff --git a/src/DotNetOpenAuth.Test/OAuth2/MessageFactoryTests.cs b/src/DotNetOpenAuth.Test/OAuth2/MessageFactoryTests.cs index 0e82154..e6237ca 100644 --- a/src/DotNetOpenAuth.Test/OAuth2/MessageFactoryTests.cs +++ b/src/DotNetOpenAuth.Test/OAuth2/MessageFactoryTests.cs @@ -122,18 +122,6 @@ namespace DotNetOpenAuth.Test.OAuth2 { Assert.IsInstanceOf(typeof(AccessTokenClientCredentialsRequest), request); } - [TestCase] - public void AccessTokenAssertionRequest() { - var fields = new Dictionary<string, string> { - { Protocol.client_id, "abc" }, - { Protocol.assertion_type, "abc" }, - { Protocol.assertion, "abc" }, - { Protocol.grant_type, "assertion" }, - }; - IDirectedProtocolMessage request = this.messageFactory.GetNewRequestMessage(this.recipient, fields); - Assert.IsInstanceOf(typeof(AccessTokenAssertionRequest), request); - } - #endregion } } |