fix: unsupported request parameter error#1956
Merged
sagikazarmark merged 1 commit intodexidp:masterfrom Jan 23, 2021
Merged
Conversation
Signed-off-by: m.nabokikh <[email protected]>
625dd62 to
30a5dad
Compare
| // dex doesn't support request parameter and must return request_not_supported error | ||
| // https://openid.net/specs/openid-connect-core-1_0.html#6.1 | ||
| if q.Get("request") != "" { | ||
| return nil, newErr(errRequestNotSupported, "Server does not support request parameter.") |
Member
There was a problem hiding this comment.
Do I recall correctly that the first implementation involved some redirections? I briefly looked at that version and I didn't really understand it.
Member
Author
There was a problem hiding this comment.
I realized that Dex already does the necessary redirect if an error is returned from the parseAuthorizationRequest method.
xtremerui
pushed a commit
to concourse/dex
that referenced
this pull request
Mar 16, 2021
The official docker release for this release can be pulled from ``` ghcr.io/dexidp/dex:v2.28.0 ``` **Features:** - Add c_hash to id_token, issued on /auth endpoint, when in hybrid flow (dexidp#1773, @HEllRZA) - Allow configuration of returned auth proxy header (dexidp#1839, @seuf) - Allow to disable os.ExpandEnv for storage + connector configs by env variable DEX_EXPAND_ENV = false (dexidp#1902, @heidemn-faro) - Added the possibility to activate lowercase for UPN-Strings (dexidp#1888, @VF-mbrauer) - Add "Cache-control: no-store" and "Pragma: no-cache" headers to token responses (dexidp#1948, @nabokihms) - Add gomplate to the docker image (dexidp#1893, @nabokihms) - Graceful shutdown (dexidp#1963, @nabokihms) - Allow public clients created with API to have no client_secret (dexidp#1871, @spohner) **Bugfixes:** - Fix the etcd PKCE AuthCode deserialization (dexidp#1908, @bnu0) - Fix garbage collection logging of device codes and device request (dexidp#1918, @nabokihms) - Discovery endpoint contains updated claims and auth methods (dexidp#1951, @nabokihms) - Return invalid_grant error if auth code is invalid or expired (dexidp#1952, @nabokihms) - Return an error to auth requests with the "request" parameter (dexidp#1956, @nabokihms) **Minor changes:** - Change default themes to light/dark (dexidp#1858, @nabokihms) - Various developer experience improvements - Dependency upgrades - Tons of small fixes and changes
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Signed-off-by: m.nabokikh [email protected]
Overview
Check the "request" in auth request and throw an error if found.
What this PR does / why we need it
According to the specification, an error is added. There is a specification for error responses.
Special notes for your reviewer
Sending an error is required to pass OpenID certification tests. The previous test suite allows completely ignoring this parameter, but after migrating to the new suit treating the request parameter correctly becomes mandatory.
https://openid.net/specs/openid-connect-core-1_0.html#JWTRequests
Does this PR introduce a user-facing change?