Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Conversation

luhn
Copy link
Contributor

@luhn luhn commented Feb 4, 2022

Use utils.is_secure_transport to validate issuer, that way OAUTHLIB_INSECURE_TRANSPORT is taken into account.

@luhn
Copy link
Contributor Author

luhn commented Feb 4, 2022

I was going off of the existing unit tests for the metadata endpoint, which don't seem to test the validations? Likely because the validations don't result in a user-facing error but a hard ValueError.

Happy to whip up a quick test if you'd still like me to.

@auvipy
Copy link
Contributor

auvipy commented Feb 4, 2022

yes please

@auvipy auvipy requested a review from JonathanHuot February 8, 2022 00:17
Copy link
Member

@JonathanHuot JonathanHuot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@JonathanHuot JonathanHuot added this to the 3.2.1 milestone Feb 18, 2022
@JonathanHuot JonathanHuot added the OAuth2-Provider This impact the provider part of OAuth2 label Feb 18, 2022
@auvipy auvipy merged commit b123283 into oauthlib:master Mar 6, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
OAuth2-Provider This impact the provider part of OAuth2
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants