Skip to content
This repository was archived by the owner on Nov 8, 2024. It is now read-only.

Finished scheme support #206

Merged
merged 5 commits into from
Aug 19, 2019
Merged

Finished scheme support #206

merged 5 commits into from
Aug 19, 2019

Conversation

pksunkara
Copy link
Contributor

@pksunkara pksunkara commented Apr 1, 2019

This PR finishes the full support for oauth2 flows (after the breaking change in the Oauth2 Scheme element)

UPDATED: No more breaking changes (Spec PR)

@pksunkara pksunkara force-pushed the pksunkara/security branch from b2344a5 to 11523ad Compare April 1, 2019 14:22
@pksunkara pksunkara requested a review from kylef April 1, 2019 14:23
@pksunkara pksunkara changed the title feat(oas3): finished oauth2 flow support feat(oas3): finished scheme support Apr 1, 2019
@pksunkara pksunkara changed the title feat(oas3): finished scheme support Finished scheme support Apr 1, 2019
@pksunkara pksunkara force-pushed the pksunkara/security branch 2 times, most recently from 186bca8 to a3cb6b5 Compare April 2, 2019 12:40
Copy link
Member

@kylef kylef left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I have not yet finished full review, however as requested I've submitted what I had so far. I have not looked at the tests in detail.

@pksunkara pksunkara force-pushed the pksunkara/security branch 3 times, most recently from 1dc1247 to 644185d Compare July 30, 2019 14:28
@pksunkara pksunkara requested a review from kylef July 30, 2019 14:30
Copy link
Member

@kylef kylef left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

As mentioned on our call earlier, I've done a first pass review (mostly of the code itself and less of what it is doing). Some early feedback before some of the logic is changed.

@pksunkara pksunkara force-pushed the pksunkara/security branch 2 times, most recently from 677d8f2 to 723eac0 Compare August 8, 2019 08:58
@pksunkara
Copy link
Contributor Author

Context has a method registerId() which can be used to register IDs and know if they are unique. If there is a schema with the id which could clash we can figure it out and error out.

I want to do this in a separate PR. Also, security scheme (does it exist?) validation is not done since it's tied into the above. The splitting of oauth2 schemes into different flows when we encounter them in security requirements is also not done since it is also tied into the above 2 things that are pending.

@pksunkara pksunkara merged commit 07bfb18 into master Aug 19, 2019
@pksunkara pksunkara deleted the pksunkara/security branch August 19, 2019 11:51
@pksunkara pksunkara restored the pksunkara/security branch August 19, 2019 11:51
@pksunkara pksunkara deleted the pksunkara/security branch August 19, 2019 11:51
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants