Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support hash location strategy with code flow #634

Conversation

gingters
Copy link
Contributor

Resolves #594

Renamed and moved parseQueryString on OAuthService to getCodePartsFromUrl and changed it so that if window.location.search is empty, it will try to get the parameters from the hash part (re-using getHashFragmentParams() on the urlHelper, which is also already used in tryLoginImplicitFlow).

Also added a checkbox to the sample page to toggle the sample app between path and hash location strategy in order to test this.

Should work also with implicit flow, but the redirect uri with the hash route is not yet recognized by the IdentityServer3 instance on steyer-identity-server.azurewebsites.net, so that needs to be configured to also support the redirect uri with the hash for the sample test case for implicit flow.

@gingters gingters changed the title Bugfix/code flow hash location strategy Support hash location strategy with code flow Sep 24, 2019
@gingters gingters force-pushed the bugfix/codeFlow-hashLocationStrategy branch from 0ac4ae8 to e448314 Compare September 24, 2019 07:50
@federicoboschini
Copy link

I found this fix very useful. I am dealing with the same problem with an Azure IdentityServer.

@manfredsteyer manfredsteyer merged commit b2837cd into manfredsteyer:master Mar 2, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

tryLoginCodeFlow with HashLocationStrategy
3 participants