-
Notifications
You must be signed in to change notification settings - Fork 192
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
OAuth 2.0 behavior deviates from standard practice #2594
Comments
@cyyynthia Would you be able to review modrinth/labrinth#872 to make sure I implemented it correctly? |
Hello! I was just wondering how you worked around this - did you just completely write a new client to interop with Modrinth's implementation? I am currently facing the same issue @cyyynthia |
The OAuth client I'm using is already my own, so I could just attach extra logic for Modrinth specifically - I didn't though and I just don't have support yet 😄 Modrinth's OAuth implementation is mostly compliant except for the client secret part. You need to send the In my own implementation I would only have to add a special case to the Authorization header, everything else works as expected using a generic implementation. |
Oh thank you! That's what I was missing! I was just about to scour through the codebase but you saved me some time - thank you :] |
Describe the bug
The current implementation of the OAuth 2.0 flow deviates in certain key areas making it hard to interop with generic clients. I encountered these while using my own generic OAuth handler.
Most notably,
Bearer <token>
authorization format despite being the format defined in RFC 6750 §2.1.. Only the prefix-less token is supported.Steps to reproduce
Authorization: Basic base64(client_id:client_secret)
)Authorization: Bearer access_token
)Expected behavior
The flow to succeed and to get information about the authenticated user.
Additional context
No response
The text was updated successfully, but these errors were encountered: