-
Notifications
You must be signed in to change notification settings - Fork 17
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
bug fixed #47
bug fixed #47
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I would advise caution on this for the following reasons:
It will break existing apitester deployments which expect the /obp route to exist
Since it's inception the apitester has used the route '/obp' for the return url, any other developers (and including documentation being made) will expect this to still be the case
It's not clear what bug this commit is fixing (I assume it's related to oauth debugging internally) but the effect of this commit is probably unintentional.
I propose there should be consistency on which route oauth apps, be recommending which route apps should delegate for their oauth returl url.
@PengfeiLi0218 @simonredfern
apitester/apitester/urls.py
Outdated
urlpatterns = [ | ||
url(r'^$', HomeView.as_view(), name="home"), | ||
url(r'^obp/', include('obp.urls')), |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I would advise caution on this for the following reasons:
- It will break existing apitester deployments which expect the
/obp
route to exist - Since it's inception the apitester has used the route '/obp' for the return url, any other developers (and including documentation being made) will expect this to still be the case
- It's not clear what bug this commit is fixing (I assume it's related to oauth debugging internally) but the effect of this commit is probably unintentional.
- I propose there should be consistency on which route oauth apps, be recommending which route apps should delegate for their oauth returl url.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yeah we'd have to update API Tester configurations on all sandboxes once this gets deployed. Tedious, but IMHO increasing consistency, as none of our other apps need additions to the redirect URL.
Thanks @PengfeiLi0218 @simonredfern Please could alias the A separate issue (#48 ) has been created to RECOMMEND app developers use a standard route for their oauth return urls (I suggest |
bug: Mismatch between validRedirectURL and requestedRedirectURL