Skip to content

Conversation

@gingters
Copy link
Contributor

Resolves #594

Renamed and moved parseQueryString on OAuthService to getCodePartsFromUrl and changed it so that if window.location.search is empty, it will try to get the parameters from the hash part (re-using getHashFragmentParams() on the urlHelper, which is also already used in tryLoginImplicitFlow).

Also added a checkbox to the sample page to toggle the sample app between path and hash location strategy in order to test this.

Should work also with implicit flow, but the redirect uri with the hash route is not yet recognized by the IdentityServer3 instance on steyer-identity-server.azurewebsites.net, so that needs to be configured to also support the redirect uri with the hash for the sample test case for implicit flow.

@gingters gingters changed the title Bugfix/code flow hash location strategy Support hash location strategy with code flow Sep 24, 2019
@gingters gingters force-pushed the bugfix/codeFlow-hashLocationStrategy branch from 0ac4ae8 to e448314 Compare September 24, 2019 07:50
@federicoboschini
Copy link

I found this fix very useful. I am dealing with the same problem with an Azure IdentityServer.

@manfredsteyer manfredsteyer merged commit b2837cd into manfredsteyer:master Mar 2, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

tryLoginCodeFlow with HashLocationStrategy

3 participants