From 30c7e6c94c4c046a21ebc833c5dffb3309e13047 Mon Sep 17 00:00:00 2001 From: scheibling <24367830+scheibling@users.noreply.github.com> Date: Fri, 6 May 2022 10:09:09 +0200 Subject: [PATCH] providers/oauth2: fixed typo (PROMPT_CONSNET => PROMPT_CONSENT) (#2819) --- authentik/providers/oauth2/constants.py | 2 +- authentik/providers/oauth2/views/authorize.py | 8 ++++---- 2 files changed, 5 insertions(+), 5 deletions(-) diff --git a/authentik/providers/oauth2/constants.py b/authentik/providers/oauth2/constants.py index 6c15baa5e..7edf5b9c3 100644 --- a/authentik/providers/oauth2/constants.py +++ b/authentik/providers/oauth2/constants.py @@ -11,7 +11,7 @@ CLIENT_ASSERTION = "client_assertion" CLIENT_ASSERTION_TYPE_JWT = "urn:ietf:params:oauth:client-assertion-type:jwt-bearer" PROMPT_NONE = "none" -PROMPT_CONSNET = "consent" +PROMPT_CONSENT = "consent" PROMPT_LOGIN = "login" SCOPE_OPENID = "openid" diff --git a/authentik/providers/oauth2/views/authorize.py b/authentik/providers/oauth2/views/authorize.py index 859d711f4..5b08fddd1 100644 --- a/authentik/providers/oauth2/views/authorize.py +++ b/authentik/providers/oauth2/views/authorize.py @@ -30,7 +30,7 @@ from authentik.lib.views import bad_request_message from authentik.policies.types import PolicyRequest from authentik.policies.views import PolicyAccessView, RequestValidationError from authentik.providers.oauth2.constants import ( - PROMPT_CONSNET, + PROMPT_CONSENT, PROMPT_LOGIN, PROMPT_NONE, SCOPE_OPENID, @@ -63,7 +63,7 @@ LOGGER = get_logger() PLAN_CONTEXT_PARAMS = "params" SESSION_NEEDS_LOGIN = "authentik_oauth2_needs_login" -ALLOWED_PROMPT_PARAMS = {PROMPT_NONE, PROMPT_CONSNET, PROMPT_LOGIN} +ALLOWED_PROMPT_PARAMS = {PROMPT_NONE, PROMPT_CONSENT, PROMPT_LOGIN} @dataclass @@ -265,7 +265,7 @@ class OAuthFulfillmentStage(StageView): self.provider = get_object_or_404(OAuth2Provider, pk=application.provider_id) try: # At this point we don't need to check permissions anymore - if {PROMPT_NONE, PROMPT_CONSNET}.issubset(self.params.prompt): + if {PROMPT_NONE, PROMPT_CONSENT}.issubset(self.params.prompt): raise AuthorizeError( self.params.redirect_uri, "consent_required", @@ -494,7 +494,7 @@ class AuthorizationFlowInitView(PolicyAccessView): ) # OpenID clients can specify a `prompt` parameter, and if its set to consent we # need to inject a consent stage - if PROMPT_CONSNET in self.params.prompt: + if PROMPT_CONSENT in self.params.prompt: if not any(isinstance(x.stage, ConsentStageView) for x in plan.bindings): # Plan does not have any consent stage, so we add an in-memory one stage = ConsentStage(