challenger

OAuth 2.0-based authentication service that validates user can receive messages at a certain address
Log | Files | Refs | Submodules | README | LICENSE

commit 78bd63d6d6777a307e92c64998cbc52780379012
parent d812c69168d886829a6002fa0ada23c4d8252941
Author: Christian Grothoff <christian@grothoff.org>
Date:   Tue,  9 May 2023 00:02:20 +0200

-spelling

Diffstat:
Msrc/challenger/challenger-httpd.c | 2+-
Msrc/challenger/challenger-httpd_solve.c | 8++++----
Msrc/challenger/challenger-send-post.sh | 4++--
3 files changed, 7 insertions(+), 7 deletions(-)

diff --git a/src/challenger/challenger-httpd.c b/src/challenger/challenger-httpd.c @@ -282,7 +282,7 @@ url_handler (void *cls, GNUNET_break_op (0); if (found) { - /* TOOD: return which methods are allowed ... */ + /* TODO: return which methods are allowed ... */ return TALER_MHD_reply_static (hc->connection, MHD_HTTP_METHOD_NOT_ALLOWED, "text/plain", diff --git a/src/challenger/challenger-httpd_solve.c b/src/challenger/challenger-httpd_solve.c @@ -270,20 +270,20 @@ CH_handler_solve (struct CH_HandlerContext *hc, } { char *code; - char *ue; + char *url_encoded; code = CH_compute_code (&bc->nonce, client_secret, client_scope, address, client_redirect_uri); - ue = TALER_urlencode (client_state); + url_encoded = TALER_urlencode (client_state); GNUNET_asprintf (&url, "%s?code=%s&state=%s", client_redirect_uri, code, - ue); - GNUNET_free (ue); + url_encoded); + GNUNET_free (url_encoded); GNUNET_free (code); } GNUNET_free (address); diff --git a/src/challenger/challenger-send-post.sh b/src/challenger/challenger-send-post.sh @@ -2,7 +2,7 @@ # This file is in the public domain. set -eu -# Theses are Anastasis SARL specific, do not share! +# You need to provide these (set in 'pingen-secrets' file). # CLIENT_ID= # CLIENT_SECRET= # ORG_ID= @@ -116,7 +116,7 @@ SENDER="$(jq -n ' zip: "5421", city: "Erpeldange", country: "LU" - }' + }' )" REQUEST="$(jq -n '