Skip to content
This repository was archived by the owner on Jun 12, 2021. It is now read-only.

Commit 79fd7f8

Browse files
committed
Use same pattern for check_session_iframe as for endpoints.
1 parent d288d64 commit 79fd7f8

1 file changed

Lines changed: 11 additions & 4 deletions

File tree

src/oidcendpoint/oidc/session.py

Lines changed: 11 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,7 @@
2222
from oidcendpoint.common.authorization import verify_uri
2323
from oidcendpoint.cookie import append_cookie
2424
from oidcendpoint.endpoint import Endpoint
25+
from oidcendpoint.endpoint_context import add_path
2526

2627
logger = logging.getLogger(__name__)
2728

@@ -79,6 +80,12 @@ class Session(Endpoint):
7980
"check_session_iframe": None,
8081
}
8182

83+
def __init__(self, endpoint_context, **kwargs):
84+
Endpoint.__init__(self, endpoint_context, **kwargs)
85+
_csi = self.kwargs.get('check_session_iframe')
86+
if _csi:
87+
self.kwargs.setdefault(add_path(endpoint_context.issuer, _csi))
88+
8289
def do_back_channel_logout(self, cinfo, sub, sid):
8390
"""
8491
@@ -366,10 +373,10 @@ def parse_request(self, request, auth=None, **kwargs):
366373
pass
367374
else:
368375
if (
369-
_ith.jws_header["alg"]
370-
not in self.endpoint_context.provider_info[
371-
"id_token_signing_alg_values_supported"
372-
]
376+
_ith.jws_header["alg"]
377+
not in self.endpoint_context.provider_info[
378+
"id_token_signing_alg_values_supported"
379+
]
373380
):
374381
raise JWSException("Unsupported signing algorithm")
375382

0 commit comments

Comments
 (0)