Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Returns the oauth access token "expires at" date #1454

Merged
merged 2 commits into from
Sep 5, 2024

Conversation

mkeckmkeck
Copy link
Contributor

@mkeckmkeck mkeckmkeck commented Sep 4, 2024

Description

Returns the oauth access token "expires at" date in case the server did return it.
Providing this information e.g. gives the API caller the possibility to refresh the token if required. The usage is optional, if not set, the implemention in sirius will trigger a refresh if the provided access token could not be used to authenticate at server.

Technically this is breaking. But it should have no impact on API users as only the framework should use the constructor with the changed parameters.

Additional Notes

  • This PR fixes or works on following ticket(s): SE-13502

Checklist

  • Code change has been tested and works locally
  • Code was formatted via IntelliJ and follows SonarLint & best practices
  • Patch Tasks: Is local execution of Patch Tasks necessary? If so, please also mark the PR with the tag.

- in case the server did return it

Fixes: SE-13502
@mkeckmkeck mkeckmkeck added 💣 BREAKING CHANGE Contains non-backwards compatible changes to public methods or changes the behavior of existing code 🧬 Enhancement Contains new features labels Sep 4, 2024
- as per RFC the containing field is optional
- the accessTokenExpiresAt is not strictly required by our implementations as well
- so make it null in case it cannot be determined from server response

Fixes: SE-13502
@mkeckmkeck mkeckmkeck merged commit a3b5f7b into develop Sep 5, 2024
3 checks passed
@mkeckmkeck mkeckmkeck deleted the feature/SE-13502_oauth_access_validity branch September 5, 2024 05:15
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
💣 BREAKING CHANGE Contains non-backwards compatible changes to public methods or changes the behavior of existing code 🧬 Enhancement Contains new features
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants