fix redirect uri validation to allow apps like: com.my.app:/ #243
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR fixes a bug where valid mobile redirect URLs (e.g., custom schemes like com.my.app:/) were incorrectly rejected by the URL validation logic. Such redirect URIs are commonly used by mobile apps for OAuth flows and deep linking, and should be considered valid.
To clarify the issue and ensure it doesn’t regress in the future, I’ve also added a test case demonstrating the expected behavior with these kinds of URLs.
This is one way to solve the problem. Feel free to use a different solution if you prefer.
Here are some information about it: https://curity.io/resources/learn/oauth-for-mobile-apps-best-practices/
Changes:
Fixed the redirect URL validation logic to correctly handle custom mobile schemes
Added a unit test to verify acceptance of valid mobile redirect URIs
Test: ✅ Added test code to assert acceptance of com.my.app:/-style URLs
Test Code