Skip to content

fix(oauth): add client id to token exchange#2805

Closed
davidkl97 wants to merge 1 commit intogoogle:mainfrom
davidkl97:fix/oauth-exchange-token
Closed

fix(oauth): add client id to token exchange#2805
davidkl97 wants to merge 1 commit intogoogle:mainfrom
davidkl97:fix/oauth-exchange-token

Conversation

@davidkl97
Copy link
Copy Markdown
Contributor

@davidkl97 davidkl97 commented Aug 31, 2025

fixes #2806
add client id to token request, adhering to RFC 6749

@google-cla
Copy link
Copy Markdown

google-cla bot commented Aug 31, 2025

Thanks for your pull request! It looks like this may be your first contribution to a Google open source project. Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA).

View this failed invocation of the CLA check for more information.

For the most up to date status, view the checks section at the bottom of the pull request.

Copy link
Copy Markdown
Contributor

@gemini-code-assist gemini-code-assist bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Summary of Changes

Hello @davidkl97, I'm Gemini Code Assist1! I'm currently reviewing this pull request and will post my feedback shortly. In the meantime, here's a summary to help you and other reviewers quickly get up to speed!

This pull request refines the OAuth2 token exchange mechanism by incorporating the client ID into the request. This modification is crucial for aligning with the OAuth 2.0 specification, thereby improving the security and standard compliance of the authentication flow.

Highlights

  • OAuth Compliance: The pull request adds the client_id parameter to the token exchange request, ensuring adherence to RFC 6749, section 4.1.3.
Using Gemini Code Assist

The full guide for Gemini Code Assist can be found on our documentation page, here are some quick tips.

Invoking Gemini

You can request assistance from Gemini at any point in your pull request via creating an issue comment (i.e. comment on the pull request page) using either /gemini <command> or @gemini-code-assist <command>. Below is a summary of the supported commands.

Feature Command Description
Code Review /gemini review Performs a code review for the current pull request in its current state.
Pull Request Summary /gemini summary Provides a summary of the current pull request in its current state.
Comment @gemini-code-assist Responds in comments when explicitly tagged, both in issue comments and review comments.
Help /gemini help Displays a list of available commands.

Customization

To customize Gemini Code Assist for GitHub experience, repository maintainers can create a configuration file and/or provide a custom code review style guide (such as PEP-8 for Python) by creating and adding files to a .gemini/ folder in the base of the repository. Detailed instructions can be found here.

Limitations & Feedback

Gemini Code Assist may make mistakes. Please leave feedback on any instances where its feedback is incorrect or counter productive. You can react with 👍 and 👎 on @gemini-code-assist comments. If you're interested in giving your feedback about your experience with Gemini Code Assist for Github and other Google products, sign up here.

You can also get AI-powered code generation, chat, as well as code reviews directly in the IDE at no cost with the Gemini Code Assist IDE Extension.

Footnotes

  1. Review the Privacy Notices, Generative AI Prohibited Use Policy, Terms of Service, and learn how to configure Gemini Code Assist in GitHub here. Gemini can make mistakes, so double check it and use code with caution.

@davidkl97 davidkl97 force-pushed the fix/oauth-exchange-token branch from b1f4d1e to 3fda17f Compare August 31, 2025 17:46
@adk-bot
Copy link
Copy Markdown
Collaborator

adk-bot commented Aug 31, 2025

Response from ADK Triaging Agent

Hello @davidkl97, thank you for creating this PR!

This PR is a bug fix, could you please associate the github issue with this PR? If there is no existing issue, could you please create one?

In addition, could you please provide logs or screenshot after the fix is applied?

This information will help reviewers to review your PR more efficiently. Thanks!

Copy link
Copy Markdown
Contributor

@gemini-code-assist gemini-code-assist bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Code Review

This pull request correctly adds the client_id to the OAuth2 token exchange request, which is a good practice for ensuring compatibility with various OAuth2 providers. The change is sound. I've included one minor suggestion to improve code formatting by removing an unnecessary blank line.

@davidkl97 davidkl97 force-pushed the fix/oauth-exchange-token branch from 3fda17f to 00539fa Compare August 31, 2025 17:48
@davidkl97 davidkl97 force-pushed the fix/oauth-exchange-token branch from 00539fa to 3366dce Compare August 31, 2025 17:49
@adk-bot adk-bot added bot triaged core [Component] This issue is related to the core interface and implementation labels Aug 31, 2025
@adk-bot adk-bot requested a review from Jacksunwei August 31, 2025 17:56
@davidkl97
Copy link
Copy Markdown
Contributor Author

Hey @Jacksunwei , can you review this please?

@xuanyang15
Copy link
Copy Markdown
Collaborator

@davidkl97 Thanks for creating this PR! Have you verified it works as expected end to end?

@davidkl97
Copy link
Copy Markdown
Contributor Author

Hey @xuanyang15 , yes it works as expected once client id is passed

@xuanyang15 xuanyang15 self-assigned this Dec 1, 2025
copybara-service bot pushed a commit that referenced this pull request Dec 4, 2025
Merge #2805

fixes #2806
add client id to token request, adhering to [RFC 6749](https://datatracker.ietf.org/doc/html/rfc6749#section-4.1.3)

Co-authored-by: Xuan Yang <xygoogle@google.com>
COPYBARA_INTEGRATE_REVIEW=#2805 from davidkl97:fix/oauth-exchange-token 3366dce
PiperOrigin-RevId: 840369113
@adk-bot
Copy link
Copy Markdown
Collaborator

adk-bot commented Dec 4, 2025

Thank you @davidkl97 for your contribution! 🎉

Your changes have been successfully imported and merged via Copybara in commit f273517.

Closing this PR as the changes are now in the main branch.

@adk-bot adk-bot closed this Dec 4, 2025
joar added a commit to joar/adk-python that referenced this pull request Mar 10, 2026
Authlib's OAuth2Session already handles client_id placement for all
token_endpoint_auth_method values (client_secret_basic puts it in the
Authorization header, client_secret_post and none put it in the body).

Passing client_id as a kwarg to fetch_token causes it to be added to
the POST body unconditionally via prepare_token_request, in addition
to whatever the auth method does. This breaks providers like Slack
that infer auth method from the presence of client_id in the body,
and causes duplicate client_id for client_secret_post.

Partially reverts f273517 (PR google#2805), which was based on a
misreading of RFC 6749 §4.1.3 — client_id in the body is only
REQUIRED "if the client is not authenticating with the authorization
server as described in Section 3.2.1."

Made-with: Cursor
joar added a commit to joar/adk-python that referenced this pull request Mar 10, 2026
Authlib's OAuth2Session already handles client_id placement for all
token_endpoint_auth_method values (client_secret_basic puts it in the
Authorization header, client_secret_post and none put it in the body).

Passing client_id as a kwarg to fetch_token causes it to be added to
the POST body unconditionally via prepare_token_request, in addition
to whatever the auth method does. This breaks providers like Slack
that infer auth method from the presence of client_id in the body,
and causes duplicate client_id for client_secret_post.

Partially reverts f273517 (PR google#2805), which was based on a
misreading of RFC 6749 §4.1.3 — client_id in the body is only
REQUIRED "if the client is not authenticating with the authorization
server as described in Section 3.2.1."

Made-with: Cursor
joar added a commit to joar/adk-python that referenced this pull request Mar 10, 2026
Authlib's OAuth2Session already handles client_id placement for all
token_endpoint_auth_method values (client_secret_basic puts it in the
Authorization header, client_secret_post and none put it in the body).

Passing client_id as a kwarg to fetch_token causes it to be added to
the POST body unconditionally via prepare_token_request, in addition
to whatever the auth method does. This breaks providers like Slack
that infer auth method from the presence of client_id in the body,
and causes duplicate client_id for client_secret_post.

Partially reverts f273517 (PR google#2805), which was based on a
misreading of RFC 6749 §4.1.3 — client_id in the body is only
REQUIRED "if the client is not authenticating with the authorization
server as described in Section 3.2.1."

Made-with: Cursor
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

core [Component] This issue is related to the core interface and implementation

Projects

None yet

Development

Successfully merging this pull request may close these issues.

oauth exchange code of token getting 400 BAD REQUEST as client id is required

4 participants