Skip to content

Commit 457eab8

Browse files
authored
Merge pull request #3966 from ralfhandl/v3.0.4/sync-with-3.1.1
Sync 3.0.4 with 3.1.1
2 parents 5802ec8 + f9dc2ef commit 457eab8

File tree

1 file changed

+4
-3
lines changed

1 file changed

+4
-3
lines changed

versions/3.0.4.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2744,13 +2744,12 @@ The OpenAPI Specification allows combining and extending model definitions using
27442744
`allOf` takes an array of object definitions that are validated *independently* but together compose a single object.
27452745

27462746
While composition offers model extensibility, it does not imply a hierarchy between the models.
2747-
To support polymorphism, the OpenAPI Specification adds the `discriminator` field.
2747+
To support polymorphism, the OpenAPI Specification adds the [`discriminator`](#schemaDiscriminator) field.
27482748
When used, the `discriminator` indicates the name of the property that hints which schema definition is expected to validate the structure of the model.
27492749
As such, the `discriminator` field MUST be a required field.
27502750
There are two ways to define the value of a discriminator for an inheriting instance.
27512751
- Use the schema name.
2752-
- Override the schema name by overriding the property with a new value. If a new value exists, this takes precedence over the schema name.
2753-
As such, inline schema definitions, which do not have a given id, *cannot* be used in polymorphism.
2752+
- [Override the schema name](#discriminatorMapping) by overriding the property with a new value. If a new value exists, this takes precedence over the schema name.
27542753

27552754
###### XML Modeling
27562755

@@ -3606,7 +3605,9 @@ animals:
36063605
#### <a name="securitySchemeObject"></a>Security Scheme Object
36073606

36083607
Defines a security scheme that can be used by the operations.
3608+
36093609
Supported schemes are HTTP authentication, an API key (either as a header, a cookie parameter or as a query parameter), OAuth2's common flows (implicit, password, client credentials and authorization code) as defined in [RFC6749](https://tools.ietf.org/html/rfc6749), and [OpenID Connect Core](https://openid.net/specs/openid-connect-core-1_0.html).
3610+
Please note that as of 2020, the implicit flow is about to be deprecated by [OAuth 2.0 Security Best Current Practice](https://tools.ietf.org/html/draft-ietf-oauth-security-topics). Recommended for most use case is Authorization Code Grant flow with PKCE.
36103611

36113612
##### Fixed Fields
36123613
Field Name | Type | Applies To | Description

0 commit comments

Comments
 (0)