feat: add generic oidc provider#25
Conversation
# Conflicts: # src/runtime/server/lib/oauth/auth0.ts
# Conflicts: # src/runtime/server/lib/oauth/auth0.ts
534b278 to
4081637
Compare
|
Happy to fix the conflicts and update the readme? No idea what oidc is 😅 |
|
@atinux "oidc" is OpenID Connect Will update the readme and fix the conflicts. |
4493d90 to
d4b211d
Compare
|
This looks like a great addition! I have some suggestions/feedback regarding the implementation:
EDIT:
|
|
@itpropro thank you for the feedback! I will try to incorporate it. |
* main: chore(release): v0.0.15 chore: up deps feat: added aws cognito provider (atinux#36) feat: add auth0 connection parameter to config (atinux#39) fix: replace encoded space characters with regular spaces (atinux#40) chore(release): v0.0.14 chore: update deps feat: added keycloak as oauth provider (atinux#23) chore: test bundler module resolution (atinux#32) chore(release): v0.0.13 chore: rename session from verify to fetch chore(release): v0.0.12 fix: correct arguments for hooks chore(release): v0.0.11 feat: add sessionHooks to extend user sessions
|
Any progress on this? Have a project that i would love to test the oidc implementation on |
|
They are still some conflicts and I would like to have the readme updated in order for users to understand how to use it. Happy to take a stab at it? |
|
Don't know enough auth and openid spec to be able to do that 😢 |
|
Hi @atinux and @maximilianmikus, it seems no one is taking up the topic again, do you need help? |
septatrix
left a comment
There was a problem hiding this comment.
I would really love to seem this move forward as this is currently our blocker for using this library. We currently vendor a similar change (basically adjusting the Keycloak handler) on a feature branch for a while now and are really happy with it
| ...authParam | ||
| ======= | ||
| connection: config.connection || '' | ||
| >>>>>>> main |
There was a problem hiding this comment.
There is a remainder of a merge conflict here
|
I am up for that, but why do we need to update the Auth0 provider in this pull request? |
|
any update with that ? |
|
any updates/eta? |
|
Hey, I created the PR #444 which should replace / complete this PR :) |
WIP
This PR is based upon #12
This PR adds a generic provider for OIDC. It currently supports the 'code' response type / grant type 'authorization_code' and also optionally 'pkce'. Other response types and grant type combinations are not yet tested, but might in some cases already work.
Feedback welcome.