Skip to content

Conversation

@madmonkey
Copy link
Contributor

…ethod: implicit (default), S256 and plain). Made the login async to support nested promise (breaking-change?)

2 additional pieces of metadata included from options to be carried over response_mode and acr_values. (There may be more - but this is what I currently know) I've maintained the current formatting and styling as best I could.

Example usage: myauthority: { scheme: 'oauth2', authorization_endpoint:[your endpoint], access_token_endpoint:[your endpoint], ... code_challenge_method:'S256', acr_values: 'UserType:something meaningful:info', response_mode: 'query' } 

Inspiration and resources:
https://developer.okta.com/blog/2019/05/01/is-the-oauth-implicit-flow-dead
https://www.oauth.com/oauth2-servers/pkce/

…ethod: implicit (default), S256 and plain). Made the login async to support nested promise (breaking-change?) 2 additional pieces of metadata included from options to be carried over response_mode and acr_values. (There may be more - but this is what I currently know) I've maintained the current formatting and styling as best I could. Example usage: myauthority: { scheme: 'oauth2', authorization_endpoint:[your endpoint], access_token_endpoint:[your endpoint], ... code_challenge_method:'S256', acr_values: 'UserType:something meaningful:info', response_mode: 'query' } Inspiration and resources: https://developer.okta.com/blog/2019/05/01/is-the-oauth-implicit-flow-dead https://www.oauth.com/oauth2-servers/pkce/
@codecov
Copy link

codecov bot commented Dec 23, 2019

Codecov Report

Merging #507 into dev will not change coverage.
The diff coverage is n/a.

Impacted file tree graph

@@ Coverage Diff @@ ## dev #507 +/- ## ========================================= Coverage 100.00% 100.00% ========================================= Files 1 1 Lines 2 2 ========================================= Hits 2 2 

Continue to review full report at Codecov.

Legend - Click here to learn more
Δ = absolute <relative> (impact), ø = not affected, ? = missing data
Powered by Codecov. Last update b9d0555...f0d7533. Read the comment docs.

@atinux atinux requested a review from pi0 December 26, 2019 12:58
@atinux
Copy link
Contributor

atinux commented Dec 26, 2019

This sounds good to me, can you update the documentation as well please?

I let @pi0 review this PR since he knows better than me this module

@madmonkey
Copy link
Contributor Author

I added the additional parameters to the markdown file, along with additional reference links. I found that I needed to add the original code_verification parameter to the token request (during testing). So I included that as well. Let me know if there is anything else that is required I will try and check back more frequently. Thanks.

@ldiebold ldiebold mentioned this pull request Mar 11, 2020
@madmonkey
Copy link
Contributor Author

Any reviewers available? Already on another project and would like to see this pulled in. Thanks.

Copy link
Collaborator

@JoaoPedroAS51 JoaoPedroAS51 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hi! Thank you for the PR! Nice work! 😃 I left some comments.

@JoaoPedroAS51
Copy link
Collaborator

Hi @madmonkey! I manually merged this PR due to branch conflicts :) baf9b57

@p-m-j
Copy link

p-m-j commented Aug 4, 2020

I take it this hasn't made it into release yet, any ETA?

Apologies, I did more reading, prep for v5 occuring

https://www.npmjs.com/package/@nuxtjs/auth-next
https://dev.auth.nuxtjs.org/schemes/oauth2.html#options

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

6 participants