-
Notifications
You must be signed in to change notification settings - Fork 92
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Improved OIDC compliance #97
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@davidpatrick - I might be missing something here ... added a number of comments here and I'll pause before continuing the review.
Also, it looks like you're testing the different parts of the verification but not the whole process (so we can make sure all this logic is for sure getting called). I was looking for a test to show me how jwt.verify()
was getting called. The existing tests should help show if that's even possible and how.
8946dfc
to
160f081
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Have a number of fixes that need to happen.
I'm just curious on the actual verification logic ... why not just copy in the JS sample? Would have saved some extra work and kept it standard. Besides the signature check, can use it almost exactly as-is.
aa3e358
to
a96de9a
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Few more fixes here. Might want to get a Passport app running with the quickstart and make sure this branch works for you as well.
1aad1db
to
05e1449
Compare
da36735
to
7667fe9
Compare
7667fe9
to
7f50103
Compare
@gkwang - Ready for your review! |
Can we also make sure we bump passport-oauth2's version to 1.5.0 before we release a new version? It contains all the PKCE changes. jaredhanson/passport-oauth2@v1.4.0...jaredhanson:v1.5.0 |
ad50d68
to
09f1814
Compare
Changes
This update improves the SDK support for OpenID Connect. In particular, it modifies the sign in verification phase by substituting backchannel based checks with id_token validation.
References
Internal Docs
Testing
This change adds test coverage
This change has been tested on the latest stable version of Node.js
Checklist
I have read the Auth0 general contribution guidelines
I have read the Auth0 Code of Conduct
All existing and new tests complete without errors