-
Notifications
You must be signed in to change notification settings - Fork 3
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update browser authorization to oidc-client-ts #88
Update browser authorization to oidc-client-ts #88
Conversation
oidc-client-ts is the currently active fork of oidc-client-js. While the API is mostly identical, oidc-client-ts does make some breaking changes in its client constructor. This has the direct effect of requiring more upfront configuration in order to call Because oidc-client-ts no longer permits authority and clientId to be loaded from the state during a callback, a callback handler must be created for each authority/clientId combination. Otherwise, the state will not be loaded due to mismatching configuration. This is of concern to any non-IMS services or extensions which utilize BrowserAuthorizationClient (like the SafetiBase frontstage in Design Review), since they are reliant on the parent app to handle callbacks for them. |
...rowser-authorization/evelyn.preslar-browser-auth-update-oidc-client-ts_2022-10-05-20-04.json
Outdated
Show resolved
Hide resolved
This PR still needs a codeowner review before it can be merged. |
@aruniverse trying to follow this. It's definitely a breaking change - do we need to test or update anything dependent on this package? |
yea im worried what the fallout of this will look like. @mattbjordan can you pull this into a cospace with a viewer and see what happens? |
Will do. Gotta figure out how to use cospace though as I haven't needed to before. |
So, I got the cospace working and was able to run the viewer and connect to an iModel just fine. The only thing I had to change was having to use a Before await BrowserAuthorizationCallbackHandler.handleSigninCallback(
oidcConfiguration.redirectUri
); After await BrowserAuthorizationCallbackHandler.handleSigninCallback({
redirectUri: oidcConfiguration.redirectUri,
clientId: oidcConfiguration.clientId,
authority: oidcConfiguration.authority // optional
}); Is there anything specific that you'd want me to test while I have this environment set up? |
|
...rowser-authorization/evelyn.preslar-browser-auth-update-oidc-client-ts_2022-10-05-20-04.json
Outdated
Show resolved
Hide resolved
...rowser-authorization/evelyn.preslar-browser-auth-update-oidc-client-ts_2022-10-05-20-04.json
Outdated
Show resolved
Hide resolved
This reverts commit e8d420e.
This reverts commit 8c3d141.
No description provided.