-
Notifications
You must be signed in to change notification settings - Fork 115
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat(auth-provider): add support for oidc auth provider #338
Conversation
🦋 Changeset detectedLatest commit: a8df220 The changes in this PR will be included in the next version bump. This PR includes changesets to release 1 package
Not sure what this means? Click here to learn what changesets are. Click here if you're a maintainer who wants to add another changeset to this PR |
@plmercereau can you help me with failing pipeline... |
done |
Tested with Keycloak. Supports basic and common flows and configurations. The authorization URL differs between different OIDC providers, some ends with @plmercereau can you take a look, it's rather simple thanks to your quite nice and comprehensive grant integration. |
Hey @elitan can you check why the pipeline is failing? Do I need to do something further to get this merged? |
This PR would be awesome to have in NHost :) I can't work out why the signout test in the pipeline is failing but @elitan if you have time it would be much appreciated |
Hi @szilarddoro & @elitan, Is there any update on this please? Would be very useful addition to Hasura Auth, seems like there is a fair amount of interest Hope you're both well! |
closes #253
closes #218
References:
Before submitting this PR:
Checklist
Breaking changes
Avoid breaking changes and regressions. If you feel it is unavoidable, make it explicit in your PR comment so we can review it and see how to handle it.
Tests
make test
or themake watch
command).Documentation
Please make sure the documentation is updated accordingly, in particular: