-
Notifications
You must be signed in to change notification settings - Fork 258
feat(oidc-auth): support empty OIDC client secret #1126
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
🦋 Changeset detectedLatest commit: 215f376 The changes in this PR will be included in the next version bump. This PR includes changesets to release 1 package
Not sure what this means? Click here to learn what changesets are. Click here if you're a maintainer who wants to add another changeset to this PR |
|
Can you run |
Codecov ReportAttention: Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## main #1126 +/- ##
==========================================
- Coverage 79.53% 79.50% -0.03%
==========================================
Files 77 77
Lines 2282 2284 +2
Branches 578 580 +2
==========================================
+ Hits 1815 1816 +1
- Misses 391 392 +1
Partials 76 76
Flags with carried forward coverage won't be shown. Click here to find out more. ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
|
Hi @hnw! Can you review this? We should add tests, but if it's difficult, it's okay not to. |
f9a5929 to
7eee61b
Compare
|
I ran yarn changeset, hope I did this right |
7eee61b to
215f376
Compare
|
all good now? |
|
ping to get this landed |
|
Can you write a proper test? |
|
@tarasglek I understand that your proposal aims to support the On the other hand, the Regarding this point, I would also like to investigate further, for instance by checking LastLogin's documentation for their recommended settings when used as a Confidential Client. If you happen to know of any information (like documentation) from LastLogin regarding recommended settings for Confidential Clients or security considerations when using We would appreciate further discussion on whether there's a safe way to support |
I spent a few hours on this, I can't. When you setup .env for lastpass like: with You get From oauth4webapi. I think this means I'd have to mock responses from oauth server to repro this...that's too hard for me.
Their policy on this is https://lastlogin.net/developers/ I would really like to use hono oidc without a client secret, as this is the most straight-forward oidc lib I found so far. |
|
I am a little embarrassed to note, that lastlogin does work if I put in a random non-blank client_secret. Maybe @anderspitman, could change docs to put in any value in client_secret and this is a lastlogin instruction bug. |
|
Yeah that makes sense @tarasglek. I opened an issue for it. @hnw re: confidential clients. LastLogin is almost entirely stateless (other than rate limiting), so I'm not really sure of a good way to persist a client_secret. Since PKCE is considered good enough for public clients, I've always considered it good enough for all clients. Obviously a secret adds defense in depth, but I don't think it's strictly necessary. If you have anything I can read that contradicts that, I'd be happy to look at it. PS - thanks for your work on hono! |
Hi,
I found that this library does not work with https://lastlogin.net/developers/
Would a change like this be ok?