You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Same behaviour as golang in respect to https:// being added for you if missing and a default issuer path added if there's no path after the domain.
This has been a blocker for us because Zitadel uses /oauth/v2/token as its token endpoint, so the JS SDK is trying to call https://auth.example.com/oauth/v2/token/oauth/token instead of https://auth.example.com/oauth/v2/token.
Expectation
All the SDKs to have the same configuration interface so I can use OIDC.
Reproduction
Try to use OIDC auth on OpenFGA with the JS SDK.
Use an Oauth2 provider with a non default path to the token off the base domain.
Fail to get token.
OpenFGA SDK version
0.6.2
OpenFGA version
1.5.8
The text was updated successfully, but these errors were encountered:
Checklist
Description
There's a feature gap in the JS SDK that's causing us to be unable to use OIDC auth in the SDK (and it's inconsistent elsewhere too).
Golang (I'm taking to be the reference SDK by default here):
JS:
js-sdk/credentials/credentials.ts
Line 147 in dc44d69
Python:
Dotnet:
Java:
This has been a blocker for us because Zitadel uses
/oauth/v2/token
as its token endpoint, so the JS SDK is trying to callhttps://auth.example.com/oauth/v2/token/oauth/token
instead ofhttps://auth.example.com/oauth/v2/token
.Expectation
All the SDKs to have the same configuration interface so I can use OIDC.
Reproduction
OpenFGA SDK version
0.6.2
OpenFGA version
1.5.8
The text was updated successfully, but these errors were encountered: