-
Notifications
You must be signed in to change notification settings - Fork 80
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Corrected app_metadata and user_metadata retrieval. #178
Comments
Comment by skinkie Can confirm this works, at least ... the next problem is... |
Comment by abyrd @landonreed have you tested out this pull request? |
Comment by landonreed When attempting to add the rule to our Auth0 account and clicking 'Try this rule', I get: |
Comment by landonreed Ah, never mind. I was including an underscore in the rule description and Auth0 didn't like that. |
Comment by landonreed Adding this rule does not appear to work for our (pre-September 2017) existing Auth0 account; however, it does work for a test account I created a couple of days ago. In order to accept this PR, the assignment of the
There should also be sufficient comments about what is going on here (the reason for the assignment and wrapping it in an if block) and a reference to this issue and any other Auth0 documentation about the rule that @typhoon2099 provided above. I would also like to see a check for the existence of the scoped fields within this block and an informative error thrown about the Auth0 rule if it is not found. And an update to the docs regarding Auth0 setup would be greatly appreciated. As @skinkie mentioned above, this also depends on a server fix, which we'd be happy to review if anyone has some code that's backwards-compatible. Thanks so much for investigating this! |
Comment by landonreed I've also just discovered that adding the above rule to a pre-September 2017 Auth0 account does not play nicely with applications running with the existing Auth setup. So, I'm not entirely sure this rule/hack is a great path forward. Edit: in other words, when I added the rule to our existing account, authentication seemed to stop working for our applications running the existing code. I'm not sure if there's a way to isolate the application of rules to a single application within an Auth0 tenant. |
Comment by landonreed I have just learned that it is possible to check the clientID on the context arg in the rule. For example:
So for Conveyal's Auth0 tenant, we can apply this rule only to certain applications, which means it won't interfere with our other production applications. Adding this rule and changing the client to get the user profile from a datatools-server endpoint (rather than using the Auth0 Lock |
Comment by landonreed Closing in favor of #250 |
Issue by typhoon2099
Monday Apr 09, 2018 at 15:59 GMT
Originally opened as catalogueglobal#72
app_metadata
anduser_metadata
can't be returned by the userinfo endpoint any more (unless you signed paid for Auth0 before 1st September 2017). This pull request and the following Auth0 rule corrects this:typhoon2099 included the following code: https://github.com/catalogueglobal/datatools-ui/pull/72/commits
The text was updated successfully, but these errors were encountered: