-
-
Notifications
You must be signed in to change notification settings - Fork 3.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat(oauth): Improve support for non-web clients such as react native #3474
Conversation
Posting redirect:false to the signon endpoint will now return the redirect url, instead of redirecting to it. This will allow non-web apps, such as those built with react native, to access the codeChallenge, redirectUrl and state, and handle the provider's sign on flow. The app can then call the redirectUrl itself, the the code returned from the provider and the state.
I appreciate this PR, and I understand the confusion, since expanding to other frameworks is currently just a plan (but we intend to work on it the coming year #2294) Although, I'm not sure why this PR is needed 🤔 The whole point of separating Remember, you don't have to import from Here is the one used for Next.js: Am I missing something? |
There is a good chance i'm the one missing something, just trying to get my head around the code here, and in expo, and the oath2 spec. I think the fact that 'core' does http redirects adds to the confusion a little. Perhaps if core was more 'headless' and the redirect code was elsewhere it would help, i'm not sure. In any case, I think i've hit an oauth hurdle at the last step. I've put an example repo here and written up what I was trying and where I got to. Even if this doesn't end up working it might save others some time! https://github.com/stevesouth/next-auth-react-native-expo |
Ah, now I also see json: true is already an option which seems to do exactly the same thing. I think its just missing from the signon endpoint docs? |
Core does not do redirects, and is completely "headless". Here is the redirect handling: Lines 46 to 49 in d1d2d97
Sign-in sets the redirect URL in this file: https://github.com/nextauthjs/next-auth/blob/main/src/core/routes/signin.ts I believe this PR was opened a bit eagerly. The proposed changes seem to be unnecessary for this time. Feel free to add to the discussion in #2294 |
I opened it as draft for this kind of feedback. To be clear:
In the meantime I'll keep documenting any successes or failures here. https://github.com/stevesouth/next-auth-react-native-expo |
This comment was marked as off-topic.
This comment was marked as off-topic.
@stevesouth have you made any progress with attempt 3? |
Reasoning 💡
I have been trying to understand how to extend next auth so that it can be used for react native apps. I think the main change required is to ensure key oauth endpoints optionally support not redirecting and instead return the key information back to the client.
With this change, posting redirect:false to the signon endpoint will now return the redirect url, instead of redirecting to it. This will allow non-web apps, such as those built with react native, to access the codeChallenge, redirectUrl and state, and handle the provider's sign on flow. The app can then call the redirectUrl itself once the provider flow is complete, including the code returned from the provider and the state.
Feedback welcome. I will try and put together an example repo with next auth and react native expo (which also needs a minor change to accept a custom codeChallenge expo/expo#15535).
Checklist 🧢