forked from nextauthjs/next-auth
-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Sync #2
Merged
ThangHuuVu
merged 24 commits into
ThangHuuVu:feat/svelte-kit-auth
from
nextauthjs:feat/oauth4webapi-balazs
Dec 12, 2022
Merged
Sync #2
ThangHuuVu
merged 24 commits into
ThangHuuVu:feat/svelte-kit-auth
from
nextauthjs:feat/oauth4webapi-balazs
Dec 12, 2022
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Co-authored-by: Nico Domino <[email protected]>
* fix(next): don't override `Content-Type` by `unstable_getServerSession` * fix(core): handle `,` while setting `set-cookie`
Co-authored-by: Nico Domino <[email protected]>
* fix(core): correctly set status when returning redirect * update tests * forward other headers * update test * remove default 200 status
* rename `host` to `origin` internally * rename `userOptions` to `authOptions` internally * use object for `headers` internally * default `method` to GET * simplify `unstable_getServerSession` * allow optional headers * revert middleware * wip getURL * revert host detection * use old `detectHost` * fix/add some tests wip * move more to core, refactor getURL * better type auth actions * fix custom path support (w/ api/auth) * add `getURL` tests * fix email tests * fix assert tests * custom base without api/auth, with trailing slash * remove parseUrl from assert.ts * return 400 when wrong url * fix tests * refactor * fix protocol in dev * fix tests * fix custom url handling * add todo comments
* fix(core): preserve `set-cookie` by the user * add test * improve req/res mocking * refactor * fix comment typo
Comment on lines
+108
to
+110
src={`${ | ||
provider.style.logo.startsWith("/") ? logos : "" | ||
}${provider.style.logo}`} |
Check warning
Code scanning / CodeQL
Exception text reinterpreted as HTML
[Exception text](1) is reinterpreted as HTML without escaping meta-characters.
Comment on lines
+116
to
+118
src={`${ | ||
provider.style.logo.startsWith("/") ? logos : "" | ||
}${provider.style.logoDark}`} |
Check warning
Code scanning / CodeQL
Exception text reinterpreted as HTML
[Exception text](1) is reinterpreted as HTML without escaping meta-characters.
ThangHuuVu
approved these changes
Dec 12, 2022
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
☕️ Reasoning
🧢 Checklist
🎫 Affected issues
Please scout and link issues that might be solved by this PR.
Fixes: INSERT_ISSUE_LINK_HERE
📌 Resources