Open aschlumpf opened 1 year ago
I have verified that the argument discrepancy for the verify
function is the issue by forking passport-auth0 and running that fork within my CMS.
You can see what I did here: https://github.com/aschlumpf/passport-auth0/pull/1/commits/56ccb3d590b1ac308c2b2772578dc650175af7c3
I can try to PR this change into the passport-auth0 project, but it seems like the arguments in the verify
function may not be a bug from reading their README: https://github.com/auth0/passport-auth0#customization
Yes, it is difficult to be compatible with 100% of passport backends because of the (somewhat maddening) lack of standardization on this issue in particular. Modules that follow the same general patterns as the common oauth-based modules written by passport's author will fare best "out of the box."
The best resolution is probably for us to provide a new per-strategy option allowing you to supply a custom function to remap the parameters for success in these situations.
That makes sense that there are no standards for this issue, I was unsure if there was a standard that passport-auth0 was breaking here. The custom function approach sounds like a good solution for these cases, since I am guessing the most used passport libraries are not breaking this unwritten convention.
To Reproduce
Step by step instructions to reproduce the behavior:
Expected behavior
Describe the bug
Details
Version of Apostrophe @apostrophecms-pro/multisite v3.9.4
Version of Node.js: Node.js v16.16.0
Server Operating System: macOS 12.5.1
Additional context:
Screenshots I can provide screenshots, just please contact me directly.