The most scalable and customizable OpenID Certified™ OpenID Connect and OAuth Provider on the market. Become an OpenID Connect and OAuth2 Provider over night. Broad support for related RFCs. Written in Go, cloud native, headless, API-first. Available as a service on Ory Network and for self-hosters.
👋🏻 I am new here so I apologize in advance for what is likely a contribution that needs work so I am happy to take plenty of feedback and work towards whatever solution makes the most sense.
The goal of this is to add a concise (and safe) way to specify some negative matching criteria on the HTTP API by expanding the way the query parameters are interpreted when requesting a list of OAuth2 Clients.
[x] I confirm that this pull request does not address a security
vulnerability. If this pull request addresses a security vulnerability, I
confirm that I got the approval (please contact
security@ory.sh) from the maintainers to push
the changes.
[x] I have added tests that prove my fix is effective or that my feature
works.
👋🏻 I am new here so I apologize in advance for what is likely a contribution that needs work so I am happy to take plenty of feedback and work towards whatever solution makes the most sense.
The goal of this is to add a concise (and safe) way to specify some negative matching criteria on the HTTP API by expanding the way the query parameters are interpreted when requesting a list of OAuth2 Clients.
Related issue(s)
3804
Checklist
Further Comments
Before I forget to mention it, thank you for this wonderful software!