Skip to content

Commit cf22f42

Browse files
fixing merge conflict errors
1 parent e5aa25b commit cf22f42

3 files changed

Lines changed: 9 additions & 44 deletions

File tree

api/server/controllers/AuthController.js

Lines changed: 8 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -78,17 +78,13 @@ const refreshController = async (req, res) => {
7878
logger.warn(
7979
'[refreshController] No OpenID refresh token available, falling back to standard refresh',
8080
);
81-
// Fall through to standard refresh logic below
82-
} else {
83-
// We have a refresh token, use OpenID refresh flow
84-
try {
81+
return res.status(200).send('Refresh token not provided');
82+
}
83+
84+
// We have a refresh token, use OpenID refresh flow
85+
try {
8586
const openIdConfig = getOpenIdConfig();
86-
const refreshParams = process.env.OPENID_SCOPE ? { scope: process.env.OPENID_SCOPE } : {};
87-
const tokenset = await openIdClient.refreshTokenGrant(
88-
openIdConfig,
89-
refreshToken,
90-
refreshParams,
91-
);
87+
const tokenset = await openIdClient.refreshTokenGrant(openIdConfig, refreshToken);
9288
const claims = tokenset.claims();
9389
const { user, error, migration } = await findOpenIDUser({
9490
findUser,
@@ -132,10 +128,8 @@ const refreshController = async (req, res) => {
132128
};
133129

134130
return res.status(200).send({ token, user });
135-
} catch (error) {
136-
logger.error('[refreshController] OpenID token refresh error', error);
137-
// Fall through to standard refresh logic as fallback
138-
}
131+
} catch (error) {
132+
logger.error('[refreshController] OpenID token refresh error', error);
139133
}
140134
}
141135

api/server/socialLogins.js

Lines changed: 0 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -16,36 +16,6 @@ const {
1616
} = require('~/strategies');
1717
const { getLogStores } = require('~/cache');
1818

19-
20-
/**
21-
* Configures Solid OpenID Connect for the application.
22-
* @param {Express.Application} app - The Express application instance.
23-
* @returns {Promise<void>}
24-
*/
25-
async function configureSolidOpenId(app) {
26-
logger.info('Configuring Solid OpenID Connect...');
27-
const sessionOptions = {
28-
secret: process.env.SOLID_OPENID_SESSION_SECRET,
29-
resave: false,
30-
saveUninitialized: false,
31-
store: getLogStores(CacheKeys.OPENID_SESSION),
32-
};
33-
app.use(session(sessionOptions));
34-
app.use(passport.session());
35-
36-
const config = await setupSolidOpenId();
37-
if (!config) {
38-
logger.error('Solid OpenID Connect configuration failed - strategy not registered.');
39-
return;
40-
}
41-
42-
if (isEnabled(process.env.OPENID_REUSE_TOKENS)) {
43-
logger.info('Solid OpenID token reuse is enabled.');
44-
passport.use('solidJwt', openIdJwtLogin(config));
45-
}
46-
logger.info('Solid OpenID Connect configured successfully.');
47-
}
48-
4919
/**
5020
* Configures Solid OpenID Connect for the application.
5121
* @param {Express.Application} app - The Express application instance.

package-lock.json

Lines changed: 1 addition & 0 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

0 commit comments

Comments
 (0)