-
Notifications
You must be signed in to change notification settings - Fork 425
fix: Throw ConfigurationError when invalid Auth0Client configuration #2026
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Codecov ReportAttention: Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## main #2026 +/- ##
==========================================
+ Coverage 74.82% 79.65% +4.83%
==========================================
Files 21 21
Lines 1863 1922 +59
Branches 289 314 +25
==========================================
+ Hits 1394 1531 +137
+ Misses 462 385 -77
+ Partials 7 6 -1 ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
9d9f43f
to
3c864e0
Compare
these review comments have been resolved
…/auth0/nextjs-auth0 into feature/configuration-validation
Again breaking change... below was used to be a valid setup. We could run import { Auth0Client } from "@auth0/nextjs-auth0/server";
const auth0 = new Auth0Client({
domain: process.env.AUTH0_DOMAIN,
secret: process.env.AUTH0_SECRET,
appBaseUrl: process.env.APP_BASE_URL,
clientId: process.env.AUTH0_CLIENT_ID,
clientSecret: process.env.AUTH0_CLIENT_SECRET,
authorizationParameters: { scope: "openid profile email offline_access" },
});
export default auth0; |
How to initialise |
Like @ik-southpole mentioned, this caused a breaking change to us as well. Please use the proper semantic title for breaking changes. |
This is a breaking change for us as well |
This PR enhances the configuration validation in the Auth0Client class by adding a dedicated error class for configuration errors and improving error reporting.
📋 Changes
📎 References
🎯 Testing
PASSING