- May 12, 2021
-
-
Reiter, Christoph authored
-
- Feb 24, 2021
-
-
Neuber, Eugen Ramon authored
-
- Feb 22, 2021
-
-
Bekerle, Patrizio authored
-
- Feb 15, 2021
-
-
Neuber, Eugen Ramon authored
See issue #46
-
- Feb 03, 2021
-
-
Neuber, Eugen Ramon authored
-
- Feb 02, 2021
-
-
Bekerle, Patrizio authored
-
- Feb 01, 2021
-
-
Bekerle, Patrizio authored
-
- Jan 28, 2021
-
-
Reiter, Christoph authored
It was only used in the demo.
-
- Jan 26, 2021
-
-
Bekerle, Patrizio authored
-
- Nov 17, 2020
-
-
Reiter, Christoph authored
They were hardcoded in more places
-
Reiter, Christoph authored
Add a scope so we don't have to care about naming conflicts and set the verison to 0.1.0 since we don't have a stable API yet.
-
- Jul 14, 2020
-
-
Bekerle, Patrizio authored
-
- Jul 01, 2020
-
-
Reiter, Christoph authored
-
Reiter, Christoph authored
Now that we have a separate component for keyclaok we can move those keycloak specific settings into their own attributes.
-
Reiter, Christoph authored
This should make it more clear what the components are used for
-
Reiter, Christoph authored
vpu-auth listens to login/logout events which the button emits and the button shows data from the auth-update event.
-
Reiter, Christoph authored
By setting a max-width on the element it will use ellipsis to shorten the user name
-
Reiter, Christoph authored
-
Reiter, Christoph authored
We don't want to depend on harcoded values in the build
-
Reiter, Christoph authored
No longer needed
-
Reiter, Christoph authored
-
Reiter, Christoph authored
These scopes get used for the keycloak login and in case they are registered as optional scopes for that client get added to the access token. See #7
-
Reiter, Christoph authored
This makes it easier to test actual requests and to debug the token content
-
Reiter, Christoph authored
We need to override everything on the prod server, and having everything in one object makes it clear what is keycloak specific (we could also prefix everything...).
-
Reiter, Christoph authored
With the new ability to log in without redirecting to keycloak and reloading the page we can now try to login on start every time. Instead of remembering the login state in the session storage we just ask keycloak in an iframe on start. To better describe this new behaviour rename the attribute from remember-login to try-login.
-
Reiter, Christoph authored
The newest keycloak library supporst a mode for doing the redirect in an iframe with a separate page that needs to be whitelisted in keycloak. The newer version also finally fixes the native promise bugs so we might as well use the one from npm instead of fetching it from the keycloak server at runtime.
-
Reiter, Christoph authored
No final design, just a start.
-
-
TODO: rollup.config.js cleanup
-
Reiter, Christoph authored
-
-
Reiter, Christoph authored
We keep the login state in the session storage and force a login in case the user was logged in before. This means a page refresh will try to restore the login state (which usually should mean that it just flashes becasue of redirects). And new visitors get the logged out state by default.
-
Reiter, Christoph authored
-
Reiter, Christoph authored
-
Reiter, Christoph authored
-
-
Reiter, Christoph authored
The main entry point is now src/index.js when included in other packages.
-
-
-