Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Introduce a way to override how auth tokens are created #21

Merged
merged 1 commit into from
Jan 21, 2020

Conversation

aleffert
Copy link
Contributor

This creates a new setting PASSWORDLESS_AUTH_TOKEN_CREATOR. This is a
string representing the function used to construct an authentication
token after receiving a valid passwordless token.

Notes: It was not obvious to me how to run the tests, so I did not write tests. Happy to do so with some instructions.

@aleffert aleffert force-pushed the aleffert/swap-tokens branch 2 times, most recently from e2b56e5 to 506469a Compare December 8, 2019 20:26
This creates a new setting PASSWORDLESS_AUTH_TOKEN_CREATOR. This is a
string representing the function used to construct an authentication
token after receiving a valid passwordless token.
@aleffert aleffert force-pushed the aleffert/swap-tokens branch from 506469a to 3750aee Compare December 8, 2019 20:42
@aleffert
Copy link
Contributor Author

aleffert commented Dec 8, 2019

Hi, I totally lost track of this for various reasons. But just went to go take a look at it. I rebased against master, figured out how to run the tests, and fixed the tests that I broke and added one for this change. It sounds like there's some interest in landing this beyond me so would be great to get it in

@aaronn
Copy link
Owner

aaronn commented Jan 21, 2020

Looking at it now.

@aaronn aaronn merged commit 1b5d38c into aaronn:master Jan 21, 2020
@aleffert
Copy link
Contributor Author

Thanks!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants