-
Notifications
You must be signed in to change notification settings - Fork 2.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Enhance OIDC Client to support the token revocation #26868
Enhance OIDC Client to support the token revocation #26868
Conversation
de3599a
to
2d49748
Compare
@pedroigor Have a look please when you get a chance. The main initial use case is for users of Keycloak (and other providers which support the revocation) be able to proactively revoke a given access token without going the whole refresh process, and for some providers it can be the only option if no RT is available. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@sberyozkin Yeah, it should be useful for those looking for revoking the AT. You did almost everything to enable RT too :)
Thanks @pedroigor, let me resolve the conflict and rebuild |
2d49748
to
a630176
Compare
This comment has been minimized.
This comment has been minimized.
a630176
to
6923576
Compare
During the rebase I lost the code moved in the original PR from |
This comment has been minimized.
This comment has been minimized.
Hmm... |
6923576
to
a1c3921
Compare
This test ( |
Fixes #26867
Keeping this PR as a draft until I figure out how to test it.
I just had to refactor
OidcClientImpl
a little bit to reuse the code which is used to post a request.quarkus-oidc
may also support it in the next phase (ex, to revoke the failed bearer tokens, on local logouts, etc).CC @FroMage, FYI,
OidcClient
can also be configured to talk to Apple OIDC