-
Notifications
You must be signed in to change notification settings - Fork 121
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Do you care about managing vulnerabilities? #55
Comments
Hey @adriatic, thanks for the report. We do care about managing vulnerabilities! We're working on these now and will update the samples soon. |
Great to see that you provided the only reasonable response to my question - and that you responded so quickly, @nbarbettini. As I am preparing for a large project in the healthcare domain for one of your important customers, your reaction gives me a great relief 😄 Thank you Nate. |
@nbarbettini almost two years passed since your comment above - and running
After running this command, the situation seems a lot better:
After this correction, there are several other instructions on how to bring this app to level that has zero vulnerabilities - the problem is that I am not doing any help to run these mods on my own workstation. I would gladly supply a PR - but it is highly likely that it would just sit there in the repo 😭 ) Please note that this code sample is the very first referenced in your guides |
@adriatic If you provide a PR that passes all CI tests, I'll do my best to get it merged. |
Hello, Matt (@mraible) - you really made me happy with not just your response, but also with its timing. In addition to just update this sample, I would propose a more advanced approach, which should result in more benefits for Okta: Let's create a "movement" characterized by rallying Octa community members to ensure that all of the "official samples and blogs" are refreshed at all times. Quite seriously - it would be Okta newbies that would benefit the most from this action, and these folks are one of the main keys for Okta's good future. Please note also that in order to do the complete refreshing, one would also need source text for the blogs that are tutorials for the code in GitHub In order to verify me, please check my friend's Randall Degges opinion of me 😃 |
@adriatic I agree with you. Your timing is impeccable too! I tried updating all our JS SDK samples last week and ran into some issues. The good news is most of these PRs are progressing.
I just created a new one for this repo. I'm letting the CI process do most of the work for these and then checking in to try to fix the errors periodically. If folks want to create PRs to fix my PRs, that'd be great! 😃 |
You can find our blog repo at https://github.com/oktadeveloper/okta-blog. We do our best to keep our blog posts working, but it can be difficult. I updated a post from March 2017 today. oktadev/okta-blog#386 |
Hello, @mraible
This makes me happy - as my motives to do such a relatively pedestrian job of refreshing old code samples and related (markup) texts are driven by my many years' old affinity for Okta, (Les Hazelwood and Randall Degges from Stormpath for example). In addition, I am trying to help my friends at Strapi to understand the reasons to use an IAM PaaS instead of some home-created API. My plan is to use several Okta Node samples upgraded to today's API - and then rework them to fit the full-stack Strapi tutorials. This additional work is also my contribution to Okta - this time in the form of Okta marketing efforts The log of my activities leading to the creation of set of PRs is at https://github.com/adriatic-okta-prs/status/issues/1 |
I also have a question: all of the code samples I tried to upgrade result with the same failure: This ought to be a consequence of some API changes that took place after the samples are initially created. Can you illuminate please? |
@adriatic Per #55 (comment), does add your redirectUri |
I believe that it does here is the relevant section of the code
as well as the configuration: |
@adriatic From the url here #55 (comment) , looks like |
Yes, @shuowu, you are correct - the url in my post above is older than it should be - here it the current one: https://dev-487304.okta.com/oauth2/default/v1/authorize?client_id=0oarifhve59q3PrM84x6&scope=openid%20profile&response_type=code&redirect_uri=http%3A%2F%2Flocalhost%3A3000users%2Fcallback&state=GtMfeyvOhFfLOuy8Zld0OyWB2Fo1UXKQEaj1gbvrmhU The sample I am discussing here is Build Simple Authentication in Express in 15 Minutes by Braden Kelley. Github repo https://github.com/oktadeveloper/okta-node-express-15-minute-auth-example |
@adriatic The |
Hello, @shuowu the Uri mismatch cannot be the cause, nor could client ID (verified it many times over) I believe that there is a mismatch between today's Okta API and the applications I created using the older Okta blogs (written in 2018). By that, I mean that there are some code-breaking changes in the Okta API being used in the app code described in these blogs. I was hoping that Matt (@mraible) would point out such differences. Since he seems to be busy elsewhere I will go debug my code and find out what is really happening there. |
@adriatic I don't think there's breaking changes in our API. However, there are likely breaking changes in SDKs (especially between major versions). If you want to see how to quickly add login to an Express app, check out my post on the subject: Node.js Login with Express and OIDC. |
Thanks @mraible - I just decide to use this specific sample as my guidance, so think alike😏 |
Hello, @mraible and @shuowu Missing the definition of the routes
in the
|
I encountered this same issue at a different okta sample and described the problem as well as presented the solution. As nobody responded, I could think that keeping the samples current exceeds the okta team's ability to do - let me please know if that is the case; I would then stop writing such observations 😄
Running
npm install
for the Express & Okta-Hosted Login Page Example results with:Subsequent execution of the
npm audit
results with the following suggestions:npm install --save-dev [email protected]
to resolve 4 vulnerabilitiesnpm install @okta/[email protected]
to resolve 3 vulnerabilitiesnpm install @okta/[email protected]
to resolve 3 vulnerabilitiesnpm update fsevents --depth 3
to resolve 13 vulnerabilitiesnpm update fill-range --depth 7
to resolve 1 vulnerabilityI did try to run these suggested commands, only to find that the total number of vulnerabilities dropped from 25 to 16, meaning that there is more work to be done, because of various inter-dependencies.
The text was updated successfully, but these errors were encountered: