From bdb82750d90570d1b5ff426d13305a1b4367dcf8 Mon Sep 17 00:00:00 2001 From: adrien2p Date: Tue, 28 Nov 2023 09:27:09 +0100 Subject: [PATCH] docs: update doc --- docs/pages/authentication/auth0.mdx | 2 +- docs/pages/authentication/azureoidc.mdx | 2 +- docs/pages/authentication/facebook.mdx | 2 +- docs/pages/authentication/firebase.mdx | 2 +- docs/pages/authentication/google.mdx | 2 +- docs/pages/authentication/linkedin.mdx | 2 +- packages/medusa-plugin-auth/src/auth-strategies/auth0/admin.ts | 2 +- 7 files changed, 7 insertions(+), 7 deletions(-) diff --git a/docs/pages/authentication/auth0.mdx b/docs/pages/authentication/auth0.mdx index a6413c0..3f5be9b 100644 --- a/docs/pages/authentication/auth0.mdx +++ b/docs/pages/authentication/auth0.mdx @@ -101,7 +101,7 @@ The default `verifyCallback` flow looks as follow (unless the `strict` option is - If none are found, then the customer gets authenticated and can proceed and the metadata gets updated. - In the case another external authentication method have been used in the past, then an unauthorized will be returned. - - if the customer trying to authenticate does not exist, a new customer will be created and the authentication + - if the customer trying to authenticate does not exist, a new customer will be created with a randomly generated password and the authentication flow follow the previous point ### Request only access token in a JSON response diff --git a/docs/pages/authentication/azureoidc.mdx b/docs/pages/authentication/azureoidc.mdx index b96f458..e88b323 100644 --- a/docs/pages/authentication/azureoidc.mdx +++ b/docs/pages/authentication/azureoidc.mdx @@ -132,7 +132,7 @@ The default `verifyCallback` flow looks as follow (unless the `strict` option is - If none are found, then the customer gets authenticated and can proceed and the metadata gets updated. - In the case another external authentication method have been used in the past, then an unauthorized will be returned. - - if the customer trying to authenticate does not exist, a new customer will be created and the authentication + - if the customer trying to authenticate does not exist, a new customer will be created with a randomly generated password and the authentication flow follow the previous point ### Request only access token in a JSON response diff --git a/docs/pages/authentication/facebook.mdx b/docs/pages/authentication/facebook.mdx index ffd4735..7967494 100644 --- a/docs/pages/authentication/facebook.mdx +++ b/docs/pages/authentication/facebook.mdx @@ -107,7 +107,7 @@ The default `verifyCallback` flow looks as follow (unless the `strict` option is - If none are found, then the customer gets authenticated and can proceed and the metadata gets updated. - In the case another external authentication method have been used in the past, then an unauthorized will be returned. - - if the customer trying to authenticate does not exist, a new customer will be created and the authentication + - if the customer trying to authenticate does not exist, a new customer will be created with a randomly generated password and the authentication flow follow the previous point ### Request only access token in a JSON response diff --git a/docs/pages/authentication/firebase.mdx b/docs/pages/authentication/firebase.mdx index c270c64..2529fcc 100644 --- a/docs/pages/authentication/firebase.mdx +++ b/docs/pages/authentication/firebase.mdx @@ -93,5 +93,5 @@ The default `verifyCallback` flow looks as follow (unless the `strict` option is - If none are found, then the customer gets authenticated and can proceed and the metadata gets updated. - In the case another external authentication method have been used in the past, then an unauthorized will be returned. - - if the customer trying to authenticate does not exist, a new customer will be created and the authentication + - if the customer trying to authenticate does not exist, a new customer will be created with a randomly generated password and the authentication flow follow the previous point diff --git a/docs/pages/authentication/google.mdx b/docs/pages/authentication/google.mdx index 6e7b83a..18f059f 100644 --- a/docs/pages/authentication/google.mdx +++ b/docs/pages/authentication/google.mdx @@ -107,7 +107,7 @@ The default `verifyCallback` flow looks as follow (unless the `strict` option is - If none are found, then the customer gets authenticated and can proceed and the metadata gets updated. - In the case another external authentication method have been used in the past, then an unauthorized will be returned. - - if the customer trying to authenticate does not exist, a new customer will be created and the authentication + - if the customer trying to authenticate does not exist, a new customer will be created with a randomly generated password and the authentication flow follow the previous point ### Request only access token in a JSON response diff --git a/docs/pages/authentication/linkedin.mdx b/docs/pages/authentication/linkedin.mdx index 2271b54..87cb816 100644 --- a/docs/pages/authentication/linkedin.mdx +++ b/docs/pages/authentication/linkedin.mdx @@ -107,7 +107,7 @@ The default `verifyCallback` flow looks as follow (unless the `strict` option is - If none are found, then the customer gets authenticated and can proceed and the metadata gets updated. - In the case another external authentication method have been used in the past, then an unauthorized will be returned. - - if the customer trying to authenticate does not exist, a new customer will be created and the authentication + - if the customer trying to authenticate does not exist, a new customer will be created with a randomly generated password and the authentication flow follow the previous point ### Request only access token in a JSON response diff --git a/packages/medusa-plugin-auth/src/auth-strategies/auth0/admin.ts b/packages/medusa-plugin-auth/src/auth-strategies/auth0/admin.ts index 074bae3..71f0ec7 100644 --- a/packages/medusa-plugin-auth/src/auth-strategies/auth0/admin.ts +++ b/packages/medusa-plugin-auth/src/auth-strategies/auth0/admin.ts @@ -80,4 +80,4 @@ export function getAuth0AdminAuthRouter(auth0: Auth0Options, configModule: Confi }, expiresIn: auth0.admin.expiresIn, }); -} +} \ No newline at end of file