@@ -36,12 +36,6 @@ export interface OAuthOidcConfig {
3636 * @default process.env.NUXT_OAUTH_OIDC_REDIRECT_URL
3737 */
3838 redirectURL ?: string
39- /**
40- * Whether to use [PKCE](https://datatracker.ietf.org/doc/html/rfc7636).
41- *
42- * @default true
43- */
44- usePKCE ?: boolean
4539}
4640
4741/**
@@ -235,7 +229,6 @@ export function defineOAuthOidcEventHandler<TUser = OidcUser>({ config, onSucces
235229 return eventHandler ( async ( event : H3Event ) => {
236230 config = defu ( config , useRuntimeConfig ( event ) . oauth ?. oidc , {
237231 scope : [ 'openid' ] ,
238- usePKCE : true ,
239232 } satisfies OAuthOidcConfig )
240233
241234 const query = getQuery < { code ?: string , error ?: string , state ?: string } > ( event )
@@ -258,7 +251,7 @@ export function defineOAuthOidcEventHandler<TUser = OidcUser>({ config, onSucces
258251
259252 const redirectURL = config . redirectURL || getOAuthRedirectURL ( event )
260253 const state = await handleState ( event )
261- const verifier = config . usePKCE ? await handlePkceVerifier ( event ) : undefined
254+ const verifier = await handlePkceVerifier ( event )
262255
263256 if ( ! query . code ) {
264257 config . scope = config . scope || [ ]
@@ -271,8 +264,8 @@ export function defineOAuthOidcEventHandler<TUser = OidcUser>({ config, onSucces
271264 scope : config . scope . join ( ' ' ) ,
272265 state,
273266 response_type : 'code' ,
274- code_challenge : verifier ? .code_challenge ,
275- code_challenge_method : verifier ? .code_challenge_method ,
267+ code_challenge : verifier . code_challenge ,
268+ code_challenge_method : verifier . code_challenge_method ,
276269 } ) ,
277270 )
278271 }
@@ -287,7 +280,7 @@ export function defineOAuthOidcEventHandler<TUser = OidcUser>({ config, onSucces
287280 client_id : config . clientId ,
288281 redirect_uri : redirectURL ,
289282 code : query . code ,
290- code_verifier : verifier ? .code_verifier ,
283+ code_verifier : verifier . code_verifier ,
291284 } ,
292285 } )
293286
0 commit comments