From 12419c52378908b783e15fd769091f8fe36538b1 Mon Sep 17 00:00:00 2001 From: Moritz Date: Tue, 24 Feb 2026 11:32:46 +0100 Subject: [PATCH] docs: fix remaining rauthy references after oidc rename MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Update action names (register_with_rauthy → register_with_oidc, sign_in_with_rauthy → sign_in_with_oidc) and strategy name (:rauthy → :oidc) in docs, code comments and guidelines. --- CODE_GUIDELINES.md | 8 ++++---- README.md | 2 +- docs/feature-roadmap.md | 4 ++-- lib/mv/oidc_role_sync.ex | 2 +- 4 files changed, 8 insertions(+), 8 deletions(-) diff --git a/CODE_GUIDELINES.md b/CODE_GUIDELINES.md index 3e2bbd0..50c9eca 100644 --- a/CODE_GUIDELINES.md +++ b/CODE_GUIDELINES.md @@ -983,9 +983,9 @@ defmodule Mv.Accounts.User do hashed_password_field :hashed_password end - oauth2 :rauthy do + oidc :oidc do client_id fn _, _ -> - Application.fetch_env!(:mv, :rauthy)[:client_id] + Application.fetch_env!(:mv, :oidc)[:client_id] end # ... other config end @@ -1866,7 +1866,7 @@ authentication do hashed_password_field :hashed_password end - oauth2 :rauthy do + oidc :oidc do # OIDC configuration end end @@ -2093,7 +2093,7 @@ plug :protect_from_forgery ```elixir # config/runtime.exs -config :mv, :rauthy, +config :mv, :oidc, client_id: System.get_env("OIDC_CLIENT_ID") || "mv", client_secret: System.get_env("OIDC_CLIENT_SECRET"), base_url: System.get_env("OIDC_BASE_URL") diff --git a/README.md b/README.md index 166a5b2..b35d742 100644 --- a/README.md +++ b/README.md @@ -153,7 +153,7 @@ Now you can log in to Mila via OIDC! ### OIDC with other providers (Authentik, Keycloak, etc.) -Mila works with any OIDC-compliant provider. The internal strategy is named `:rauthy`, but this is just a name — it works with any provider. +Mila works with any OIDC-compliant provider. The internal strategy is named `:oidc` — it works with any OIDC-compliant provider. **Important:** The redirect URI must always end with `/auth/user/oidc/callback`. diff --git a/docs/feature-roadmap.md b/docs/feature-roadmap.md index 64c9885..b699560 100644 --- a/docs/feature-roadmap.md +++ b/docs/feature-roadmap.md @@ -515,9 +515,9 @@ Since this is a **Phoenix LiveView** application with **Ash Framework**, we have | Resource | Action | Purpose | Auth | Input | Output | |----------|--------|---------|------|-------|--------| | `User` | `:sign_in_with_password` | Password authentication | 🔓 | `{email, password}` | `{:ok, user}` or `{:error, reason}` | -| `User` | `:sign_in_with_rauthy` | OIDC authentication | 🔓 | `{oidc_id, email, user_info}` | `{:ok, user}` or `{:error, reason}` | +| `User` | `:sign_in_with_oidc` | OIDC authentication | 🔓 | `{oidc_id, email, user_info}` | `{:ok, user}` or `{:error, reason}` | | `User` | `:register_with_password` | Create user with password | 🔓 | `{email, password}` | `{:ok, user}` | -| `User` | `:register_with_rauthy` | Create user via OIDC | 🔓 | `{oidc_id, email}` | `{:ok, user}` | +| `User` | `:register_with_oidc` | Create user via OIDC | 🔓 | `{oidc_id, email}` | `{:ok, user}` | | `User` | `:request_password_reset` | Generate reset token | 🔓 | `{email}` | `{:ok, token}` | | `User` | `:reset_password` | Reset password with token | 🔓 | `{token, password}` | `{:ok, user}` | | `Token` | `:revoke` | Revoke authentication token | 🔐 | `{jti}` | `{:ok, token}` | diff --git a/lib/mv/oidc_role_sync.ex b/lib/mv/oidc_role_sync.ex index f268154..fbec9de 100644 --- a/lib/mv/oidc_role_sync.ex +++ b/lib/mv/oidc_role_sync.ex @@ -2,7 +2,7 @@ defmodule Mv.OidcRoleSync do @moduledoc """ Syncs user role from OIDC user_info (e.g. groups claim → Admin role). - Used after OIDC registration (register_with_rauthy) and on sign-in so that + Used after OIDC registration (register_with_oidc) and on sign-in so that users in the configured admin group get the Admin role; others get Mitglied. Configure via OIDC_ADMIN_GROUP_NAME and OIDC_GROUPS_CLAIM (see OidcRoleSyncConfig).