Skip to content

Conversation

@mustafadeel
Copy link
Contributor

@mustafadeel mustafadeel commented Dec 23, 2025

By submitting a PR to this repository, you agree to the terms within the Auth0 Code of Conduct. Please see the contributing guidelines for how to create and submit a high-quality PR for this repo.

Description

  • Moved and updated the bootstrap script to work with now react examples as well.
  • Also updated to the react-shadcn README to show how to use it.
  • Added MRRT support for react-shadcn

References

Todo:

  • Update react-npm to support MRRT
  • Update README for react-npm
  • Fix the root README

Testing

  • Follow readme instructions for react-shadcn with a new tenant and verify it gets setup properly
  • Modify the bootstrapped tenant (eg. delete app, connection, org, user etc) and re-run bootstrap script to verify it can fix the env
  • Delete .env.local file and re-run the bootstrap script to ensure it can regenerate the required .env.local file

Checklist

  • I have added documentation for new/changed functionality in this PR or in auth0.com/docs
  • All active GitHub checks for tests, formatting, and security are passing
  • The correct base branch is being used, if not the default branch

@mustafadeel mustafadeel marked this pull request as ready for review December 23, 2025 17:16
@chakrihacker chakrihacker force-pushed the feat/examples-bootstrap branch from ff344b0 to 9078649 Compare January 8, 2026 15:37
@chakrihacker chakrihacker force-pushed the feat/examples-bootstrap branch from 9078649 to 3b9ef66 Compare January 8, 2026 15:38
@codecov-commenter
Copy link

Codecov Report

✅ All modified and coverable lines are covered by tests.
✅ Project coverage is 83.17%. Comparing base (dbfb21e) to head (3b9ef66).

Additional details and impacted files
@@           Coverage Diff           @@
##             main      #44   +/-   ##
=======================================
  Coverage   83.17%   83.17%           
=======================================
  Files         125      125           
  Lines       10291    10291           
  Branches     1007     1007           
=======================================
  Hits         8560     8560           
  Misses       1731     1731           

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

🚀 New features to boost your workflow:
  • ❄️ Test Analytics: Detect flaky tests, report on failures, and find test suite problems.
  • 📦 JS Bundle Analysis: Save yourself from yourself by tracking and limiting bundle sizes in JS merges.

@Ajeey Ajeey requested a review from castrinho18 January 13, 2026 06:46
@@ -13,9 +13,9 @@ import {
displayChangePlan,
} from "./utils/discovery.mjs"
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

There is another error, not sure if it's related to the PR, @NaveenChand755 can you take a look?

The scopes we are getting on SsoProvider page are not correct:

We should request:
"read:my_org:details update:my_org:details read:my_org:identity_providers create:my_org:identity_providers update:my_org:identity_providers delete:my_org:identity_providers update:my_org:identity_providers_detach read:my_org:identity_providers_provisioning create:my_org:identity_providers_provisioning delete:my_org:identity_providers_provisioning create:my_org:identity_providers_domains delete:my_org:identity_providers_domains read:my_org:identity_providers_scim_tokens create:my_org:identity_providers_scim_tokens delete:my_org:identity_providers_scim_tokens read:my_org:domains delete:my_org:domains create:my_org:domains update:my_org:domains read:my_org:configuration'"

But we are requesting:
"openid profile email create:my_org:identity_providers delete:my_org:identity_providers read:my_org:configuration read:my_org:details read:my_org:identity_providers update:my_org:details update:my_org:identity_providers update:my_org:identity_providers_detach"

Screen.Recording.2026-01-13.at.18.13.37.mov

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

that seems not related to the bootstrap script as the the request itself is missing the scope. Can we close this comment to merge this PR and then raise it as a separate issue?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm still not sure that this is not related to the script, maybe we need to change anything else. Can you @NaveenChand755 take a look?
Anyway I would not merge the PR until this is fixed because anyone that runs this script, will face the same issue, so scripts are not very useful unless we fix that.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hey Folks I just dig into this today, and found the scopes mapped for the table page is limited and kept in UI components constant block-wise, if we want to club all the scopes for accessing the actions of other pages(like edit) I am really not sure about, @NaveenChand755 you can weigh in on this. Additionally I ran script and generated the the app using @mustafadeel branch and run the code in existing main I see the similar thing confirming that the recent script changes are not impacting this specific flow.

image

Copy link
Contributor

@NaveenChand755 NaveenChand755 Jan 30, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hey @castrinho18 @rax7389 yes for the sso provider table components its just
openid profile email create:my_org:identity_providers delete:my_org:identity_providers read:my_org:configuration read:my_org:details read:my_org:identity_providers update:my_org:details update:my_org:identity_providers update:my_org:identity_providers_detach
for edit flow we will have request for
read:my_org:details update:my_org:details read:my_org:identity_providers create:my_org:identity_providers update:my_org:identity_providers delete:my_org:identity_providers update:my_org:identity_providers_detach read:my_org:identity_providers_provisioning create:my_org:identity_providers_provisioning delete:my_org:identity_providers_provisioning create:my_org:identity_providers_domains delete:my_org:identity_providers_domains read:my_org:identity_providers_scim_tokens create:my_org:identity_providers_scim_tokens delete:my_org:identity_providers_scim_tokens read:my_org:domains delete:my_org:domains create:my_org:domains update:my_org:domains read:my_org:configuration

fix: creating client api syntax
@SurajThotakura SurajThotakura force-pushed the feat/examples-bootstrap branch from a57d909 to 1449105 Compare January 19, 2026 17:42
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

7 participants