@@ -382,7 +382,7 @@ class GoTrueClient {
382
382
383
383
/// Allows signing in with an ID token issued by certain supported providers.
384
384
/// The [idToken] is verified for validity and a new session is established.
385
- /// This method of signing in only supports [OAuthProvider.keycloak ] , [OAuthProvider.google ] , [OAuthProvider.apple ] or [OAuthProvider.kakao ] .
385
+ /// This method of signing in only supports [OAuthProvider.google ] , [OAuthProvider.apple ] , [OAuthProvider.kakao ] or [OAuthProvider.keycloak ] .
386
386
///
387
387
/// If the ID token contains an `at_hash` claim, then [accessToken] must be
388
388
/// provided to compare its hash with the value in the ID token.
@@ -402,12 +402,12 @@ class GoTrueClient {
402
402
String ? nonce,
403
403
String ? captchaToken,
404
404
}) async {
405
- if (provider != OAuthProvider .keycloak &&
406
- provider != OAuthProvider .google &&
405
+ if (provider != OAuthProvider .google &&
407
406
provider != OAuthProvider .apple &&
408
- provider != OAuthProvider .kakao) {
407
+ provider != OAuthProvider .kakao &&
408
+ provider != OAuthProvider .keycloak) {
409
409
throw AuthException ('Provider must be '
410
- '${OAuthProvider .keycloak .name }, ${OAuthProvider .google .name }, ${OAuthProvider .apple .name } or ${OAuthProvider .kakao .name }.' );
410
+ '${OAuthProvider .google .name }, ${OAuthProvider .apple .name }, ${OAuthProvider .kakao .name } or ${OAuthProvider .keycloak .name }.' );
411
411
}
412
412
413
413
final response = await _fetch.request (
0 commit comments