mirror of
https://github.com/jwadow/kiro-gateway.git
synced 2026-04-25 01:15:57 +03:00
[PR #48] [CLOSED] feat: support Enterprise Kiro IDE token refresh via AWS SSO OIDC #66
Labels
No labels
bug
bug
enhancement
enhancement
fixed
fixed
invalid
needs-info
needs-testing
pull-request
question
upstream
wontfix
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/kiro-gateway-jwadow#66
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
📋 Pull Request Information
Original PR: https://github.com/jwadow/kiro-gateway/pull/48
Author: @somehow-paul
Created: 1/20/2026
Status: ❌ Closed
Base:
main← Head:feature/enterprise-kiro-ide-support📝 Commits (1)
9c52803feat: support Enterprise Kiro IDE token refresh via AWS SSO OIDC📊 Changes
1 file changed (+66 additions, -28 deletions)
View changed files
📝
kiro/auth.py(+66 -28)📄 Description
Summary
Add support for Enterprise Kiro IDE (IdC login) token refresh. Enterprise users authenticate via AWS IAM Identity Center, which requires a different token refresh mechanism than personal accounts.
#45
Problem
Enterprise Kiro IDE users get
401 Bad credentialswhen the gateway tries to refresh tokens using the standard Kiro Desktop endpoint.Solution
clientIdHashfieldclientIdandclientSecretfrom~/.aws/sso/cache/{clientIdHash}.jsonChanges
_client_id_hashfield to store enterprise client identifier_load_enterprise_device_registration()method_do_aws_sso_oidc_refresh()to use JSON format for enterprise vs form-urlencoded for kiro-cliCompatibility
Testing
This fix was completed with the assistance of Kiro.
🔄 This issue represents a GitHub Pull Request. It cannot be merged through Gitea due to API limitations.