-
-
Notifications
You must be signed in to change notification settings - Fork 1.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
The authorization should not be triggered when a previous expired token is provided and reuse_access_token
is enabled.
#1138
Comments
Hi @Erowlin . I'm terribly busy right now, would you like to submit a revert fix for this? |
Sure, do you confirm that it is RFC compliant? |
As far as I remember RFC 6749 says nothing about token reuse, so this functionality looks like an extension to OAuth protocol. Fix me if I'm wrong. This changes were done during the investigation of expired tokens issues, and now looks more like a bug. |
Hi @Erowlin . Would you like to propose a fix? I have some troubles with a free time now, so don't sure when I will be able to fix it myself |
Hi @Erowlin . I have 10 minutes of free time :D Thanks |
Thanks for your time, sorry for my silence radio, busy times here as well. I'm checking now. |
I think this is related to this line |
All right. Don’t you think we should add a condition on the fact we enabled
“reuse_access_token” in the configuration file? Do you have any though
about this?
…On Thu 20 Sep 2018 at 23:37, Nikita Bulai ***@***.***> wrote:
I think this is related to this line
<https://github.com/doorkeeper-gem/doorkeeper/blob/master/lib/doorkeeper/models/access_token_mixin.rb#L126>
|
I think that reuse access token currently works fine - it protects from creating new tokens before old one becomes expired. Please, read the orinal PR and issue: #383 and #387 . It doesn't work as "update old token expiration date instead of creating new token" . Also there are refresh token strategy.. |
All right, let’s keep it as it is then, thanks for your investigation :)
…On Thu 20 Sep 2018 at 23:42, Nikita Bulai ***@***.***> wrote:
I think that reuse access token currently works fine - it protects from
creating new tokens before old one becomes expired. Please, read the orinal
PR and issue: #383
<#383> and #387
<#387> . It doesn't work
ad "update old token expiration date instead of creating new token" . Also
there are refresh token strategy also..
|
…for-matching-token [#1138] Revert matching token changes for Authorization
NOTICE: #1542 will break the topic once again after release.
If you need always use the same access token record (which is insecure by design) - use an infinite TTL (set expiration time to |
Steps to reproduce
Flag
reuse_access_token
is turnedon
. Whenever the access_token expires, instead of silently renewing theaccess_token
, the user is redirected to theauthorization/new
page where she has to click on "Accept" or "Decline". (The user approved the application previously, and gave the expired access token in the request).The incriminating commit: c87b13c#diff-1282d211312f992c2a614d1f4a6302fe - especially the
token.accessible?
check.access_token
is expired, while I specified toreuse_access_token
(so the renewal should be invisible, the user should not have to approve again the application).doorkeeper.rb:
System configuration
Doorkeeper 5.0.0
The text was updated successfully, but these errors were encountered: