Skip to content

Conversation

@ifedapoolarewaju
Copy link
Contributor

this change prevents us from exposing the provider access_tokens in URLs which could be access in logs or browser history

@goto-bus-stop
Copy link
Contributor

to check my understanding, this is for communication between Companion and the OAuth login endpoint?

@ifedapoolarewaju
Copy link
Contributor Author

this is for communication between Companion and the OAuth login endpoint?

technically, yes. But this is actually used between 2 companion endpoints. One endpoint (this endpoint is in the grant library) receives the token from the OAuth provider, and it passes it to our own callback endpoint by redirecting.

So grant can either pass it down to us via query param, or session.

@goto-bus-stop
Copy link
Contributor

Goootcha. that clears it up, thanks for the explanation ✨

Copy link
Contributor

@arturi arturi left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Tested locally ✅

@ifedapoolarewaju ifedapoolarewaju merged commit bf71260 into master Jun 17, 2019
@goto-bus-stop goto-bus-stop deleted the acess-token-session branch June 17, 2019 15:23
HeavenFox pushed a commit to docsend/uppy that referenced this pull request Jun 27, 2023
companion: change oauth access token transport method
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants