-
-
Notifications
You must be signed in to change notification settings - Fork 1.1k
Wrong behavior in refreshing a token #1364
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
I didn't figure out why it violates the OAuth2.0 RFC (just reading the text you posted above), but I definitely agree on that: "Token expiry in both cases should be the same" 👍 So it would be great to see a PR, thanks! |
1 similar comment
I didn't figure out why it violates the OAuth2.0 RFC (just reading the text you posted above), but I definitely agree on that: "Token expiry in both cases should be the same" 👍 So it would be great to see a PR, thanks! |
@nbulaj As RFC mentions that token received after refreshing the original token may have a shorter expiry. But here I am able to get token with more expiry than the original token. |
Let's do it! |
…sh_token to that of original token
Sets expiry of token generated using refresh_token to that of original token [Fixes #1364]
The behavior of refreshing a token is not valid.
Doorkeeper Configuration:
Steps to reproduce
password
grant_type.refresh_token
from the last step.Expected behavior
Token expiry in both cases should be the same as I haven't defined token expiry for refresh_token grant type explicitly.
Actual behavior
The expiry of the token received after refreshing the original token isn't equal to the expiry of the original token. It violates the OAuth2.0 RFC:
I am using doorkeeper version 5.0.2. But the same problem exists with the master.
I think by default, the expiry of token received after refreshing should be the same as that of the original token. @nbulaj I can prepare a PR to fix this. But first let me know your thoughts on this.
The text was updated successfully, but these errors were encountered: