Skip to content

Conversation

@printercu
Copy link

Hi!

This PR allows use same strategies for authorization by access_token obtained in the client app. There is answer on SO that suggests to write custom endpoints for every provider in this case. But why should this be done, if omniauth strategies already has this stuff?!)

This PR is in the preview state yet. Maybe config option to enable this feature should be added. It also relies on Rails's _csrf_token to protect from request forgery. This can be configured with proc. Or this can be allowed only for POST, and framework will check csrf itself.

It won't break any existing strategies. Maybe some just will need to be fixed a little.

WDYT?

@coveralls
Copy link

coveralls commented May 25, 2016

Coverage Status

Coverage decreased (-5.4%) to 79.503% when pulling 788a86c on printercu:patch-1 into 464fcef on intridea:master.

@tmilewski tmilewski closed this Nov 21, 2017
@printercu
Copy link
Author

@tmilewski why is it closed?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants