Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add support for refresh_expires_in #358

Merged
merged 1 commit into from
Sep 22, 2022
Merged

Conversation

chrisirhc
Copy link
Contributor

@chrisirhc chrisirhc commented Apr 18, 2022

This is referenced in some OAuth documentation including:

This PR doesn't update the dist/* files. This is a proposal at this point and I'd be happy to add changes to the dist file if it's needed.

@sqrrrl
Copy link
Member

sqrrrl commented Apr 25, 2022

Can you provide examples of endpoints that implement that field? I've seen refresh_token_expires_in used by LinkedIn and a few others, but none that use refresh_expires_in. The link provided refers to a configuration file, not the payload returned by the authorization provider.

@chrisirhc
Copy link
Contributor Author

The most credible looking documentation I could find is https://developer.cisco.com/docs/firepower-device-manager/#!authenticating-your-rest-api-client-using-oauth/requesting-a-custom-access-token

I see many results via searching
"refresh_expires_in" oauth but I couldn't find credible results.

My guess is that since this property isn't part of any standard, it has been copy-pasted in multiple places.

@chrisirhc
Copy link
Contributor Author

Rebased with master

@sqrrrl sqrrrl merged commit 6ae908a into googleworkspace:master Sep 22, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants