-
Notifications
You must be signed in to change notification settings - Fork 399
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Proper use of state parameter for the OAuth CSRF protection #1335
Comments
Hello, Not sure this is the right place to discuss it but I just upgraded from 3.10 to 3.11 and the OAuth flow stopped working with:
Maybe I am not doing it right, I still have to investigate but |
@pmezard Thanks for writing in. As long as your OAuth flow starts from If you use some URLs like I hope this was helpful to you. |
Still not have time to investigate properly but here is more context:
I guess I will have to take a look at the change and see if I can adjust our code. |
@pmezard Ah I see. This makes sense. The new way requires running If you have a certain reason to continue directly using |
I am generating the URL that way because I need to inject metadata in the URL. Maybe there is hook in the ExpressReceiver I can use to do that. |
bolt-js v3.11 (and its underlying OAuth module v2.5) offers a more flexible way to set additional information through the OAuth flow. You can use Refer to the OAuth module's documentation for more details: https://slack.dev/node-slack-sdk/oauth#persisting-data-during-the-oauth-flow You can pass |
I've picked up maintenance of a slack app that is also using |
I was wrong, that option did fix it, when using 3.11.3. I needed to put in in the |
@seratch is there a workaround using the callbacks for http installations (specifically for local development)? I would love to use the new verification method but it breaks my local installation flow for testing. |
Description
Refer to slackapi/node-slack-sdk#1435 for details but in the next minor version, we are going to change the internals of the OAuth flow in bolt-js. The improvement won't bring any breaking changes. Newer versions of bolt-js (v3.11 and newer ones) will handle the OAuth flow more properly under the hood.
What type of issue is this? (place an
x
in one of the[ ]
)Requirements (place an
x
in each of the[ ]
)The text was updated successfully, but these errors were encountered: