-
Notifications
You must be signed in to change notification settings - Fork 1k
Credentials are not stripped on a redirect #500
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Hit this too just now. It's seems like a bug, at the very least because it's inconsistent with |
Are there any updates on this? Currently I have to use an oauth2 client to make the first request but stop it from following the redirect, and instead make a second request to the redirected url with a normal http client. |
I've resorted to a slightly more ergonomic workaround: replacing the transport with my own implementation https://github.com/uabluerail/bsky-tools/blob/main/xrpcauth/transport.go |
This may be difficult to fix: the Transport adds t
5C62
he auth tokens, and the interface it implements is |
Hey
we have raised 8000 an issue at redpanda-data/connect#792 where the following happens
Now the behavior of preserving Auth headers on redirects is a somewhat grey area of the specs. I'd like to point out though that keeping auth headers is not standard golang behavior ... golang/go@6e87082 introduced a changed where Auth headers and cookies are only preserved on redirect if the target host is a subdomain.
The devs at benthos rightly said that this is something that should be fixed in the oauth library. What do you guys think? Is this a bug?
The text was updated successfully, but these errors were encountered: