-
Notifications
You must be signed in to change notification settings - Fork 16
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Password and secret end up flows.json #70
Comments
Dear @gorenje. Thank you for your valuable feedback and suggestion. I genuinely appreciate your input! I'm pleased to know that you found OAuth2 easy to use with this package. I completely understand and acknowledge your concerns regarding storing the password and secret in plaintext within the flows.json file. Moreover I am grateful that you shared an alternative approach involving the use of Warm regards, Caputo |
Dear @gorenje, dear @caputomarcos, i hit the same issue and fixed this already in my forked repo in the issue-credentials branch. I am going to create a pull request if appropriate and after some more testing. Feel free to test that version already (please note that already entered password and client-secret will get deleted and have to be entered again). https://github.com/tglynx/node-red-contrib-oauth2/tree/issue-credentials For your reference, i implemented it as suggested here:
I am also working on a version with a config node in a separate branch but that is just a prototype yet. Regards, |
Hi, just a short update on this issue and to share some ideas! Remove credentials from flows.json and encrypt After the patch (Password and Client Secret are no longer visible in the 'Info' Sidebar of the node and are no longer stored in flows.json): The credentials are now stored in encrypted form in flows_cred.json (node-red standard / encrypted with the credentialSecret from settings.js). This part is already working fine. However, as already said, Password and Client Secret will be lost if using the new version and need to be reentered. So make sure you have them backed up before changing the node. Store credentials in reusable config node In the config node you can still choose from the 3 remaining 'grant types' that make sense there (Client credentials, Password, Authorization Code): ... the config node part is work in progress ... After some thinking i did put most of the fields in the config node (as seen in the screenshot above). I need to dig a little deeper into the authorization code grant type. I have not fully understood how this works and i do not feel confident to implement that part correctly in the config node yet. Regards, |
Hi There!
First off, great work and nice job making OAuth2 so simple!
But ... when I select password authentication, the password and secret end up as cleartext in the flows.json file, making the flows.json non-distributable nor checkin-able.
I did something similar but made the secret field an environment variable by using typedInput:
in the .html:
in the .js:
I don't know how that could work with a config node but I guess that would be best solution.
just a suggestion :)
The text was updated successfully, but these errors were encountered: