loud-engineer-1276
05/19/2023, 4:43 PM<http://admin.mysite.com|admin.mysite.com>
2. user is not logged in, so they are redirected to <http://mysite.com/auth|mysite.com/auth>
to login
3. user logs in and is redirected to <http://admin.mysite.com|admin.mysite.com>
This behavior works 1-3, but adds a 4:
4. the user is redirected infinitely from <http://admin.mysite.com|admin.mysite.com>
to <http://mysite.com/auth|mysite.com/auth>
and back.
I have oathkeeper managing redirect to kratos and am running the default kratos ui; I have *.<http://mysite.com|mysite.com>
added as an allowed_redirect_url
and <http://mysite.com|mysite.com>
as the cookie domain. are there other configurations I need? do I need to make a change in the client? or should this be working?loud-engineer-1276
05/19/2023, 8:42 PMreturn_to
) and by me accessing /auth
directly and getting the logged in user dashboard.loud-engineer-1276
05/20/2023, 1:57 AMcheck_session_url
was still defaulted to kratos
, but that service is running as a different name. ✅ -- not sure if authed, but I'm not hitting the service. checking headers comes next.swift-island-66287
05/21/2023, 7:23 AM00000000-0000-0000-0000-000000000000
When I create an account using a password, I get a proper ID back. I use this ID in another DB to link to this user. Did I miss something while setting up google OIDC?glamorous-lamp-83196
05/21/2023, 9:06 AMx-www-form-urlencoded
?
I have an input field in the form which I fill with the data I want to pass to a web hook during registration:
<input name="transient_payload.organizations" id="organizations" type="hidden" value="something here" />
But in the ctx.flow
I see that the data is not there: 'transient_payload': {}
So has anyone got it working or is it something obvious I'm missing?careful-musician-37298
05/22/2023, 7:17 AMread_only
flag for the these services without affecting functionality?
• Is it advisable to drop all capabilities by default for these services?
• What are the recommended settings for mem_limit
, cpus
, pids_limit
cgroup options for these services?some-addition-86177
05/22/2023, 9:44 AMadamant-rocket-9863
05/22/2023, 10:18 AMadventurous-jordan-12702
05/22/2023, 12:10 PMfaint-energy-48611
05/22/2023, 2:06 PMtall-angle-41306
05/22/2023, 4:00 PM{
"code": 500,
"status": "Internal Server Error",
"message": "named insert: ERROR: insert or update on table \"identity_verification_codes\" violates foreign key constraint \"identity_verification_codes_identity_verifiable_addresses_id_fk\" (SQLSTATE 23503)"
}
millions-smartphone-96713
05/22/2023, 4:01 PMsession.cookie.domain
https://www.ory.sh/docs/kratos/guides/configuring-cookies#session-cookies is working now?
I saw the related code path UpsertAndIssueCookie
is only called in PostLoginHook
which looks likes not called from the code path where kratos UI is pointing kratos/self-service/login/
limited-nail-62136
05/22/2023, 7:51 PMwooden-knife-9469
05/23/2023, 6:42 AMfresh-accountant-49287
05/23/2023, 11:58 AMstraight-zebra-73509
05/23/2023, 10:47 PMhelpful-eve-46197
05/24/2023, 11:11 AMfaint-energy-48611
05/24/2023, 1:23 PMfaint-energy-48611
05/24/2023, 3:50 PMhigh-optician-2097
05/24/2023, 4:54 PMmelodic-night-12395
05/24/2023, 5:16 PMstraight-zebra-73509
05/24/2023, 7:06 PM<smtps://user%40domain.com:password@smtp.domain.com:587/?skip_ssl_verify=true>
(with values substituted properly)
Am I missing something?acoustic-zebra-63757
05/25/2023, 2:48 AMemail-recovery
trait. Is there a way to fix this beyond manually adding that trait to every single user? Any ideas on how their getting into this state?alert-painter-66256
05/25/2023, 9:27 PM<UserAuthCard
title={
!(flow.refresh || flow.requested_aal === 'aal2')
? 'Sign In'
: 'Two-Factor Authentication'
}
flowType={'login'}
// we always need the flow data which populates the form fields and error messages dynamically
flow={flow}
// the login card should allow the user to go to the registration page and the recovery page
additionalProps={{
forgotPasswordURL: '/auth/recovery',
signupURL: '/auth/registration'
}}
// we might need webauthn support which requires additional js
// includeScripts={true}
// we submit the form data to Ory
onSubmit={({ body }) => submitFlow(body as UpdateLoginFlowBody)}
/>
We use the AuthCard like this, but it shows this:
https://tca0.nl/5Gi
instead of something like this:
https://tca0.nl/QZfalert-painter-66256
05/26/2023, 12:30 AMorySdk
.updateLoginFlow({ flow: flow.id, updateLoginFlowBody: body })
.then(({ data }) => {
// if the user requested aal2, we redirect to the aal2 login page
if (!hasAal2 && !data.session.identity) {
window.location.href = '/auth/login?aal2=true'
return
}
// we successfully submitted the login flow, so lets redirect to the dashboard
onSuccessfullLogin(data)
})
.catch(sdkErrorHandler)
}
fast-lunch-54279
05/26/2023, 8:39 AM``` !(flow.refresh || flow.requested_aal === 'aal2')
? 'Sign In'
: 'Two-Factor Authentication'```and we recently fixed it for Account Experience (but not sure if we fixed all places in elements) - when flow.refresh is true, the message should be "please confirm that it's you", not "two factor auth"
fast-lunch-54279
05/26/2023, 8:39 AMfast-lunch-54279
05/26/2023, 8:40 AMsparse-vegetable-80161
05/26/2023, 10:02 AMmd5 hasher
in self-host kratos ? I saw someone implement in the github , but I can't use the md5 hasher in my quick start yaml file .
here is my yaml file
version: v0.13.0
dsn: memory
serve:
public:
base_url: <http://127.0.0.1:4433/>
cors:
enabled: true
admin:
base_url: <http://kratos:4434/>
dev: true
selfservice:
default_browser_return_url: <http://127.0.0.1:4455/>
allowed_return_urls:
- <http://127.0.0.1:4455>
methods:
password:
enabled: true
totp:
config:
issuer: Kratos
enabled: true
lookup_secret:
enabled: true
link:
enabled: true
code:
enabled: true
flows:
error:
ui_url: <http://127.0.0.1:4455/error>
settings:
ui_url: <http://127.0.0.1:4455/settings>
privileged_session_max_age: 15m
required_aal: highest_available
recovery:
enabled: true
ui_url: <http://127.0.0.1:4455/recovery>
use: code
verification:
enabled: true
ui_url: <http://127.0.0.1:4455/verification>
use: code
after:
default_browser_return_url: <http://127.0.0.1:4455/>
logout:
after:
default_browser_return_url: <http://127.0.0.1:4455/login>
login:
ui_url: <http://127.0.0.1:4455/login>
lifespan: 10m
registration:
lifespan: 10m
ui_url: <http://127.0.0.1:4455/registration>
after:
password:
hooks:
- hook: session
- hook: show_verification_ui
log:
level: debug
format: text
leak_sensitive_values: true
secrets:
cookie:
- PLEASE-CHANGE-ME-I-AM-VERY-INSECURE
cipher:
- 32-LONG-SECRET-NOT-SECURE-AT-ALL
ciphers:
algorithm: xchacha20-poly1305
hashers:
algorithm: md5
identity:
default_schema_id: default
schemas:
- id: default
url: file:///etc/config/kratos/identity.schema.json
courier:
smtp:
connection_uri: <smtps://test:test@mailslurper:1025/?skip_ssl_verify=true>
straight-zebra-73509
05/26/2023, 2:43 PM