most-river-7586
12/04/2023, 9:46 PMselfservice.methods.oidc.config.providers
list for the Kratos helm chart?
As mentioned here:
https://www.ory.sh/docs/self-hosted/kratos/configuration/oidc#environment-variables
The only option seems to be exporting the whole config via:
export SELFSERVICE_METHODS_OIDC_CONFIG_PROVIDERS='[<bunch of json>]'
which isn't recommended in the docs due to the complexity.
Is there a recommended alternative? If I can't override a secret that's nested within that list, and overriding the entire list isn't recommended, I wonder if there's a more reasonable option š¤jolly-breakfast-43519
12/02/2023, 8:53 AMmany-bear-50239
11/30/2023, 10:29 AMshow_verification_ui
the email that the user registered with is not included and there is no āresend codeā-button available.
Is this a reason for why these views are different between the two use cases or was this use case not considered in the happy path during the implementation of verification via one time codes (https://github.com/ory/kratos/issues/2824)
Thanks in advance for answers!lemon-student-13425
11/30/2023, 5:55 AMsome-bear-63847
11/29/2023, 3:27 PMcrooked-student-43886
11/29/2023, 1:10 PMcalm-oxygen-16453
11/29/2023, 9:27 AMworried-jackal-93029
11/23/2023, 1:17 PMstale-queen-97584
11/22/2023, 1:20 PMflows:
settings:
required_aal: highest_available
ui_url: <http://localhost:3000/settings>
privileged_session_max_age: 15m
after:
password:
default_browser_return_url: <http://localhost:3000/test>
totp:
default_browser_return_url: <http://localhost:3000/settings/2fa-app>
error:
The configuration contains values or keys which are invalid:
selfservice.flows.settings.after: map[totp:map[default_browser_return_url:<http://localhost:3000/settings/2fa-app]]>
^-- additionalProperties "totp" not allowed
colossal-airline-19852
11/21/2023, 1:25 PMboundless-lunch-99358
11/20/2023, 12:24 PMimport { Controller, Get, Post, Body } from '@nestjs/common';
import axios from 'axios'; // For making HTTP requests
@Controller('auth')
export class AuthController {
private readonly googleAuthEndpoint = '<https://www.googleapis.com/oauth2/v3/tokeninfo>';
constructor(private readonly oryClient: OryClient) {} // Initialize your ORY client
@Post('google-signin')
async googleSignIn(@Body() { idToken, flowId }: { idToken: string; flowId: string }) {
try {
// Verify Google ID Token
const { data } = await axios.get(`${this.googleAuthEndpoint}?id_token=${idToken}`);
if (data) {
// Create payload for ORY Hydra updateRegistrationFlow
const body = {
idToken,
method: 'oidc',
provider: 'google',
};
// Submit the updateRegistrationFlow endpoint with the payload
await this.oryClient.getFrontendApi().updateRegistrationFlow({
flow: flowId,
updateRegistrationFlowBody: {
oneOf: { value1: body },
},
});
return { success: true, message: 'Google sign-in successful' };
}
} catch (error) {
console.error('Google sign-in error:', error.message);
return { success: false, message: 'Error signing in with Google' };
}
}
}
Please if anyone can help me with this it will be a great help thanks to you all,
Warm Regards,
Deepak A.M Yadavjolly-breakfast-43519
11/20/2023, 8:51 AMjolly-breakfast-43519
11/18/2023, 4:14 PMalert-byte-20504
11/13/2023, 12:35 PMory patch
for example) in a self-hosted Ory? To avoid re-write the file, or overriding the config with Env variables...jolly-breakfast-43519
11/11/2023, 7:45 AMred-secretary-8597
11/08/2023, 8:04 AM"organization": {
"title": "Organization ID",
"type": "string",
"format": "uuid",
"default": "00000000-0000-0000-0000-000000000000",
"<http://ory.sh/kratos|ory.sh/kratos>": {
"credentials": {
"password": {
"identifier": true
}
}
}
}
jolly-breakfast-43519
11/07/2023, 6:04 AMmagnificent-application-93453
11/06/2023, 6:41 PMloud-kangaroo-3824
11/01/2023, 3:44 PMhydra_oauth2_flow
tables and the addition of nid
make that migration take forever on larger loads and databases (for example, our hydra_oauth2_consent_request_handled
table approaches 30MM rows. Smaller databases in test environments go just fine, but testing on a copy of our production database has been running for over 30 hours. Obviously 30 hours of downtime is something we can't handle (and I have some ideas for that), but I'm curious what has worked for others. We can't be the only ones in this position?
We don't want to delete too much from hydra_oauth2_consent_request_handled
since we don't want to reset consent state for our users if we can help it. Our hydra_oauth2_authentication_request
is over 100MM rows, so we have a process right now to get rid of "dangling" requests (i.e. those that are more than a week old and don't have a hydra_oauth2_login_request_handled
associated with it), but that's slow goingstale-queen-97584
10/30/2023, 3:53 PMincalculable-city-41629
10/27/2023, 7:02 AMCOURIER_SMTP_CONNECTION_URI
incalculable-city-41629
10/27/2023, 7:00 AMDSN
incalculable-city-41629
10/27/2023, 6:59 AMgreen-jewelry-10349
10/27/2023, 6:57 AMdelightful-pillow-54981
10/23/2023, 12:11 PMdamp-notebook-13395
10/17/2023, 10:25 AMwide-machine-60917
10/13/2023, 1:47 PMtall-refrigerator-41682
10/10/2023, 10:44 AMserve:
admin:
cors:
enabled: true
debug: true
allowed_origins:
- <http://127.0.0.1:8082>
allowed_methods:
- POST
- GET
- PUT
- PATCH
- DELETE
allowed_headers:
- Authorization
exposed_headers:
- Content-Type
public:
cors:
enabled: true
debug: true
allowed_origins:
- <http://127.0.0.1:8082>
allowed_methods:
- POST
- GET
- PUT
- PATCH
- DELETE
allowed_headers:
- Authorization
exposed_headers:
- Content-Type
logs
time=2023-10-10T10:24:08Z level=info msg=started handling request http_request=map[headers:map[accept:*/* accept-encoding:gzip, deflate, br accept-language:en-GB,en-US;q=0.9,en;q=0.8 access-control-request-headers:content-type access-control-request-method:PUT connection:keep-alive origin:<http://127.0.0.1:8082> referer:<http://127.0.0.1:8082/> sec-fetch-dest:empty sec-fetch-mode:cors sec-fetch-site:same-site user-agent:Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36] host:127.0.0.1:4445 method:OPTIONS path:/admin/oauth2/auth/requests/login/accept query:Value is sensitive and has been redacted. To see the value set config key "log.leak_sensitive_values = true" or environment variable "LOG_LEAK_SENSITIVE_VALUES=true". remote:192.168.65.1:38544 scheme:http]
time=2023-10-10T10:24:09Z level=info msg=completed handling request http_request=map[headers:map[accept:*/* accept-encoding:gzip, deflate, br accept-language:en-GB,en-US;q=0.9,en;q=0.8 access-control-request-headers:content-type access-control-request-method:PUT connection:keep-alive origin:<http://127.0.0.1:8082> referer:<http://127.0.0.1:8082/> sec-fetch-dest:empty sec-fetch-mode:cors sec-fetch-site:same-site user-agent:Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36] host:127.0.0.1:4445 method:OPTIONS path:/admin/oauth2/auth/requests/login/accept query:Value is sensitive and has been redacted. To see the value set config key "log.leak_sensitive_values = true" or environment variable "LOG_LEAK_SENSITIVE_VALUES=true". remote:192.168.65.1:38544 scheme:http] http_response=map[headers:map[allow:OPTIONS, PUT] size:0 status:0 text_status: took:23.40675ms]
rhythmic-gpu-74421
10/10/2023, 3:31 AMwide-machine-60917
10/05/2023, 2:18 PM