handsome-agency-20541
03/20/2023, 3:51 PMhandsome-agency-20541
03/20/2023, 3:52 PMory perform authorization-code --project $ORY_PROJECT_ID --client-id $ORY_CLIENT_ID --client-secret $ORY_CLIENT_SECRET --scope openid,email,profile,offline_access
handsome-agency-20541
03/20/2023, 3:54 PMhandsome-agency-20541
03/20/2023, 3:58 PM--prompt=none
because it also, apparently, wants the second factor and responds with login_required
error.proud-plumber-24205
03/20/2023, 4:09 PMhandsome-agency-20541
03/20/2023, 4:10 PMhandsome-agency-20541
03/20/2023, 4:12 PMhttps://….<http://projects.oryapis.com/ui|projects.oryapis.com/ui>
pages open normally without asking for the password.fast-lunch-54279
handsome-agency-20541
03/21/2023, 8:50 AMhandsome-agency-20541
03/21/2023, 8:51 AMproud-plumber-24205
03/21/2023, 9:41 AMrefresh=true
query parameter is added or the request is to something that requires a privileged session.proud-plumber-24205
03/21/2023, 9:42 AMproud-plumber-24205
03/21/2023, 9:43 AMhandsome-agency-20541
03/21/2023, 9:43 AMproud-plumber-24205
03/21/2023, 9:45 AMhandsome-agency-20541
03/21/2023, 9:46 AMproud-plumber-24205
03/21/2023, 9:48 AM?refresh=true
to create login flow).handsome-agency-20541
03/21/2023, 2:15 PMrefresh=true
is “Customize / User Interface / Login UI” field. It did not help.
In dev tools I see a sequence of redirects which passes through this one
/self-service/login/browser?aal=&refresh=&return_to=&login_challenge=3ffbf5a86ee94328b8434c32427e54c7
If I remove login_challenge
parameter, the login flow no longer asks for the password or the second factor. So, apparently, it is something from Hydra that makes Kratos re-check the credentials.
I’m not yet sure how I can influence this process.handsome-agency-20541
03/21/2023, 2:17 PMsomething from HydraOn the second thought, could be something in Kratos just in the presence of Hydra interop. So I’m just guessing here 😐
proud-plumber-24205
03/21/2023, 2:20 PMhandsome-agency-20541
03/21/2023, 2:22 PMWould it be possible to add everything to an issueAbsolutely. It will take me some time to collect all the pieces in a readable bunch, but I’ll do that.
proud-plumber-24205
03/21/2023, 2:22 PMhandsome-agency-20541
03/22/2023, 11:01 AMif !hlr.GetSkip() {
h.d.SelfServiceErrorManager().Forward(r.Context(), w, r, errors.WithStack(herodot.ErrInternalServerError.WithReason("ErrAlreadyLoggedIn indicated we can skip login, but Hydra asked us to refresh")))
return
}
I have checked the output of /admin/oauth2/auth/requests/login?login_challenge=…
for the challenge mentioned in the subsequent login flow, and it has "skip": false
.
The doc states:
required booleanskip
Skip, if true, implies that the client has requested the same scopes from the same user previously. If true, you can skip asking the user to grant the requested scopes, and simply forward the user to the redirect URL.Getting
false
seems wrong, since I’m requesting the same scopes each time (openid,email,profile,offline_access); tried with both “skip consent” option enabled and disabled for my test OIDC client.handsome-agency-20541
03/22/2023, 2:24 PMhandsome-agency-20541
03/22/2023, 2:28 PMI’m pretty sure it did not work this way a couple months ago.Since that bug was filed in December, either it requires some specific conditions, or my memory misleads me 😅
handsome-agency-20541
03/22/2023, 2:53 PMproud-plumber-24205
03/22/2023, 2:54 PMproud-plumber-24205
03/22/2023, 2:57 PMproud-plumber-24205
03/22/2023, 2:57 PMproud-plumber-24205
03/22/2023, 2:58 PMhandsome-agency-20541
03/22/2023, 2:58 PMhandsome-agency-20541
03/24/2023, 4:08 PM