I'm having an issue with csrf token on a fresh log...
# talk-kratos
h
I'm having an issue with csrf token on a fresh login flow when sending the browser request to `/login?flow={flow_id}`:
Copy code
the request was rejected to protect you from Cross-Site-Request-Forgery
I see that the request does have a csrf token cookie called
csrf_token_88992335412a638969f212b4e92ba3455bdcd1dc83c43c56abf3dfe42317f1da
? why does it happen even on a basic get request to load the login form? I upgraded to the latest
v1.0.0
, but it still happens
it seems like issues started appearing when we were forced to switch our cluster setup to HTTP2 (H2C internally). but the requests to oathkeeper/kratos go via http1.1. could it have something to do with
X-Forwarded-*
headers?