-
Notifications
You must be signed in to change notification settings - Fork 8
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Invalid checks/redirects in UI #289
Comments
Thank you for reporting us your feedback! The internal ticket has been created: https://warthogs.atlassian.net/browse/IAM-1104.
|
We never redirect to the I don't think that is a bug per se. I don't know why we would refresh in case the |
Well, the browser is redirected to
I believe that this field will always be populated. AFAICT It is the url that was used to make this request, The kratos api docs say that it is a required field in the response:
I don't know, I was not involved in this and that's why I was hesitant to remove it. Perhaps @natalian98 has some insight |
Signed-off-by: David Edler <david.edler@canonical.com>
Right, that seems incorrect. I just tested and could not see any difference when removing those checks for the request url. So putting up a PR to remove them. |
Signed-off-by: David Edler <david.edler@canonical.com>
fix(request) avoid using request url in the ui. fixes #289
Not sure if this is what causes the bug or not, but in mulitple places in the frontend we are checking if the response from the backend contains a
request_url
(and sometimes we even redirect the user there), eg try to go to https://iam.dev.canonical.com/stg-identity-jaas-dev-login-ui/ui/reset_password. I thought we caught those on review, but it looks like some of these changes went through.From a quick search:
identity-platform-login-ui/ui/pages/reset_password.tsx
Line 54 in 2357551
identity-platform-login-ui/ui/pages/reset_email.tsx
Line 40 in 2357551
identity-platform-login-ui/ui/pages/setup_secure.tsx
Line 50 in 2357551
identity-platform-login-ui/ui/pages/setup_passkey.tsx
Line 46 in 2357551
identity-platform-login-ui/ui/pages/setup_backup_codes.tsx
Line 46 in 2357551
I am pretty sure that this is not correct, but I am not sure what these checks are trying to accomplish. In a production environment all these are pointing to admin APIs, which are not exposed to the public internet. The
request_url
is the URL that the backend used to call Kratos, there is no reason to call the same URL from the frontend.Originally posted by @nsklikas in #247 (comment)
The text was updated successfully, but these errors were encountered: