-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
client_secret_basic fails when client_secret is auto-generated #1419
Comments
Please add steps to reproduce this (e.g. CURL, |
Correct me if I'm wrong, but is the secret in the DB encrypted? Because if so, that is definitely the issue. |
It's hashed |
Is it mentioned anywhere how it's hashed or how to decrypt it? |
You can not un-hash something. The generated secret is returned in the payload when you create the client. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Describe the bug
I have 2 clients - one with a client_secret I passed to the registration endpoint and one without. Hydra gives the latter an automatically generated client_secret.
I've gone through the OAuth2 flow with the 2nd client, received a code but when trying to exchange it for a token, it fails with the message
"crypto/bcrypt: hashedPassword is not the hash of the given password"
If I repeat the same process with the 1st client I set up, it all works fine. client id and secret are both percent-encoded, then base64'ed, nothing else changes in the process.
I suspect it might have something to do with the characters in the secret, but not sure.
To Reproduce
Steps to reproduce the behavior:
Expected behavior
Should receive an access_token, but instead it fails with an error.
Version:
The text was updated successfully, but these errors were encountered: