Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Refresh token and access token share same lifetime #955

Closed
ayZagen opened this issue Jul 30, 2018 · 5 comments
Closed

Refresh token and access token share same lifetime #955

ayZagen opened this issue Jul 30, 2018 · 5 comments

Comments

@ayZagen
Copy link

ayZagen commented Jul 30, 2018

What is the current behavior?
When ACCESS_TOKEN_LIFESPAN environment variable set it affects refresh tokens too.

If the current behavior is a bug, please provide the steps to reproduce and if possible a minimal demo of the problem.

  • Set ACCESS_TOKEN_LIFESPAN to a value that you will wait for and start hydra.
  • Get a refresh token
  • Introspect it after ACCESS_TOKEN_LIFESPAN expires
  • Result should be { active: false }

What is the expected behavior?
Refresh token lifespan config should be seperate

Which version of the software is affected?
Master branch.

@aeneasr
Copy link
Member

aeneasr commented Jul 30, 2018

Please share your configuration (all env vars, truncate sensitive ones) too.

@aeneasr
Copy link
Member

aeneasr commented Jul 30, 2018

I can not reproduce this. Refresh tokens do not have an expiry time by the way.

@ayZagen
Copy link
Author

ayZagen commented Jul 30, 2018

screenshot 1

I checked postgres and they seem active. But when I try to introspect it returns false.

@ayZagen
Copy link
Author

ayZagen commented Jul 30, 2018

Alright my bad. I was sending in refresh_token field. It should be token instead. Could you improve response output ? :)

@ayZagen ayZagen closed this as completed Jul 30, 2018
@jigetage
Copy link

Configuration key ACCESS_TOKEN_LIFESPAN is deprecated and will be removed in a future release. Use key ttl.access_token instead!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants