Commit Graph

13 Commits

Author SHA1 Message Date
Patrik 822ea266be test(hydra): add plaintext backups for all DB types
GitOrigin-RevId: ee2c8ff9ffacff66d09241827780350979957dba
2025-11-26 18:34:40 +00:00
Patrik 42b6a79041 test: split up consent manager test
GitOrigin-RevId: 80483effb7e51d3eebf14339600174252fc56b38
2025-10-23 14:20:47 +00:00
hackerman 4999d20db2 chore: fix all hydra linter issues
GitOrigin-RevId: 75db758dab3afb34587dcfaf40935ee4ea69c7b6
2025-09-29 09:07:24 +00:00
Patrik 2769a75d0c test: resturcture and improve integration tests
GitOrigin-RevId: 83dfe53cfc33f0a974d7b2f7eeed81d017d2518c
2025-09-25 12:30:47 +00:00
Philippe Gaultier d0ec7e3cbb chore: remove counting courier messages
GitOrigin-RevId: e053d3d2ff76e9368800441286c19b377ae84a19
2025-09-25 08:48:35 +00:00
Arne Luenser 38ee050214 fix: hydra tracing
GitOrigin-RevId: 44aeb79002934149b6889c4e13697aa178f3d614
2025-08-26 18:27:03 +00:00
Patrik dd97ec88ea chore(hydra): registry setup refactoring
GitOrigin-RevId: 8504255cc935c7057faf174814db75532a95c0d5
2025-08-18 09:29:26 +00:00
Patrik 29ba474a84 chore(hydra): improve test config setup
GitOrigin-RevId: 554890b424d335e9f87234212079894014372e66
2025-07-24 16:37:39 +00:00
hackerman 0a6c966206
feat: handle concurrent refreshes and improve graceful refreshing (#3895)
This patch improves Ory Hydra's ability to deal with refresh flows which, for example, concurrently refresh the same token. Furthermore, graceful token refresh has been improved to handle a variety of edge cases and scenarios.

Additionally, serializability errors in CockroachDB are now correctly retried.

See https://github.com/ory-corp/cloud/issues/7311
Closes https://github.com/ory/hydra/pull/3895
2024-12-17 09:57:05 +01:00
Patrik 477abaeb7d
chore: bump dependencies and generate internal SDK aligned with the published SDK (#3807) 2024-07-31 13:26:57 +02:00
Patrik 5c8e7923ed
feat: add authentication options to hooks (#3633) 2023-09-25 11:09:43 +02:00
Henning Perl efd9ca7d56
chore: bump deps (#3560) 2023-07-04 10:21:51 +02:00
Henning Perl f29fe3af97
feat: stateless authorization code flow (#3515)
This patch optimizes the performance of authorization code grant flows by minimizing the number of database queries. We acheive this by storing the flow in an AEAD-encoded cookie and AEAD-encoded request parameters for the authentication and consent screens. 

BREAKING CHANGE:

* The client that is used as part of the authorization grant flow is stored in the AEAD-encoding. Therefore, running flows will not observe updates to the client after they were started.
* Because the login and consent challenge values now include the AEAD-encoded flow, their size increased to around 1kB for a flow without any metadata (and increases linearly with the amount of metadata). Please adjust your ingress / gateway accordingly.
2023-06-12 20:27:00 +02:00