Closed 0x1a8510f2 closed 1 year ago
seems to be an issue with the username. @rhafer Any ideas?
@0x1a8510f2 Can you set GRAPH_LOG_LEVEL=debug
and PROXY_LOG_LEVEL=debug
and upload the logs after you rerun the test?
Sure thing @rhafer. Currently on mobile so I wasn't able to get the complete log, but the below seems like the relevant bit.
Let me know if you need more logs.
Let me know if you need more logs.
@0x1a8510f2 Thanks, that should be enough. Ok, by default we require usernames to start with a letter. That's why the user creation fails. But it should definitely not cause a nil pointer panic. So there is a bug in the error handling somewhere.
You can switch of the username restrictions by setting GRAPH_USERNAME_MATCH=none
. That would allow the user name you're using.
Great, thanks for your help! Was able to log in successfully with GRAPH_USERNAME_MATCH=none
. Leaving the issue open to track the error handling panic.
@rhafer The envvar GRAPH_USERNAME_MATCH
is described with
Option to allow legacy usernames. Supported options are 'default' and 'none'.
Reading this context, the description is not sufficient, clear and needs a fix. Based on such a fix, we can add a note to the documentation to highlight this envvar.
@rhafer ping, as offered, pls provide us with the required details so we can proceed
Describe the bug
While using oauth, one user is autoprovisioned correctly and can log in, while another is stuck on a "You were automatically logged out for security reasons" loop. See logs below.
Steps to reproduce
Unclear. Autoprovisioning fails for user with username
0x1a8510f2
but succeeds for usernamel1qu1d
. No other significant differences between the users.Expected behavior
The user is autoprovisioned and signed in correctly.
Actual behavior
The user is presented with the following screen, and errors appear in logs:
Setup
Fresh installation via docker using `owncloud/ocis:latest` updated today. ![image](https://user-images.githubusercontent.com/83190128/235351444-a2a4b097-083c-486f-ada1-e15dd91adedf.png) Caddy proxy in front of container with the following config: ``` files.l1qu1d.net { import tls import sec import log # Compression encode zstd gzip reverse_proxy * { to https://ocis:9200 transport http { tls_insecure_skip_verify } } } ``` Auth handled by ZITADEL with the following config: ![image](https://user-images.githubusercontent.com/83190128/235351564-40f66884-7a88-4fc8-89e4-434f058209fd.png) ![image](https://user-images.githubusercontent.com/83190128/235351573-76ef5f7b-2f85-46cb-8f1e-a6b892897672.png)