-
Notifications
You must be signed in to change notification settings - Fork 805
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
When using KeepassXC as a libsecret provider on GNU/Linux, credentials cannot be fetched by Nextcloud #2303
Comments
Qt 5.15 is what you see in the Settings dialog or it is the version of qt installed in your Arch Linux? |
This is not limited to KeepassX but also Seahorse (default Ubuntu Keyring) if you not automatically unlock it on startup or remove the password altogether. So maybe we could draw the scope smaller to just Nextclous failing to retry? |
Sorry, a bit late in my response
That's from the installed version of Qt, the only thing I have in the "about" section in settings is "Version 2.6.5 (Arch)"
Yep, it uses libsecret, wich communicates with the Secret Service API, which is used by most keychains. So I assume the problem will show up for anything that has to be unlocked manually after logon. |
I have the same problem. A workaround for that is using the following bash script as a startup instead of nextcloud directly:
|
I believe this is a general Nextcloud issue. I was using Nextcloud with KWallet before KeePassXC had libsecret support and I had the same issue there, starting at some version 2.x. There is an issue somewhere on the bug tracker here about that. |
As far as I can tell the secret-service spec is not super clear on this issue but strongly encourages storing lookup attributes unencrypted (they "are not part of the secret") and allowing searches via these attributes. For KeePassXC at least this is apparently not desired since it can betray potentially private information when storing this data unencrypted and exposing it without unlocking the database. |
This bug report did not receive an update in the last 4 weeks. Please take a look again and update the issue with new details, otherwise the issue will be automatically closed in 2 weeks. Thank you! |
Expected behaviour
On GNU/Linux with libsecret, when using a keychain that requires to be unlocked after login (such as a KeepassXC or Bitwarden configured to work as a keyring), retry to fetch the credentials from keychain after the keychain is manually unlocked to connect to Nextcloud
Actual behaviour
If Nextcloud is started at logon, it fails to fetch credentials the first time, as the KeepassXC database is not unlocked. It asks the user to connect again to the server as a result.
When the database is unlocked, attempting to reconnect on the Nextcloud interface reprompts the user for his credentials, as the following variable is set to false (assumed) :
2020-08-21 23:22:28:530 [ info nextcloud.gui.account.state ]: Credentials asked for "https://cloud.domain.com" are they ready? false
Steps to reproduce
Client configuration
Client version:
2.6.5
Operating system:
Arch Linux (up to date, latest kernel), swaywm
OS language:
French
Qt version used by client package (Linux only, see also Settings dialog):
5.15.0
Client package (From Nextcloud or distro) (Linux only):
From pacman mirrors
Logs
Logs with
https://gist.github.com/SalutAToi/985d9ffce00e1f9c4cf3a7ab94099d47
The text was updated successfully, but these errors were encountered: