-
Notifications
You must be signed in to change notification settings - Fork 131
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[BUG] Migration OAuth2 - OIDC #824
Comments
I have taken some logs with the steps above: ownCloud_23_Oct_2020_at_14_34_10.log.txt i hope it is useful |
Thanks for the log! Here's what I found:
… the SDK will detect this as both
Possible solutionWith |
Ok, so I implemented the solution suggested above locally, with Testing with Does the ocis-lastest instance also support OAuth2 - or just OIDC? (cc @DeepDiver1975) |
@felix-schwarz I think |
Thanks for checking. Where (branch) can i check your solution @felix-schwarz? |
@michaelstingl I get a
Response:
So it looks like detecting a lack of support for @jesmrec I actually wanted to commit it to
|
Two additional thoughts here:
|
QA checks, in different related scenarios:
Current: not redirected to the app. @felix-schwarz is this scenario feasible to fix?
|
@jesmrec Regarding Basic -> OIDC: In normal usage, the app won't notice or scan for OIDC unless Basic Auth fails with a Inside bookmark editing, right now the UI represents the status quo of the bookmark and allows editing of its parameters. If you edit the URL (f.ex. remove, then re-add a trailing What could be done: add an entry with which it's possible to check for available authentication methods and either I wouldn't consider any of this to be feasible for migrating whole instances, however. Likewise, disabling authentication methods on the server to force the client to switch authentication methods could lock out client software that only supports Basic Auth and/or OAuth2. The best solution IMO would be to provide information through the capabilities on migration paths for authentication methods, i.e. "auth-migrations" : {
"basic-auth" : [ "oidc", "oauth2" ],
"oauth2" : [ "oidc" ]
} This would indicate to clients that:
|
Does this affect the fact that the list of files is shown in the browser? the point is, that the editing action moves correctly from OAuth2 to OIDC in the URL/auth method recognition, but at the end there is no callback to the app. Here it is the performance. Initial account is OAuth2, and when editing, OIDC is already available: |
@jesmrec Likely a redirect happening to the regular login page here, so that after Authorization, you get forwarded to the web UI rather than a token returned to the app. Did you take a log for that session by any chance? Hard to definitely tell what's happening under the hood without. |
Here you have logs of that scenario ownCloud_30_Oct_2020_at_08_58_19.log.txt If you need more info, please ping me. |
@jesmrec That log doesn't use the SDK version with the improvements. To use that, in the
After that, if you compile and run the app, it includes the changes in auth detection. If the changes are relevant to the |
will recheck, probably something went wrong through the submodule checkout. |
@jesmrec FWIW I now back ported the changes from the Additionally, I added enforcement for the If you set
|
Thanks for the new stuff. I got new logs of the problem described here App commit: |
Problem comes from owncloud/openidconnect#66 (comment), in the scope of the OAuth2 - OIDC migration. These are the steps (let me know if you need an environment):
After that, list of files is shown in the browser, not in the app. Callback is lost somewhere.
With both auth methods enabled at the time, editing the account gives the same result (files in browser)
Installing from scratch, everything is correct.
I can't assure 100% the problem is in the app, so, feel free to close if it is not.
The text was updated successfully, but these errors were encountered: