Cloudron makes it easy to run web apps like WordPress, Nextcloud, GitLab on your server. Find out more or install now.


Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • Bookmarks
  • Search
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo

Cloudron Forum

Apps | Demo | Docs | Install
  1. Cloudron Forum
  2. Verdaccio
  3. Verdaccio Tokens now short-lived

Verdaccio Tokens now short-lived

Scheduled Pinned Locked Moved Solved Verdaccio
9 Posts 4 Posters 291 Views 4 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • philkunzP Offline
    philkunzP Offline
    philkunz
    wrote on last edited by
    #1

    Verdaccio tokens now seem to expire after a day... This is not usable for CI/CD... Any reason why?

    1 Reply Last reply
    0
    • nebulonN nebulon marked this topic as a question on
    • philkunzP Offline
      philkunzP Offline
      philkunz
      wrote on last edited by philkunz
      #2

      Would it be possible to allow OIDC login in addition to the old way to login? We kind of rely on verdaccio and generally like cloudron for managing it. But with this kind of basic infrastructure stuff, stuff has to work. And a change like this, where first all previous tokens are rendered obsolete, then the normal npm login flow does not work anymore, then tokens expire after a day, rendering all infrastructure work regarding this from the day before basically useless is NOT a nice ux for us.

      1 Reply Last reply
      1
      • BrutalBirdieB Offline
        BrutalBirdieB Offline
        BrutalBirdie
        Partner
        wrote on last edited by BrutalBirdie
        #3

        Hey @philkunz as of right now, there are 174 apps in the Cloudron catalog.
        Even me a "partner", does not have every app installed, tested and fully in my head, not yet!

        If you wish to get more responses from the community, you need to be more verbose in writing your topics.
        I am not writing this wag my finger but to help you, getting better and faster help from everyone here 🙂

        Since I do not know the Verdaccio app at all, it would be a tremendous help for me do get details, to then maybe reproduce the issue and find a solution.

        Your critic about UX is completly understandable and very valid.

        After some quick research I found this github issue, which seems very similar to what you are describing.
        https://github.com/verdaccio/verdaccio/issues/168

        and I found https://verdaccio.org/docs/next/best/#expiring-tokens which might solve your issue already? 🤔

        Like my work? Consider donating a drink. Cheers!

        1 Reply Last reply
        0
        • philkunzP Offline
          philkunzP Offline
          philkunz
          wrote on last edited by
          #4

          You're right. Sometimes it is just this feeling of: "It worked perfectly before" 🙂 Btw: Thank you for finding the config.
          And yes, the good thing is: Cloudron offers a generally really nice mix of managed experience without blocking control. On the other side, if stuff is working, and then it is not -> I'm sometimes a little confused about how migrations work, if I add too much custom stuff...

          BrutalBirdieB 1 Reply Last reply
          0
          • nebulonN Offline
            nebulonN Offline
            nebulon
            Staff
            wrote on last edited by
            #5

            Sorry for that interruption on your end. We didn't test that use-case upfront. Did it help to set the expiration accordingly? I guess it would make sense to set this in the package to some reasonable number if this works.

            1 Reply Last reply
            0
            • philkunzP philkunz

              You're right. Sometimes it is just this feeling of: "It worked perfectly before" 🙂 Btw: Thank you for finding the config.
              And yes, the good thing is: Cloudron offers a generally really nice mix of managed experience without blocking control. On the other side, if stuff is working, and then it is not -> I'm sometimes a little confused about how migrations work, if I add too much custom stuff...

              BrutalBirdieB Offline
              BrutalBirdieB Offline
              BrutalBirdie
              Partner
              wrote on last edited by
              #6

              @philkunz said in Verdaccio Tokens now short-lived:

              "It worked perfectly before"

              Yes I can second that. With that annoyance in the brain everyone tents to cut short and be like "WHY?! IT WORKED?!".

              @philkunz said in Verdaccio Tokens now short-lived:

              On the other side, if stuff is working, and then it is not -> I'm sometimes a little confused about how migrations work, if I add too much custom stuff...

              What I can tell you from ~5 years of experience with Cloudron.
              This only sometimes happens if mayor changes take place.
              A normal app update normally never results in such pain.
              But if certain changes need to take place, like now with required OIDC, things can get a bit difficult.
              Not only because Cloudron changes stuff, but with OIDC come other changes that people do not have in mind.
              Like the user / password problem that does no longer work with any OIDC app.
              That is why I wrote such an exsessive guide for Nextcloud:
              https://forum.cloudron.io/topic/10067/guide-external-nextcloud-with-openid-social-login-calendar-caldav-synchronization

              But sometimes, these changes are required for security reasons or because the apps requrie it suddenly.

              I can 100 % understand your frustration and anoyance, but remember, same goes on when managing all these apps 😄

              "Why does this app now require ODIC in a minor version change? And without that fruther security update are not possible? WTF?!"

              But I think there is a learning point here.
              Maybe this update https://forum.cloudron.io/post/105728 should have been anounced 1-2 weeks before with some TL;DR "keep in mind the following stuff might break".
              And yet, afaik, the Cloudron Team does not have the posibilty to notify users that use app XYZ specifically about these changes.
              It has to be done in the forum.

              🤔
              I see improvment potential here.

              Like my work? Consider donating a drink. Cheers!

              1 Reply Last reply
              0
              • nebulonN Offline
                nebulonN Offline
                nebulon
                Staff
                wrote on last edited by
                #7

                Usually if such breakage is known upfront (which wasn't the case here, I guess we didn't expect the tokens get invalidated and then also expire in 1 day!) we would have released a major package version update, which requires manual updates so we can notify the admins.

                1 Reply Last reply
                0
                • philkunzP Offline
                  philkunzP Offline
                  philkunz
                  wrote on last edited by
                  #8

                  The jwt stuff works great. I have a default token life time of 1 year now, mirroring what gitlab is doing.

                  1 Reply Last reply
                  2
                  • J Offline
                    J Offline
                    joseph
                    Staff
                    wrote on last edited by
                    #9

                    in config.yaml, you can adjust the timeouts

                    security:
                      api:
                        jwt:
                          sign:
                            expiresIn: 300d # npm token expiration
                      web:
                        sign:
                          expiresIn: 300d # webUI token expiration
                    
                    
                    1 Reply Last reply
                    0
                    • J joseph has marked this topic as solved on
                    Reply
                    • Reply as topic
                    Log in to reply
                    • Oldest to Newest
                    • Newest to Oldest
                    • Most Votes


                    • Login

                    • Don't have an account? Register

                    • Login or register to search.
                    • First post
                      Last post
                    0
                    • Categories
                    • Recent
                    • Tags
                    • Popular
                    • Bookmarks
                    • Search