Cloudron makes it easy to run web apps like WordPress, Nextcloud, GitLab on your server. Find out more or install now.


Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • Bookmarks
  • Search
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo

Cloudron Forum

Apps | Demo | Docs | Install
  1. Cloudron Forum
  2. Verdaccio
  3. Verdaccio Tokens now short-lived

Verdaccio Tokens now short-lived

Scheduled Pinned Locked Moved Solved Verdaccio
9 Posts 4 Posters 171 Views 4 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • philkunzP Offline
      philkunzP Offline
      philkunz
      wrote on last edited by
      #1

      Verdaccio tokens now seem to expire after a day... This is not usable for CI/CD... Any reason why?

      1 Reply Last reply
      0
      • nebulonN nebulon marked this topic as a question on
      • philkunzP Offline
        philkunzP Offline
        philkunz
        wrote on last edited by philkunz
        #2

        Would it be possible to allow OIDC login in addition to the old way to login? We kind of rely on verdaccio and generally like cloudron for managing it. But with this kind of basic infrastructure stuff, stuff has to work. And a change like this, where first all previous tokens are rendered obsolete, then the normal npm login flow does not work anymore, then tokens expire after a day, rendering all infrastructure work regarding this from the day before basically useless is NOT a nice ux for us.

        1 Reply Last reply
        1
        • BrutalBirdieB Offline
          BrutalBirdieB Offline
          BrutalBirdie
          Partner
          wrote on last edited by BrutalBirdie
          #3

          Hey @philkunz as of right now, there are 174 apps in the Cloudron catalog.
          Even me a "partner", does not have every app installed, tested and fully in my head, not yet!

          If you wish to get more responses from the community, you need to be more verbose in writing your topics.
          I am not writing this wag my finger but to help you, getting better and faster help from everyone here 🙂

          Since I do not know the Verdaccio app at all, it would be a tremendous help for me do get details, to then maybe reproduce the issue and find a solution.

          Your critic about UX is completly understandable and very valid.

          After some quick research I found this github issue, which seems very similar to what you are describing.
          https://github.com/verdaccio/verdaccio/issues/168

          and I found https://verdaccio.org/docs/next/best/#expiring-tokens which might solve your issue already? 🤔

          Like my work? Consider donating a drink. Cheers!

          1 Reply Last reply
          0
          • philkunzP Offline
            philkunzP Offline
            philkunz
            wrote on last edited by
            #4

            You're right. Sometimes it is just this feeling of: "It worked perfectly before" 🙂 Btw: Thank you for finding the config.
            And yes, the good thing is: Cloudron offers a generally really nice mix of managed experience without blocking control. On the other side, if stuff is working, and then it is not -> I'm sometimes a little confused about how migrations work, if I add too much custom stuff...

            BrutalBirdieB 1 Reply Last reply
            0
            • nebulonN Away
              nebulonN Away
              nebulon
              Staff
              wrote on last edited by
              #5

              Sorry for that interruption on your end. We didn't test that use-case upfront. Did it help to set the expiration accordingly? I guess it would make sense to set this in the package to some reasonable number if this works.

              1 Reply Last reply
              0
              • philkunzP philkunz

                You're right. Sometimes it is just this feeling of: "It worked perfectly before" 🙂 Btw: Thank you for finding the config.
                And yes, the good thing is: Cloudron offers a generally really nice mix of managed experience without blocking control. On the other side, if stuff is working, and then it is not -> I'm sometimes a little confused about how migrations work, if I add too much custom stuff...

                BrutalBirdieB Offline
                BrutalBirdieB Offline
                BrutalBirdie
                Partner
                wrote on last edited by
                #6

                @philkunz said in Verdaccio Tokens now short-lived:

                "It worked perfectly before"

                Yes I can second that. With that annoyance in the brain everyone tents to cut short and be like "WHY?! IT WORKED?!".

                @philkunz said in Verdaccio Tokens now short-lived:

                On the other side, if stuff is working, and then it is not -> I'm sometimes a little confused about how migrations work, if I add too much custom stuff...

                What I can tell you from ~5 years of experience with Cloudron.
                This only sometimes happens if mayor changes take place.
                A normal app update normally never results in such pain.
                But if certain changes need to take place, like now with required OIDC, things can get a bit difficult.
                Not only because Cloudron changes stuff, but with OIDC come other changes that people do not have in mind.
                Like the user / password problem that does no longer work with any OIDC app.
                That is why I wrote such an exsessive guide for Nextcloud:
                https://forum.cloudron.io/topic/10067/guide-external-nextcloud-with-openid-social-login-calendar-caldav-synchronization

                But sometimes, these changes are required for security reasons or because the apps requrie it suddenly.

                I can 100 % understand your frustration and anoyance, but remember, same goes on when managing all these apps 😄

                "Why does this app now require ODIC in a minor version change? And without that fruther security update are not possible? WTF?!"

                But I think there is a learning point here.
                Maybe this update https://forum.cloudron.io/post/105728 should have been anounced 1-2 weeks before with some TL;DR "keep in mind the following stuff might break".
                And yet, afaik, the Cloudron Team does not have the posibilty to notify users that use app XYZ specifically about these changes.
                It has to be done in the forum.

                🤔
                I see improvment potential here.

                Like my work? Consider donating a drink. Cheers!

                1 Reply Last reply
                0
                • nebulonN Away
                  nebulonN Away
                  nebulon
                  Staff
                  wrote on last edited by
                  #7

                  Usually if such breakage is known upfront (which wasn't the case here, I guess we didn't expect the tokens get invalidated and then also expire in 1 day!) we would have released a major package version update, which requires manual updates so we can notify the admins.

                  1 Reply Last reply
                  0
                  • philkunzP Offline
                    philkunzP Offline
                    philkunz
                    wrote last edited by
                    #8

                    The jwt stuff works great. I have a default token life time of 1 year now, mirroring what gitlab is doing.

                    1 Reply Last reply
                    2
                    • J Offline
                      J Offline
                      joseph
                      Staff
                      wrote last edited by
                      #9

                      in config.yaml, you can adjust the timeouts

                      security:
                        api:
                          jwt:
                            sign:
                              expiresIn: 300d # npm token expiration
                        web:
                          sign:
                            expiresIn: 300d # webUI token expiration
                      
                      
                      1 Reply Last reply
                      0
                      • J joseph has marked this topic as solved
                      Reply
                      • Reply as topic
                      Log in to reply
                      • Oldest to Newest
                      • Newest to Oldest
                      • Most Votes


                        • Login

                        • Don't have an account? Register

                        • Login or register to search.
                        • First post
                          Last post
                        0
                        • Categories
                        • Recent
                        • Tags
                        • Popular
                        • Bookmarks
                        • Search