Cloudron makes it easy to run web apps like WordPress, Nextcloud, GitLab on your server. Find out more or install now.


Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • Bookmarks
  • Search
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo

Cloudron Forum

Apps | Demo | Docs | Install
philkunzP

philkunz

@philkunz
About
Posts
63
Topics
24
Shares
0
Groups
0
Followers
0
Following
0

Posts

Recent Best Controversial

  • Verdaccio Tokens now short-lived
    philkunzP philkunz

    The jwt stuff works great. I have a default token life time of 1 year now, mirroring what gitlab is doing.

    Verdaccio

  • Verdaccio Tokens now short-lived
    philkunzP philkunz

    You're right. Sometimes it is just this feeling of: "It worked perfectly before" 🙂 Btw: Thank you for finding the config.
    And yes, the good thing is: Cloudron offers a generally really nice mix of managed experience without blocking control. On the other side, if stuff is working, and then it is not -> I'm sometimes a little confused about how migrations work, if I add too much custom stuff...

    Verdaccio

  • Verdaccio Tokens now short-lived
    philkunzP philkunz

    Would it be possible to allow OIDC login in addition to the old way to login? We kind of rely on verdaccio and generally like cloudron for managing it. But with this kind of basic infrastructure stuff, stuff has to work. And a change like this, where first all previous tokens are rendered obsolete, then the normal npm login flow does not work anymore, then tokens expire after a day, rendering all infrastructure work regarding this from the day before basically useless is NOT a nice ux for us.

    Verdaccio

  • Verdaccio Tokens now short-lived
    philkunzP philkunz

    Verdaccio tokens now seem to expire after a day... This is not usable for CI/CD... Any reason why?

    Verdaccio

  • Verdaccio OIDC disables npm login
    philkunzP philkunz

    yes. All good.

    Verdaccio

  • Verdaccio OIDC disables npm login
    philkunzP philkunz

    Ah, yes.

    Verdaccio

  • Verdaccio OIDC disables npm login
    philkunzP philkunz

    Since the change in the latest update to OIDC, npm login does not work anymore with App passwords.

    Verdaccio

  • Verdaccio complaining about secret key length
    philkunzP philkunz
    security:
      api:
        migrateToSecureLegacySignature: true
    

    solves this.

    Verdaccio

  • Verdaccio complaining about secret key length
    philkunzP philkunz

    Seems like the secret key needs to be updated...

    Verdaccio

  • Verdaccio complaining about secret key length
    philkunzP philkunz

    Screenshot 2025-04-15 at 15.31.56.png

    caused:

    Screenshot 2025-04-15 at 15.32.42.png

    Verdaccio

  • Apache Answer throws OpenID connect error
    philkunzP philkunz

    I'll use a fresh install then.

    Apache Answer

  • Apache Answer throws OpenID connect error
    philkunzP philkunz

    Fresh install works as expected.

    Just took a look at the redirect uri:

    &redirect_uri=%2Fanswer%2Fapi%2Fv1%2Fconnector%2Fredirect%2Fbasic&response_type=code&scope=openid+profile+email&state=state
    

    That looks incomplete?

    Apache Answer

  • Apache Answer throws OpenID connect error
    philkunzP philkunz

    Also changing the location does not do the trick, which should update the redirect url.

    Apache Answer

  • Apache Answer throws OpenID connect error
    philkunzP philkunz

    All other apps work without a hitch. Also xxx.xxx is correct.

    Apache Answer

  • Apache Answer throws OpenID connect error
    philkunzP philkunz

    Screenshot 2025-03-26 at 12.19.12.png

    Apache Answer

  • Apache Answer throws OpenID connect error
    philkunzP philkunz

    tried that, still the same error.

    Apache Answer

  • Apache Answer throws OpenID connect error
    philkunzP philkunz

    nope. xxx.xxx was always xxx.xxx

    Apache Answer

  • Apache Answer throws OpenID connect error
    philkunzP philkunz

    @BrutalBirdie

    root@some-uid:/app/code# printenv | grep -i OIDC
    CLOUDRON_OIDC_PROFILE_ENDPOINT=https://my.xxx.xxx/openid/me
    CLOUDRON_OIDC_KEYS_ENDPOINT=https://my.xxx.xxx/openid/jwks
    CLOUDRON_OIDC_CLIENT_ID=abcdefg
    CLOUDRON_OIDC_PROVIDER_NAME=xxx.xxx Cloudron
    CLOUDRON_OIDC_AUTH_ENDPOINT=https://my.xxx.xxx/openid/auth
    CLOUDRON_OIDC_ISSUER=https://my.xxx.xxx/openid
    CLOUDRON_OIDC_DISCOVERY_URL=https://my.xxx.xxx/openid/.well-known/openid-configuration
    CLOUDRON_OIDC_TOKEN_ENDPOINT=https://my.xxx.xxx/openid/token
    CLOUDRON_OIDC_CLIENT_SECRET= abcdefg
    

    and

    root@some-uid:/app/code# mysql --user=${CLOUDRON_MYSQL_USERNAME} --password=${CLOUDRON_MYSQL_PASSWORD} --host=${CLOUDRON_MYSQL_HOST} ${CLOUDRON_MYSQL_DATABASE} -e "SELECT value FROM config WHERE \`key\`='plugin.status'"
    mysql: [Warning] Using a password on the command line interface can be insecure.
    +---------------------------------------------+
    | value                                       |
    +---------------------------------------------+
    | {"redis_cache":true,"basic_connector":true} |
    +---------------------------------------------+
    

    and

    root@some-uid:/app/code# mysql --user=${CLOUDRON_MYSQL_USERNAME} --password=${CLOUDRON_MYSQL_PASSWORD} --host=${CLOUDRON_MYSQL_HOST} ${CLOUDRON_MYSQL_DATABASE} -e "SELECT * FROM plugin_config WHERE plugin_slug_name='basic_connector' \G"
    mysql: [Warning] Using a password on the command line interface can be insecure.
    *************************** 1. row ***************************
                  id: 72
    plugin_slug_name: basic_connector
               value: {"authorize_url":"https://my.xxx.xxx/openid/auth","check_email_verified":true,"client_id":"abced1234","client_secret":"abcd1234","email_verified_json_path":"email_verified","logo_svg":"","name":"xxx.xxx Cloudron","scope":"openid,profile,email","token_url":"https://my.xxx.xxx/openid/token","user_avatar_json_path":"","user_display_name_json_path":"name","user_email_json_path":"email","user_id_json_path":"sub","user_json_url":"https://my.xxx.xxx/openid/me","user_username_json_path":"preferred_username"}
    
    Apache Answer

  • Apache Answer throws OpenID connect error
    philkunzP philkunz

    redirect_uri did not match any of the client's registered redirect_uris

    Apache Answer

  • Apache Answer throws OpenID connect error
    philkunzP philkunz

    Apache throws OpenID connect error in latest version

    Apache Answer
  • Login

  • Don't have an account? Register

  • Login or register to search.
  • First post
    Last post
0
  • Categories
  • Recent
  • Tags
  • Popular
  • Bookmarks
  • Search