-
Notifications
You must be signed in to change notification settings - Fork 2.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
No need to handle authentication that early aka in here at all #30421
Conversation
As discussed, let's see where CI crashes |
I just got same results as @DeepDiver1975 with the patch; no more traces of the error neither with browser login nor with basic/OAuth2-based logins on the client. I'll check with a mobile client next. Appart from this; I'm assuming Shibboleth-auth flow was never affected by those errors; as the un-patched 10.0.7 never displayed the "Login failed" messages. I've also verified that using the app. passwords together with Still a couple of interesting scenarios I need to check:
Very likely that these are just fine. |
Wrapped-Shibboleth-by-OAuth2 also seems to be working, no messages whatsoever. @davitol will get to check with LDAP tomorrow. Instructions on how to replicate a proper testing scenario are explained in #30398 (comment) Just, additionally, apply this patch (and the #30365 + owncloud/oauth2#112 combo) and:
|
I still suspect that there are scenarios that did require the current code path.
|
as shown by the integration tests: https://jenkins.owncloud.org/job/owncloud-core/job/core/job/PR-30421/1/#showFailuresLink |
@PVince81 @DeepDiver1975 of course, a full smoke test will be in place once we build RC2. As said, I've been mostly focusing on reviewing the logs on client/browser auth. scenarios. |
Codecov Report
@@ Coverage Diff @@
## master #30421 +/- ##
============================================
+ Coverage 61.97% 62% +0.02%
- Complexity 19080 19085 +5
============================================
Files 1091 1091
Lines 61492 61501 +9
============================================
+ Hits 38109 38131 +22
+ Misses 23383 23370 -13
Continue to review full report at Codecov.
|
305e09b
to
ca9294d
Compare
I'm getting the "Login Failed" error message once again when using the app password during the OAuth2 auth8n flow. Not sure if everything is in place (since I'm applying 3 different patches on top of 10.0.7 RC1), tho 😕 The test environment is getting quite hard to setup IMO. Could we move/merge everything on a branch to make reproducing easier?
Then, just generating and using an app password during the initial OAuth2 setup (like described in #30398 (comment)) causes the logs to spit "Login failed" once again. |
d281eb5
to
e878493
Compare
@DeepDiver1975 is this worth continuing now that we have the other fix ? |
we have no fix yet for 'login failed' on public routes which have basic auth in their headers. |
6345d06
to
12ae499
Compare
Concerns about "setupFS" happening before the user is actually logged in.
|
12ae499
to
ae97bff
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
👍 code looks fine, as discussed with @DeepDiver1975 and concerns were adressed
merge or do more tests ? we'll anyway need to redo regression testing for all auth-related things as per owncloud/QA#529 |
@DeepDiver1975 please backport to stable10 |
This thread has been automatically locked since there has not been any recent activity after it was closed. Please open a new issue for related bugs. |
Description
For an unauthenticated request there is no need to try to login implicitly in base.php
Login is done in the login controller.
Related Issue
#30398 (comment)
How Has This Been Tested?
manually browser
desktop client with oauth
ldap
shib
mobile clients
Screenshots (if appropriate):
Types of changes
Checklist: