OIDC login fails with 401 in v0.7.9 – previously worked in v0.7.8 using client_secret_basic #8668
Replies: 1 comment 3 replies
-
We have upgraded the library First off, it'd be helpful to see the full output of your logs: Log locations:
There are two types of logs that can help diagnose the issue:
Error logs contain exact stack traces and are especially helpful, but both can provide valuable information. Please only include the relevant portions of logs that correspond to when you reproduced the error. Secondly, your OIDC setup seems a bit complex. If there's any way to simplify it or given thorough instructions on standing it up, we could more easily take a look at resolving this. For the time being, I would suggest looking at the https://github.com/panva/openid-client/issues?q=is%3Aissue%20state%3Aclosed |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Hi,
after successfully running LibreChat v0.7.8 with an OpenID Connect (OIDC) login via a SATOSA-based OIDC proxy, I’m encountering a 401 Unauthorized error after upgrading to v0.7.9 using the new helm chart "librechat-1.8.9":
Environment:
v0.7.8
→v0.7.9
🔧 OIDC Setup
The following environment variables are configured:
The
OPENID_CLIENT_ID
andOPENID_CLIENT_SECRET
are inside my k8s secret and can be read in the container. This is also enabled :The image is also set correctly:
OIDC login worked correctly with v0.7.8.
After upgrading to v0.7.9, the login still redirects to the identity provider, but fails during the token exchange phase. This is the log output:
Changing the auth method to
client_secret_post
makes no difference. The same credentials work in the earlier version.Does anyone of you has a clue what changed from 0.7.8 to 0.7.9? Maybe you can help me. Many thanks!
Beta Was this translation helpful? Give feedback.
All reactions