-
-
Notifications
You must be signed in to change notification settings - Fork 1.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[BUG] Dashy 3.1.1 baremetal with keycloak doesn't work #1625
Comments
Hello, same issue here. After downgrading Keycloak to v24 everything is working as expected. |
Same issue for me. I use:
Both hosted as Docker containers on a Synology NAS behind the built-in (Synology) Reverse Proxy and publicly available via HTTPS. I get the same result. Auth seems to work on Keycloak side, because a session is created and the Keycloak logs show nothing. But Dashy shows this: |
Since I'm not using docker, I cannot really roll back keycloak to a previous version (I could, but it's too much work). Is there any way I can help testing and fixing this bug? |
@juantxorena I assume that Keycloak v25.0.0 introduced some breaking changes, so that the implementation in Dashy needs some adjustments. For reference: https://www.keycloak.org/docs/latest/release_notes/index.html Dashy is currently using
A quick look at the old v24.0.5 and latest v25.0.1 docs did not reveal any major changes for the overall implementation so far. Maybe it is worth noting this in the installation instructions / troubleshooting section / readme file... until it is updated. |
@juantxorena Did you try to use the OIDC method in the meantime? Maybe this works with Keycloak... I haven't tried it and I can't at the moment, because I removed Dashy for now. |
Hi, I also encountered with this error. Last week we upgraded to Keycloak 25.X.X and after that login into Dashy stopped working. It definitely looks like some issue with the deprecation of the I also tried your @veniplex recommendation, and it seems to work after switching to generic OIDC auth. Will anyone try to upgrade the |
Hello, Now that general OIDC Authentication is available, what benefit is there to use The library is supposed to help developers to implement Keycloak-based Auth in their solutions. Now that a general solution is available, don't you think that Keycloak Auth with |
I think that would a good decision, as keycloak allows oidc, however if we'd really deprecate keycloak( as it requires a lot of maintenance and there are often many problems with keycloak) we'd have to communicate and plan this out well, as I think a lot of people use keycloak, so we can't just remove it. @Lissy93 What's your opinion on this? |
@nOw-Ay As far as I understand, there are Keycloak-specific features available within @CrazyWolf13 Since Dashy doesn't work with the newest version of Keycloak, the most part is already done 😆... I think an update of the documentation would be enough. Just refer to the OIDC implementation for now. |
I'm having trouble with getting the OIDC implementation working, specifically, getting a whole lot of "Invalid scopes" errors, and I can't find any documentation as to what might be causing it |
Environment
Self-Hosted (Bare Metal)
System
debian 12
Version
3.1.1
Describe the problem
This is different than most of the other bugs, since the other ones usually relate to docker.
As the title says, dashy 3.1.1 doesn't work with the latest keycloak version (25.0.1). It redirects to the login page, and after login, I get the black screen of death (with "It looks like something's gone wrong..." etc). When disabling keycloak auth it works as expected. This happened after upgrading dashy from a very old version (2.x).
My setup: dashy behind nginx in a LXC container (in proxmox). Keycloak in another LXC container in the same machine.
Unfortunately the browser console doesn't say anything:
The strange thing is that I actually get a token, so I assume that the keycloak config is ok:
Additional info
dashy conf:
nginx conf:
Please tick the boxes
The text was updated successfully, but these errors were encountered: