mirror of
https://github.com/open-webui/open-webui.git
synced 2026-03-16 20:11:53 -05:00
enh: OIDC/OAuth2 flow logs #1843
Reference in New Issue
Block a user
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @senpro-ingwersenk on GitHub (Aug 22, 2024).
Bug Report
There are issues here and there with the OIDC/OAuth implementation that you can find reports on in numerous tickets. The biggest issue is, that the logs give you no feedback on what is wrong exactly and just continues on with weird messages in the frontend - like mismatching email/password, when the request is the result of an OIDC flow. It makes no sense...
So, I would like to ask for more and better debugging so we can get rid of that bug! :)
/cc @brtptrs
Installation Method
I used Docker Compose - but Keycloak lives in a k3s cluster - in fact, in a separate network.
Environment
Open WebUI Version:
ghcr.io/open-webui/open-webui:mainOllama (if applicable): n/a
Operating System: Linux, arm64, Debian 12
Browser (if applicable): Not applicable
Confirmation:
Expected Behavior:
Right now, we only get messages like this:
No URL, no parameters, no response body. I even set
LOG_LEVEL: trace.The expected behaviour is to receive more context to reproduce or at least investigate bette rinto where the problem comes from.
Actual Behavior:
Short logs with little information
Description
Bug Summary:
OpenWebUI does not provide further information even under trace logging, making the actual debugging quite difficult.
Reproduction Details
Steps to Reproduce:
There's a couple. In my case, just a basic Keycloak realm ("master") with a provider configured for client/secret, with everything else left on default.
Logs and Screenshots
Browser Console Logs:
n/a
Docker Container Logs:
See above
Screenshots/Screen Recordings (if applicable):
n/a
Additional Information
In my case, Keycloak lives in a separate segment of the main network and there is a chance that it is running into our firewall and I have no real way of finding that out because the firewall my boss chose to use is ... uh ... well, to put it nicely, it is not nice. ;) It has a WAF but it is hard to look into it's logs.
Note
Thank you too!
@tjbck commented on GitHub (Aug 22, 2024):
PR welcome!