-
Notifications
You must be signed in to change notification settings - Fork 117
"No auth token" using authenticate strategy: 'jwt' (v.1.0.0-beta-2) #366
Comments
I have the same issue |
It seems related to the When I use it in any hook, I always get For example on the app.service('authentication').hooks({
before: {
create: [
auth.hooks.authenticate(['jwt', 'local']),
customJWTPayload(),
],
},
}); then (with session enabled in configs) no error using But if I try to call the
and if I remove |
And what's the real purpose of the Should it be removed from the Then if we suppose its purpose is for block some service I do:
then if I generate the token/session from the rest and I use the token to call these restricted service, the access is grant. But the same configuration, from the client side (logged with cookie using app().authenticate() - without arguments), the service are blocked, I get |
@foxhound87 it should be |
Other issues:
|
@ekryski thank you for your answer. I tried both:
not working. But now I'm not using the token anymore, I'm using Still errors: |
@foxhound87 the reason you are getting unhandled rejection is because the auth client is trying to authenticate automatically on initialization. @marshallswain added this for SSR but I need to tidy it up a bit so that it doesn't just throw an error. It has nothing to do with the server side. |
Your client should be Server side should be: app.service('authentication').hooks({
before: {
create: [
auth.hooks.authenticate(['jwt', 'local'])
],
},
}); |
I have no auth token when I log in with rest instance of feathers and I use socket instance later. |
@bertho-zero, the feathers client only works with one provider at a time, so you'd have to have two app instances to switch providers. It could still work, but each app would have to authenticate individually. |
Ah ok, I was absolutely looking to share the token between the 2 instances. |
@bertho-zero it will do that but the problem is that since you are authenticating with effectively 2 different apps the tokens will be different. You'd likely want to give one a different localstorage key name. Otherwise they would overwrite each other every time you successfully authenticate. @foxhound87 did you get your stuff working? We just pushed a bunch of updates and bug fixes so if you are still having issues you might want to try moving to the official 1.0.x and the latest version of all plugins. |
With feathers-rest , setting up the client to look for the token in localStorage will work without having to call |
@ekryski I authenticate with a single instance, there is no problem with the token itself, but I would like to share the token between the two instances. For that it would be enough that the client's hook would look in the localStorage no? @marshallswain If I use the socket everything works, it's just for practical questions that I preferred to see the query, it's less practical with socket. |
@bertho-zero are you talking about the logs? I'm getting no logs on server terminal when calling a service from the feathers-client with socket, the logs are shown only from the rest api (I'm using postman). I mean when not using DEBUG. @ekryski I updated all feathers dependencies:
Using the cookie on the feathers configs and Anyway, I don't think that is the way to go, I think that the API Server should be completely stateless, accessible with the As feathers is not able to set a cookie properly (even with the latest versions), I disabled it on the feathers config and implemented myself on the SSR Server (some workaround was needed but I'm now able to authenticate with that process). Now assume we have a restricted service using the How feathers keeps the subsequent requests authenticated if the feathers cookie is not present in the request? To avoid this behavior, I have to force logout with Other Issues:
I hope this can help you to understand better the needs of the users or improve the feathers experience, as we don't know how feathers works under the hood and if some behaviors are correct and works as expected. Thank You. |
@foxhound87 we fixed some cookie-related bugs, yesterday. The latest versions of all packages should hopefully set cookies properly. As for the first bullet point, where the order of the strategies matters, that's a PassportJS issue. It's a little annoying because all of the strategies actually do run, but when they all fail, only the error for the first one in the list is returned. |
If you have all of the latest packages, please post an example repo. I had one ready for debugging OAuth login and it made it much easier to get a fixed release out. |
https://bitbucket.org/foxhound87/rfx-stack-ssr-test/src/master https://bitbucket.org/foxhound87/rfx-stack-ssr-test/src/ssr-cookie The master branch is with the feathers cookie config (not working so well). The ssr-cookie branch is my attempt with my own implementation of the cookie on the SSR server (which is working pretty well) |
Another issue is that app.logout() is never resolved, |
@foxhound87 is that the case in the example you posted above? We merged a fix for that which should have been published yesterday. |
@marshallswain yes, I'm using proper git comments to help you to fix these issues, https://bitbucket.org/foxhound87/rfx-stack-ssr-test/branch/ssr-cookie I see that there was a related merge 2 days ago, but maybe is not completely fixed, |
And from the |
^ @foxhound87 regarding that warning from Bluebird. Some promises are intentionally created that way but I also have a fix coming for the error around automatic authentication throwing an unhandled promise rejection error.
This is now partially resolved. If you specify the strategy on the client the server will only attempt to use that one. It won't run through them all now and will return the proper error.
This has been fixed in #369.
@bertho-zero it should do that yes. If that is still an issue maybe create a separate issue with a simple example that demonstrates that problem and we'll see if we can fix it up! 😄 Honestly, I'm getting a bit lost in this thread as to what the actual issues are anymore. I'm going to close this issue. @foxhound87 please open new ones for each individual issue you are having with a simple reproducible example and feel free to copy-paste the relevant info from this thread for each one. Your RFX stack stuff is awesome but it's a lot to sift through to figure out what could be the issue and it will be much faster to solve any problems if we can quickly reproduce the issue. 😄 |
Hello, is it normal to use client.authenticate() every time I use a service? I have to add client.authenticate() everytime I use a service. |
Oh nevermind, I found the answer the answer already. It's on #68 |
Should
strategy: 'jwt'
work onv.1.0.0-beta-2
?NOT working:
working (as on older version):
working:
Module versions
NodeJS version:
v7.2.0
Operating System:
MacOS Sierra
Browser Version:
Chrome 54.0.2840.98 (64-bit)
Module Loader:
webpack 2.1.0-beta.27
The text was updated successfully, but these errors were encountered: