-
-
Notifications
You must be signed in to change notification settings - Fork 390
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
"unsafe legacy renegotiation disabled" in the context of connecting the OIDC #1437
Comments
also, i tried to run with versions 1.1.16 and 1.1.5, but it didn't work and the problem remained |
Maybe grist-core/docker-compose-examples/grist-traefik-oidc-auth/docker-compose.yml Lines 29 to 32 in bc95375
|
Thanks for the advice, I tried to use this flag, but the error remained :( and there is my configuration |
@paulfitz is any idea about this problem? |
I have same problem, living with grist in test env without keycloak :( |
@jordigh do you think setting |
its not help |
@00041275 what did you try? From its documentation looks like it should be full path to a cert. You'd need to take care that path is available within the container. |
@Idzana I'm interested in why you commented out |
for now I have OKD container with NODE_EXTRA_CA_CERTS and keycloak env dockerfile FROM gristlabs/grist:1.4.1
USER root
RUN apt-get update && \
apt-get -y upgrade openssl && \
apt-get -y install sudo && \
apt-get -y install ca-certificates
COPY RootCA.crt SubCA1.crt SubCA2.crt /usr/share/ca-certificates/
RUN cat /usr/share/ca-certificates/*.crt > /etc/ssl/certs/ca-bundle.crt
ENV NODE_EXTRA_CA_CERTS=/etc/ssl/certs/ca-bundle.crt
RUN update-ca-certificates
RUN apt-get clean
ENV REQUESTS_CA_BUNDLE=/etc/ssl/certs/ca-bundle.crt
EXPOSE 8080 deploy env - name: NO_PROXY
value: "cloudkc-test.company.mydomain,*.company.mydomain"
- name: GRIST_FORWARD_AUTH_LOGIN_PATH
value: "https://cloudkc-test.company.mydomain/realms/grist/protocol/openid-connect/auth"
- name: GRIST_FORWARD_AUTH_LOGOUT_PATH
value: "https://cloudkc-test.company.mydomain/realms/grist/protocol/openid-connect/logout"
- name: GRIST_IGNORE_SESSION
value: "true"
- name: GRIST_OIDC_IDP_ISSUER
value: "https://cloudkc-test.company.mydomain/realms/grist/.well-known/openid-configuration"
- name: GRIST_OIDC_IDP_CLIENT_ID
value: "grist-client"
- name: GRIST_OIDC_IDP_CLIENT_SECRET
value: "some_secret" console 2025-03-14 23:07:11.614 - info: Loading config file from /persist/config.json
Welcome to Grist.
Setting up database...
Database setup complete.
2025-03-14 23:07:15.467 - info: == Grist version is 1.4.1 (commit unknown)
Error: write EPROTO C08CA2479A7F0000:error:0A000152:SSL routines:final_renegotiate:unsafe legacy renegotiation disabled:../deps/openssl/openssl/ssl/statem/extensions.c:921:
at WriteWrap.onWriteComplete [as oncomplete] (node:internal/stream_base_commons:87:19) {
errno: -71, for second I added for dockerfile openssl, but there is nothing change. opensslfile
appended instruction to dockerfile COPY openssl.conf /usr/share/ssl/
ENV OPENSSL_CONF=/usr/share/ssl/openssl.conf
RUN node --openssl-config=/usr/share/ssl/openssl.conf console Running Grist as user 1000840000 with primary group 0
2025-03-14 23:14:54.467 - info: Loading config file from /persist/config.json
Welcome to Grist.
Setting up database...
Database setup complete.
2025-03-14 23:14:57.681 - info: == Grist version is 1.4.1 (commit unknown)
Error: write EPROTO C0BC6344C07F0000:error:0A000152:SSL routines:final_renegotiate:unsafe legacy renegotiation disabled:../deps/openssl/openssl/ssl/statem/extensions.c:921:
at WriteWrap.onWriteComplete [as oncomplete] (node:internal/stream_base_commons:87:19) {
errno: -71,
code: 'EPROTO',
syscall: 'write'
} if I delete env for keycloak grist runs good |
Hi! I correctly understand that I need to use the root certificate and sub certificate of my certification center there? |
problem resolves after change protocol to TLS 1.3 |
Describe the current behavior
Hi! I'm trying to connect self-hosted OIDC provider (keycloak).
Keycloak using self-signed certificate (with signing by organization CA)
I configure Grist with this instruction https://support.getgrist.com/install/oidc/ and when I try run application I got this error.
I tried to use flag
--openssl-legacy-provider
, but looks like at node 18 this flag is ignored.Are there any alternative solutions to bypass this problem? Both services (grist and keycloak) work in an isolated network and the occurrence of this problem in terms of security does not matter at all. However, I cannot change the keycloak settings in the organization and want to try to solve the problem by ignoring it
Steps to reproduce
Describe the expected behavior
be able to ignore this problem for secure local networks
Where have you encountered this bug?
Instance information (when self-hosting only)
Error: write EPROTO 00082E04FA7F0000:error:0A000152:SSL routines:final_renegotiate:unsafe legacy renegotiation disabled:../deps/openssl/openssl/ssl/statem/extensions.c:922:
at WriteWrap.onWriteComplete [as oncomplete] (node:internal/stream_base_commons:94:16) {
errno: -71,
code: 'EPROTO',
syscall: 'write'
}
The text was updated successfully, but these errors were encountered: