Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

segfault trying to setup resource server #138

Closed
brianwcook opened this issue May 1, 2016 · 2 comments
Closed

segfault trying to setup resource server #138

brianwcook opened this issue May 1, 2016 · 2 comments

Comments

@brianwcook
Copy link

I am trying to setup a resource server. Right now it is a simple setup based on the readme. I am purposefully not sending a token expecting to get a 401 error, but instead I am getting a segfault and no data returned. It may be a configuration issue but I'm not sure what to look at.

[Sun May 01 00:35:06.275872 2016] [authz_core:debug] [pid 31332] mod_authz_core.c(809): [client 8.27.177.130:45730] AH01626: authorization result of Require valid-user : denied (no authenticated user yet) [Sun May 01 00:35:06.275921 2016] [authz_core:debug] [pid 31332] mod_authz_core.c(809): [client 8.27.177.130:45730] AH01626: authorization result of <RequireAny>: denied (no authenticated user yet) [Sun May 01 00:35:06.275935 2016] [auth_openidc:debug] [pid 31332] src/mod_auth_openidc.c(2585): [client 8.27.177.130:45730] oidc_check_user_id: incoming request: "/app?(null)", ap_is_initial_req(r)=1 [Sun May 01 00:35:06.276055 2016] [auth_openidc:debug] [pid 31332] src/util.c(772): [client 8.27.177.130:45730] oidc_util_get_cookie: returning "mod_auth_openidc_session" = <null> [Sun May 01 00:35:06.276068 2016] [auth_openidc:debug] [pid 31332] src/session.c(83): [client 8.27.177.130:45730] oidc_session_load: <null> [Sun May 01 00:35:07.083125 2016] [core:notice] [pid 31296] AH00052: child pid 31332 exit signal Segmentation fault (11)

`# Resource Server Settings
OIDCOAuthClientID clientname
OIDCOAuthClientSecret 9832017d-64f3-4360-a3b8-04915c5de052
OIDCOAuthIntrospectionEndpoint
OIDCOAuthIntrospectionEndpointMethod POST
OIDCOAuthSSLValidateServer Off
OIDCOAuthRemoteUserClaim audience
OIDCOAuthIntrospectionTokenParamName token

<Location "/app">
AuthName "app Authentication"
Authtype openid-connect
Require valid-user
Require claim iss:https://
LogLevel debug

`

@brianwcook
Copy link
Author

nevermind, this was caused by the resource server specifying "openid-connect" instead of oauth20 as the authtype.

@zandbelt
Copy link
Member

zandbelt commented May 1, 2016

thanks for reporting; that deserves better handling which I added in the commit above

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants