mirror of
https://github.com/hoppscotch/hoppscotch.git
synced 2026-04-26 01:06:00 +03:00
[GH-ISSUE #3090] [bug]: Team invitation is not working #1014
Labels
No labels
CodeDay
a11y
browser limited
bug
bug fix
cli
core
critical
design
desktop
discussion
docker
documentation
duplicate
enterprise
feature
feature
fosshack
future
good first issue
hacktoberfest
help wanted
i18n
invalid
major
minor
need information
need testing
not applicable to hoppscotch
not reproducible
pull-request
question
refactor
resolved
sandbox
self-host
spam
stale
testmu
wip
wont fix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/hoppscotch#1014
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @sugureshs on GitHub (May 29, 2023).
Original GitHub issue: https://github.com/hoppscotch/hoppscotch/issues/3090
Originally assigned to: @balub on GitHub.
Is there an existing issue for this?
Current behavior
When I invite the user to a team user should be able to join the team with the invitation (sent over a mail), but the user is not able to join the team.
Note:
This base URL is replaced with
VITE_BASE_URLSteps to reproduce
Environment
Production
Version
Self-hosted
@balub commented on GitHub (Jun 5, 2023):
@sugureshs is your instance hosted over
HTTPS, we useHTTP, securecookies and the may not function if used over a normalHTTPnetwork.@amishsthapit commented on GitHub (Jun 9, 2023):
Can you please elaborate on this? I have put HTTP, Secure Cookies in reverse proxy config also. But the feature is still not working. Is there any other configuration I need to be aware about?
@balub commented on GitHub (Jun 10, 2023):
@amishsthapit Hoppscotch uses cookie based auth to authorize a user in the backend, since our cookies are secure cookies unless the network is HTTPs the browser does not save the cookies and as such even after successfully logging in we are unable to do anything else because we are not able to authorize you in the BE.
@sugureshs commented on GitHub (Jun 12, 2023):
@balub sorry for the late reply, yes all three services are deployed on k8s and is exposed to HTTP secure.