mirror of
https://github.com/karakeep-app/karakeep.git
synced 2026-04-26 00:16:03 +03:00
Closed
opened 2026-03-02 11:48:13 +03:00 by kerem
·
31 comments
No Branch/Tag specified
main
refactor/use-npm-singlefile
onetab
claude/issue-2596-20260321-1401
claude/fix-docs-button-responsive-V3aBQ
claude/review-import-backpressure-D4ArJ
claude/fix-archived-bookmarks-mobile-P9OJW
claude/issue-1189-20260211-1601
claude/fix-nested-smart-lists-3uFkt
claude/issue-2298-20251223-1704
feat/import-v3
claude/add-cli-search-subcommand-6kIe0
claude/add-bookmark-indexing-timestamps-96bPj
claude/auto-disable-failing-feeds-fkDhP
claude/add-tag-search-aliases-HzESD
feat/docker-compose-dev
claude/add-attachedby-tags-endpoint-01WYfemMGHJJjXsPYLvUJAno
claude/fix-crawler-memory-leaks-NE7Ct
bookmark-debugger
claude/issue-2352-20260106-1120
claude/issue-1977-20260102-2348
claude/add-banner-rendering-JeLUk
claude/add-descendant-qualifier-cUm26
claude/skip-metadata-refresh-archives-CAo4Y
claude/fix-archive-pending-banner-pAyGM
claude/add-embeddings-support-h2swV
claude/nested-manage-lists-QVV85
claude/privacy-type-system-MG1bT
claude/add-action-menu-icons-6hNKw
claude/issue-2299-20251223-1711
claude/bookmark-indexing-progress-QwZSI
claude/migrate-bookmark-attachments-3O2te
claude/add-2025-wrapped-feature-tIUIh
claude/improve-ai-settings-design-639tq
claude/add-youtube-metascraper-plugin-0lWC7
claude/add-problem-reporting-gSSEV
claude/add-mobile-list-menus-spcS7
claude/shadcn-bookmark-cards-WWHzP
claude/add-extensions-link-HTeXc
claude/add-onboarding-screens-hsYMO
claude/fix-settings-switch-overflow-nlzM4
claude/clamp-bookmark-titles-diAEz
claude/port-stats-mobile-expo-MuXAn
claude/whats-new-base-version-vrv8C
claude/fix-settings-auth-checks-jgyD8
claude/add-server-version-display-3sGa2
claude/fix-tag-editor-scrolling-rzdbG
claude/add-company-pricing-card-y5mHY
claude/audit-optimize-transactions-xpDVc
codex/ensure-consistent-ui-experience-across-app-pages
claude/plan-opentelemetry-integration-01Jx183mz1Ev8h8JoYj97Auw
libsql
db-indicies
claude/export-import-lists-01UuCWwdaqduAd35NppvjnMD
claude/configurable-worker-timeout-0198GQh6YrrRzqG62xnogyrz
claude/check-import-quota-01CPdxTpHp18Ba62bYcBTVbA
claude/scraper-worker-thread-01FEHen6MGrQHmdBstJSuiyA
claude/customize-dialog-styling-01CVjEv2KgyZJSpCg3mqkvR7
claude/add-asset-cache-headers-0175WhNcqwiwurrmjj52jnLT
claude/add-db-search-plugin-017Xxd4Jq3MfjWT788vgfbaq
benchmarks-2
claude/add-filtered-deletion-01DTxWNcg3hhqdNpeNLa3s6L
claude/actionbutton-loading-spinner-015DY5ZTvgPgFAXTZz3UGaYv
claude/add-broken-links-qualifier-01S31X1LsKiYb9gE1dXTKvi3
claude/docker-release-tag-trigger-01UmzFXEumhK2jdmRGtMcueo
claude/spread-feed-fetch-scheduling-01EihUtmZSyqeE1HfRMessxW
restate-idempotency
claude/align-android-ios-colors-01GJfkhEyZVBReohVioPa8ok
claude/improve-mobile-app-colors-0155LzHfkd5HyJr6YyZMsus5
codex/add-autocomplete-for-search-query-language
claude/add-bookmark-backups-016L2A8Z94n7tDgDdMPdFuAd
claude/restrict-binary-user-permissions-01FSGyy2RXGZvE26YbAejzGi
effect-ts
claude/prepare-trpc-npm-publish-0193EjfwpxSNVNcLXqXjs6Ln
shared-list-sidebar
claude/lazy-load-tiktoken-017UTNpJPTcMMQvNEBa1aFwo
codex/fix-asset-pre-processing-worker-abort-signals
add-groupid
claude/add-bookmark-list-button-01VF7uXYNLsVDzqdozWMXP5M
claude/extract-shared-ui-components-01DSVfaCr6WRqAyx1vJTZk9r
claude/migrate-shadcn-sidebar-01DKjpg9MD5PJ2potemSnbvW
claude/add-collaborators-rate-limits-01VjXyRWWPUkGQKa8d8D8qKj
claude/modernize-dark-mode-01FRfE81PAY5C44pFu1cYocf
claude/add-signed-url-bookmark-01PjYT1ZhvLK2FPJNTAhJsWf
restate-group-id
claude/add-highlights-page-012vhHpn8fVNp3gf7gBeW14s
claude/disable-shared-bookmark-features-01B9fiGUdu6NyWaxSQFsQBxP
claude/mobile-bookmark-grid-layouts-018cGBBMhPJVq6PJVRBpqT2r
claude/add-mobile-bookmark-summary-01494LYoh4sJW5Fj4GPm62Vj
claude/add-mobile-tags-screen-01WRADt4ZzvXVew1Y9vqF8SV
claude/add-highlight-notes-01LpanRLS4a2YMnT1qB5GTqX
claude/add-search-bar-014k2ngaqjwYRVSvqmbuECqr
claude/hide-collaborator-emails-01TQrkkMupC7CR9BTuDkireg
claude/list-invitation-approval-0129V89M1riXW6JqmoF74VfM
claude/add-bookmark-archive-sort-018VbGPGvtmsGgXFEERoAX7B
claude/add-mobile-smart-lists-01251tYo9u1SywE6XFezAv9e
claude/bookmark-drag-drop-01DmWq286ogHpDGHKcXjKr3z
claude/add-rss-import-01DH1Q2axcDeq8nQJR5MWjPJ
claude/mobile-inapp-browser-auth-01KiT6bwyntRPQ1X4oTtAveC
claude/offline-mode-react-query-01D1rE2bdBEPw2teGqunr5Gd
claude/add-singlefile-extension-support-01BEB9QQZABzwfZDvR9Bz5b2
claude/custom-list-slugs-01VxcfkNUXZ97FNpNVURopMq
claude/issue-2148-20251118-1133
claude/add-groupid-queue-fairness-011CV1r8Wb46HuGAg5o95i3m
claude/hide-viewer-shared-lists-01Fst6NBvdxrXXnDhUmjsNDP
claude/collaborative-lists-013AvDvMqkoszDVcSoCYgBcM
claude/implement-feature-01LT5XzGsbEhZkYXNEjEwdui
claude/fix-bookmark-loading-state-01AgF4H2drxwuTCJDB2Xgiu4
claude/admin-user-edit-013tbiRmb1KX2fhSYqmGKCu8
claude/expose-all-api-01YTruEW72WQYMtq4iZoaPkA
claude/add-doc-link-main-016NYLxShpKuH6R8XCBgeZtc
claude/fix-issue-2133-019JLvdSRAUbU4FtjQztcM6S
claude/explore-effect-ts-integration-01F7xb1dWwP1ma4LnLbFGfDD
claude/optimize-dockerfile-build-011CV5gDnPZbdbbVSPDofC4e
claude/add-custom-headers-guide-011CV249t16aWDRb1mCrzQdC
claude/mobile-app-signup-011CUxPtCXgU6U3T8GShTR2Q
claude/crawler-worker-fetch-browser-011CUvcRc24XEr9DTWDW6MX8
claude/fix-issue-784-011CUvubQrcZHG9S3KjpCKbK
codex/add-user-settings-for-inference-language-and-screenshots
claude/fix-mobile-signin-server-address-011CUnaUWwY2Fhq5Xbwhgr8H
better-auth-2
claude/issue-2028-20251012-1429
claude/issue-1010-20251012-1154
codex/update-feed-refresh-job-idempotency-key
restate
import-v2
fix-public-lists
recurse-delete-list
abort-dangling-processing
tag-pagination
ratelimit-plugin
claude/issue-1937-20250914-0912
codex/implement-title-search-query-qualifier
copilot/add-edit-button-for-notes
cookie-path
ai-tag-cleanup
codex/add-allowlist-and-blocklist-env-variables
mobile-retheme
expo-next-upgrade
opencode/issue1788-20250727215611
fix-trailing-slash-deduplication
edit-bookmark-dialog
bookmark-embeddings
rag
nextjs-15
bookmark-hover-bar
sapling-pr-archive-MohamedBassem
track-bookmark-assets
json-cli
admin-settings
mobile-dark-mode
android/v1.9.2-0
ios/v1.9.1-1
android/v1.9.1-0
ios/v1.9.1-0
ios/v1.9.0-2
ios/v1.9.0-1
android/v1.9.0-1
extension/v1.2.9
cli/v0.31.0
sdk/v0.31.0
mcp/v0.31.0
android/v1.9.0-0
ios/v1.9.0-0
v0.31.0
android/v1.8.5-0
cli/v0.30.0
sdk/v0.30.0
ios/v1.8.4-0
android/v1.8.4-0
v0.30.0
cli/v0.29.1
v0.29.3
v0.29.2
v0.29.1
sdk/v0.29.0
cli/v0.29.0
mcp/v0.29.0
ios/v1.8.3-0
android/v1.8.3-0
extension/v1.2.8
v0.29.0
android/v1.8.2-2
android/v1.8.2-1
ios/v1.8.2-0
android/v1.8.2-0
extension/v1.2.7
android/v1.8.1-0
ios/v1.8.1-0
v0.28.0
cli/v0.27.1
cli/v0.27.0
v0.27.1
sdk/v0.27.0
v0.27.0
android/v1.8.0-1
ios/v1.8.0-1
mcp/v0.26.0
sdk/v0.26.0
v0.26.0
cli/v0.25.0
ios/v1.7.0-1
mcp/v0.25.0
v0.25.0
extension/v1.2.6
ios/v1.7.0-0
android/v1.7.0-0
v0.24.1
v0.24.0
mcp/v0.23.10
mcp/v0.23.9
mcp/v0.23.8
extension/v1.2.5
mcp/v0.23.7
mcp/v0.23.6
mcp/v0.23.5
mcp/v0.23.4
sdk/v0.23.2
cli/v0.23.0
extension/v1.2.4
android/v1.6.9-1
ios/v1.6.9-1
v0.23.2
v0.23.1
sdk/v0.23.0
v0.23.0
ios/v1.6.9-0
sdk/v0.22.0
v0.22.0
android/v1.6.8-0
ios/v1.6.8-0
sdk/v0.21.2
sdk/v0.21.1
sdk/v0.21.0
v0.21.0
cli/v0.20.0
v0.20.0
ios/v1.6.7-4
android/v1.6.7-4
ios/v1.6.7-3
android/v1.6.7-3
android/v1.6.7-2
ios/v1.6.7-2
android/v1.6.7-1
ios/v1.6.7-1
ios/v1.6.7-0
android/v1.6.7-0
v0.19.0
android/v1.6.6-0
android/v1.6.5-0
ios/v1.6.5-0
ios/v1.6.4-0
android/v1.6.4-0
v0.18.0
v0.17.1
v0.17.0
ios/v1.6.3-0
android/v1.6.3-0
extension/v1.2.3
ios/v1.6.2-1
android/v1.6.2-1
ios/v1.6.2-0
android/v1.6.2-0
v0.16.0
ios/v1.6.1-3
android/v1.6.1-3
ios/v1.6.1-2
android/v1.6.1-2
android/v1.6.1-1
ios/v1.6.1-1
android/v1.6.1-0
ios/v1.6.1-0
extension/v1.2.2
android/v1.6.0-1
ios/v1.6.0-1
ios/v1.6.0
android/v1.6.0
cli/v0.13.7
cli/v0.13.6
v0.15.0
cli/v0.13.5
extension/v1.2.1
v0.14.0
cli/v0.13.3
cli/v0.13.2
cli/v0.13.1
cli/v0.13.0
v0.13.1
v0.13.0
mobile-v1.5.0
mobile-v1.4.0
v0.12.2
v0.12.1
v0.12.0
v0.11.1
v0.11.0
v0.10.1
v0.10.0
v0.9.0
v0.8.0
v0.7.0
v0.6.0
v0.5.0
v0.4.1
v.0.4.0
v.0.3.1
v0.3.0
v0.2.2
v0.2.1
v0.2.0
v0.1.0
Labels
Clear labels
Mirrored from GitHub Pull Request
UI/UX
android
bug
dependencies
documentation
documentation
extension
feature request
feature request
good first issue
ios
long-term
performance
pri/high
pri/low
pri/medium
pull-request
Mirrored from GitHub Pull Request
question
status/approved
status/icebox
status/pending_clarification
status/untriaged
No labels
UI/UX
android
bug
dependencies
documentation
documentation
extension
feature request
feature request
good first issue
ios
long-term
performance
pri/high
pri/low
pri/medium
pull-request
question
status/approved
status/icebox
status/pending_clarification
status/untriaged
Milestone
Clear milestone
No items
No milestone
Projects
Clear projects
No items
No project
Assignees
Clear assignees
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".
No due date set.
Dependencies
No dependencies set.
Reference
starred/karakeep#265
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @chain710 on GitHub (Sep 23, 2024).
Original GitHub issue: https://github.com/karakeep-app/karakeep/issues/410
My oauth provider: authelia 4.38.12
Sign in with autheliaredirect to authelia sso pageacceptredirect back to hoarder login page, but got errorOAuth login failed: No profilemy authelia instance works well with other self-host services like linkwarden and immich
found no useful log via
docker logs hoarderenv
@kamtschatka commented on GitHub (Sep 23, 2024):
this happens, when authelia does not provide an email address or a name for the user you are using: https://github.com/hoarder-app/hoarder/blob/main/apps/web/server/auth.ts#L150
you'll have to check on authelia side to fill those in.
@MohamedBassem commented on GitHub (Sep 23, 2024):
@kamtschatka I think we should probably remove the name restriction. If it's empty, we can just use the email and not fail the login on it.
@chain710 commented on GitHub (Sep 24, 2024):
You're right! I double-checked my Authelia configuration and discovered that the display name attribute was missing.
Thank you for your awesome work!
@mirisbowring commented on GitHub (Oct 5, 2024):
Hi, I just tried to install hoarder today and wanted to connect it to my authentik install.
I experience the same behavior like OP.
I first tried
release(which points to 17.1) and alsolatestbut none of them fixed the issue.Side Note: all fields in my OIDC Profile are set. There is a name, a username, an email, etc. so in theory this should work independent of the fix from above, no? :)
Thank you very much!
@MohamedBassem commented on GitHub (Oct 5, 2024):
@mirisbowring what kind of error did you get?
No profileas well?@mirisbowring commented on GitHub (Oct 5, 2024):
Yep:

@MohamedBassem commented on GitHub (Oct 5, 2024):
@mirisbowring yeah, that's weird indeed. Did you by any chance change the
OAUTH_SCOPEvalue?@mirisbowring commented on GitHub (Oct 5, 2024):
I've just set it to the defaults:
Also commented this line out and still the same behaviour 😊
@mirisbowring commented on GitHub (Oct 5, 2024):
I also checked the available fields resulting from
https://auth.domain.tld/application/o/userinfo/@mirisbowring commented on GitHub (Nov 8, 2024):
Hi, since this issue persists, can we reopen this issue?
@eapetitfils commented on GitHub (Dec 25, 2024):
I am getting the same issue on a fresh install of hoarder using authentik (link for configuration here: https://docs.goauthentik.io/integrations/services/hoarder/).
I can confirm in the logs of authentik that the email is part of the response. I tried with the username having no existing native account in hoarder, and with an existing one, also with various configurations of OAUTH_ALLOW_DANGEROUS_EMAIL_ACCOUNT_LINKING
{ "pk": 7, "email": "correct email", "username": "correct username" }@flavienbwk commented on GitHub (Dec 26, 2024):
For Keycloak, I just had to have emails set for my users.
@0dragosh commented on GitHub (Mar 16, 2025):
I still have this issue, can we reopen?
@petrm commented on GitHub (Mar 18, 2025):
I upgraded authelia to 4.39 and this issue appeared. Never had it before. Hoarder config in authelia allows openid profile groups email, exactly like before. Other applications don't seem to have this problem.
Edit: I found other applications that have a problem and will be opening a bug in authelia. Rolling back to 4.38 fixes the issue.
@0dragosh commented on GitHub (Mar 18, 2025):
Also had this problem with authelia 4.39. This is the issue. Authelia 4.39.1 is now out which fixes it.
@petrm commented on GitHub (Mar 18, 2025):
I still see it with 4.39.1.
On Tue, Mar 18, 2025, 08:43 ʀᴜɴᴛɪᴍᴇ ( Dʀᴀɢᴏsʜ ) @.***>
wrote:
@petrm commented on GitHub (Mar 19, 2025):
I figured it out. There are clearly different reasons for this issue to appear. In my case, it is caused by changes introduced in 4.39: https://www.authelia.com/integration/openid-connect/openid-connect-1.0-claims/#restore-functionality-prior-to-claims-parameter
The authelia docs have recommendation what to implement in the client or in the link above, a workaround.
@subract commented on GitHub (Mar 20, 2025):
Thank you @petrm! I implemented the linked workaround successfully after being unable to get Hoarder and Authelia to play nice for weeks now.
I agree that this issue should be reopened to track implementing the proper fix from the linked article:
@scottharney commented on GitHub (Mar 20, 2025):
Wanted to confirm same with authelia. I was able to apply the linked workaround to restore the legacy claims_poicy functionaliy in the authelia configuration and that allowed hoarder to work with authelia 4.39.1.
@kobusestas commented on GitHub (Apr 3, 2025):
@petrm @scottharney @subract How did you get this working in Authelia? I added this to my Authelia Config:
and then in the "- Client_ID" section I added
claims_policy: 'default'However I still see this error. Any chance you could help point me in the right direction to see what I'm missing?
I'm using cloudflare for DNS proxy if that matters at all. This was working previously. I do notice a bad gateway 502 error in the hoarder logs that wasn't there prior.
@scottharney commented on GitHub (Apr 4, 2025):
I followed the link in petrm's comment above mine to authelia docs for the workaround to restore the previous functionality for the claims parameter https://www.authelia.com/integration/openid-connect/openid-connect-1.0-claims/#restore-functionality-prior-to-claims-parameter
I made the edits described there to my authelia configuration and restarted and the integration with hoarder worked again
@petrm commented on GitHub (Apr 4, 2025):
@kobusestas
Looks like my config, except I don't have 'rat' in the list.
@cything commented on GitHub (Apr 5, 2025):
You don't have to enable all of those claims. According to the logic here, only
emailis needed. This is what my config looks like and it works:@Eragos commented on GitHub (Apr 20, 2025):
Authela worked for me version v4.39.1
Authelia config part:
No special claim policy (default authelia/OICD).
And karakeep docker compose part:
Best Michael
@ryanwinter commented on GitHub (May 29, 2025):
Adding the claims policy with email in the id_token fixed it for me.
@mirisbowring commented on GitHub (May 29, 2025):
@ryanwinter what exactly did you mean by this?
@info-path commented on GitHub (May 31, 2025):
I had the same problem with login in authentication:
oAuth login failed: oAuthCallback
I found in the log:
message: 'failed to decode JWT (TypeError: encrypted JWTs cannot be decoded)'In this case, the solution was to remove the value for Encryption Key in
Authentik > Karakeer > ProviderSigning Key: authentik Self-signed CertificateEncryption Key: <empty>This helped me!
@mirisbowring commented on GitHub (Jun 1, 2025):
Actually this solved it for authentik too (even though it is not documented).
In Authentik, there is a toggle in
provider > advanced protocol settings > subject mode:It was disabled (and is for every other of my oidc providers) but enabling it for karakeep fixes this bug for me!
@Mladia commented on GitHub (Jun 6, 2025):
Also fixed for me with Authentik.
In the Provider Menu for Karakeep:
@MohamedBassem commented on GitHub (Jul 26, 2025):
For search indexing purposes, the error message that indicates this problem got changed from "OAuth login failed: No profile" to "OAuth login failed: Provider didn't provide an email during signin".
There's a bunch of examples here on how to fix the problem ^
Will try to look into if next-auth can be fixed to avoid this problem altogether
@fawazral commented on GitHub (Jan 4, 2026):
Thanks for sharing! I was going nuts trying to figure this out, it's all good now!