mirror of
https://github.com/dani-garcia/vaultwarden.git
synced 2026-04-26 01:35:54 +03:00
[GH-ISSUE #4519] Collection creation causes permission error in logs and logout in interface #1909
Labels
No labels
SSO
Third party
better for forum
bug
bug
documentation
duplicate
enhancement
future Vault
future Vault
future Vault
good first issue
help wanted
low priority
notes
pull-request
question
troubleshooting
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/vaultwarden#1909
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @Basecatcherz on GitHub (Apr 23, 2024).
Original GitHub issue: https://github.com/dani-garcia/vaultwarden/issues/4519
Collection creation causes permission error in logs and logout in interface
Deployment environment
Install method: Docker Image
Clients used: web vault
Reverse proxy and version: NGINX Proxy Manager v2.10.4
Other relevant details:
Steps to reproduce
Expected behaviour
Collection creation assistant opens.
Actual behaviour
Logout and permission erros in log.
Troubleshooting data
The vault was initially created by me. I set another account as owner, later.
I already tried every available role to get access with my account, again.
Logs
@BlackDex commented on GitHub (Apr 23, 2024):
It works for me, at least when using
testing.I suggest to test that version, but it actually looks like the either the token is expired or not correct, or something else during the login is incorrect.
@stefan0xC commented on GitHub (Apr 23, 2024):
What do you mean? Did the other owner change your role? Kicked you out of the organization?
How did you try to get access? Did you add yourself in the database? Did you change your role in the
/admin/users/overviewpage? Also can you please post the support string from the/admin/diagnosticspage?@BlackDex commented on GitHub (Apr 23, 2024):
Also, the only way i can get this message via the web-vault is by setting a users as manager/admin/owner, with that user go to the org interface, open the collection creation form. With the other user demote that user to user again.
Fill in the form and and submit, that will generate the error, but that is expected.
@Basecatcherz commented on GitHub (Apr 24, 2024):
I can confirm that it works in testing.
I can also confirm that I like the new interface 😄
@Basecatcherz commented on GitHub (Apr 24, 2024):
I created the Vault using my personal account. Later, I created an account for administrative tasks, gave it the owner role and set my personal account as user.
When I tried to create a collection using my personal account I ran into the issue for the first time. To fix it I tried to give me admin, then manager, then owner. I changed the roles using
/organizations/xxx-xxx-xxx-xxx-xxx/members, later using/admin/users/overview.Your environment (Generated via diagnostics page)
Config (Generated via diagnostics page)
Show Running Config
Environment settings which are overridden: ADMIN_TOKEN
@BlackDex commented on GitHub (Apr 24, 2024):
So, what i see here is what i described in my previous post. You changed your personal member account to a user level. Users are not allowed to create collections, which is why you see that message.
If you have a special admin user to manage the organization, you need to use that user to make those changes.
Else, give your personal member account manager rights, which is the least privileged level, but that is still able to create collections.
Vaultwarden does a valid and correct check for these privileges and that is why you get that message.
Since we are not able to reproduce this without actually braking it in a way it should be broken, and your description too me seems that this was also the case I'm going to close this issue.
The solution is to make sure you granted the organization member the correct permission level to allow these actions.
@Basecatcherz commented on GitHub (Apr 24, 2024):
But, even when I set my peronal account back to owner, as described above, I get this error. In testing it works fine.
@Basecatcherz commented on GitHub (Apr 25, 2024):
I now "fixed" the issue by removing my aacount from the vault an re-add it again.