mirror of
https://github.com/dani-garcia/vaultwarden.git
synced 2026-02-05 00:29:40 +03:00
Existing users are unable to accept invitation to new organization #1183
Reference in New Issue
Block a user
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @mburgess00 on GitHub (Jan 7, 2022).
Subject of the issue
I created a new organization and was joined to it as an owner, however, inviting other users that exist on our server fails with an error:
Error decoding JWT
Deployment environment
2.25.0
Install method:
Docker image
Clients used:
Web vault
Reverse proxy and version:
MySQL/MariaDB or PostgreSQL version:
Other relevant details:
Steps to reproduce
Expected behaviour
Link to join org should work
Actual behaviour
Presented with JWT error
Troubleshooting data
Server logs:
2022-01-06 15:43:45[2022-01-06 22:43:45.966][response][INFO] POST /identity/connect/token (login) => 200 OK
2022-01-06 15:43:45[2022-01-06 22:43:45.961][response][INFO] POST /identity/connect/token (login) => 200 OK
2022-01-06 15:43:45[2022-01-06 22:43:45.956][request][INFO] POST /identity/connect/token
2022-01-06 15:43:45[2022-01-06 22:43:45.950][request][INFO] POST /identity/connect/token
2022-01-06 15:43:45[2022-01-06 22:43:45.861][error][ERROR] Error decoding JWT.
2022-01-06 15:43:45[CAUSE] Error(
2022-01-06 15:43:45InvalidSignature,
2022-01-06 15:43:45)
2022-01-06 15:43:45[2022-01-06 22:43:45.861][response][INFO] POST /api/organizations/<_org_id>/users/<_org_user_id>/accept (accept_invite) => 400 Bad Request
2022-01-06 15:43:45[2022-01-06 22:43:45.859][request][INFO] POST /api/organizations/bccad2c2-bc0b-4096-b121-09d30229b883/users/1efc2f8e-1eb2-4e62-a9e5-f657f95573a6/accept
[2022-01-06 22:43:45.859][request][INFO] POST /api/organizations/bccad2c2-bc0b-4096-b121-09d30229b883/users/1efc2f8e-1eb2-4e62-a9e5-f657f95573a6/accept
2022-01-06 15:43:45[2022-01-06 22:43:45.793][error][ERROR] Error decoding JWT.
2022-01-06 15:43:45[CAUSE] Error(
2022-01-06 15:43:45InvalidSignature,
2022-01-06 15:43:45)
2022-01-06 15:43:45[2022-01-06 22:43:45.793][response][INFO] GET /api/organizations/<org_id>/policies/token? (list_policies_token) => 400 Bad Request
2022-01-06 15:43:45[2022-01-06 22:43:45.791][request][INFO] GET /api/organizations/bccad2c2-bc0b-4096-b121-09d30229b883/policies/token?token=eyJ0eXAiOiJKV1QiLCJhbGci
2022-01-06 15:43:45[2022-01-06 22:43:45.707][response][INFO] POST /identity/connect/token (login) => 200 OK
2022-01-06 15:43:45[2022-01-06 22:43:45.707][vaultwarden::api::identity][INFO] User <##user email redacted##> logged in successfully. IP: 10.101.9.88
2022-01-06 15:43:45[2022-01-06 22:43:45.551][request][INFO] POST /identity/connect/token
2022-01-06 15:43:45[2022-01-06 22:43:45.453][response][INFO] POST /api/accounts/prelogin (prelogin) => 200 OK
2022-01-06 15:43:45[2022-01-06 22:43:45.450][request][INFO] POST /api/accounts/prelogin
2022-01-06 15:43:41[2022-01-06 22:43:41.536][error][ERROR] Error decoding JWT.
2022-01-06 15:43:41[CAUSE] Error(
2022-01-06 15:43:41InvalidSignature,
2022-01-06 15:43:41)
2022-01-06 15:43:41[2022-01-06 22:43:41.536][response][INFO] GET /api/organizations/<org_id>/policies/token? (list_policies_token) => 400 Bad Request
2022-01-06 15:43:41[2022-01-06 22:43:41.534][request][INFO] GET /api/organizations/bccad2c2-bc0b-4096-b121-09d30229b883/policies/token?token=eyJ0eXAiOiJKV1QiLCJhbGci
2022-01-06 15:41:48[2022-01-06 22:41:48.971][response][INFO] GET /api/sync?<data..> (sync) => 200 OK
2022-01-06 15:41:48[2022-01-06 22:41:48.968][response][INFO] GET /api/sync?<data..> (sync) => 200 OK
2022-01-06 15:41:48[2022-01-06 22:41:48.797][request][INFO] GET /api/sync?excludeDomains=true
2022-01-06 15:41:48[2022-01-06 22:41:48.762][request][INFO] GET /api/sync?excludeDomains=true
2022-01-06 15:41:48[2022-01-06 22:41:48.743][response][INFO] POST /identity/connect/token (login) => 200 OK
2022-01-06 15:41:48[2022-01-06 22:41:48.734][request][INFO] POST /identity/connect/token
2022-01-06 15:41:48[2022-01-06 22:41:48.689][response][INFO] POST /identity/connect/token (login) => 200 OK
2022-01-06 15:41:48[2022-01-06 22:41:48.680][request][INFO] POST /identity/connect/token
2022-01-06 15:41:48[2022-01-06 22:41:48.591][error][ERROR] Error decoding JWT.
2022-01-06 15:41:48[CAUSE] Error(
2022-01-06 15:41:48InvalidSignature,
2022-01-06 15:41:48)
2022-01-06 15:41:48[2022-01-06 22:41:48.591][response][INFO] POST /api/organizations/<_org_id>/users/<_org_user_id>/accept (accept_invite) => 400 Bad Request
2022-01-06 15:41:48[2022-01-06 22:41:48.585][request][INFO] POST /api/organizations/bccad2c2-bc0b-4096-b121-09d30229b883/users/1efc2f8e-1eb2-4e62-a9e5-f657f95573a6/accept
2022-01-06 15:41:48[2022-01-06 22:41:48.522][error][ERROR] Error decoding JWT.
2022-01-06 15:41:48[CAUSE] Error(
2022-01-06 15:41:48InvalidSignature,
2022-01-06 15:41:48)
2022-01-06 15:41:48[2022-01-06 22:41:48.522][response][INFO] GET /api/organizations/<org_id>/policies/token? (list_policies_token) => 400 Bad Request
2022-01-06 15:41:48[2022-01-06 22:41:48.519][request][INFO] GET /api/organizations/bccad2c2-bc0b-4096-b121-09d30229b883/policies/token?token=<##token redacted##>
2022-01-06 15:41:48[2022-01-06 22:41:48.447][vaultwarden::api::identity][INFO] User <##user email redacted##> logged in successfully. IP: 10.101.8.84
2022-01-06 15:41:48[2022-01-06 22:41:48.447][response][INFO] POST /identity/connect/token (login) => 200 OK
2022-01-06 15:41:48[2022-01-06 22:41:48.365][request][INFO] POST /identity/connect/token
2022-01-06 15:41:48[2022-01-06 22:41:48.258][response][INFO] POST /api/accounts/prelogin (prelogin) => 200 OK
2022-01-06 15:41:48[2022-01-06 22:41:48.255][request][INFO] POST /api/accounts/prelogin
2022-01-06 15:41:42[2022-01-06 22:41:42.848][error][ERROR] Error decoding JWT.
2022-01-06 15:41:42[CAUSE] Error(
2022-01-06 15:41:42InvalidSignature,
2022-01-06 15:41:42)
2022-01-06 15:41:42[2022-01-06 22:41:42.848][response][INFO] GET /api/organizations/<org_id>/policies/token? (list_policies_token) => 400 Bad Request
2022-01-06 15:41:42[2022-01-06 22:41:42.846][request][INFO] GET /api/organizations/bccad2c2-bc0b-4096-b121-09d30229b883/policies/token?token=<##token redacted##>
2022-01-06 15:40:38[2022-01-06 22:40:38.042][response][INFO] GET /api/sync?<data..> (sync) => 200 OK
2022-01-06 15:40:38[2022-01-06 22:40:38.033][response][INFO] GET /api/sync?<data..> (sync) => 200 OK
2022-01-06 15:40:37[2022-01-06 22:40:37.764][request][INFO] GET /api/sync?excludeDomains=true
2022-01-06 15:40:37[2022-01-06 22:40:37.729][request][INFO] GET /api/sync?excludeDomains=true
2022-01-06 15:40:37[2022-01-06 22:40:37.709][response][INFO] POST /identity/connect/token (login) => 200 OK
2022-01-06 15:40:37[2022-01-06 22:40:37.693][request][INFO] POST /identity/connect/token
2022-01-06 15:40:37[2022-01-06 22:40:37.674][response][INFO] POST /identity/connect/token (login) => 200 OK
2022-01-06 15:40:37[2022-01-06 22:40:37.659][request][INFO] POST /identity/connect/token
2022-01-06 15:39:10[2022-01-06 22:39:10.263][start][INFO] Rocket has launched from http://0.0.0.0:80
2022-01-06 15:39:10[2022-01-06 22:39:10.111][vaultwarden][INFO] Public key created correctly.
2022-01-06 15:39:10[2022-01-06 22:39:10.111][vaultwarden][INFO] Private key created correctly.
2022-01-06 15:39:09| Starting Vaultwarden |
2022-01-06 15:39:09| Version 1.23.1 |
2022-01-06 15:39:09|--------------------------------------------------------------------|
2022-01-06 15:39:09| This is an unofficial Bitwarden implementation, DO NOT use the |
2022-01-06 15:39:09| official channels to report bugs/features, regardless of client. |
2022-01-06 15:39:09| Send usage/configuration questions or feature requests to: |
2022-01-06 15:39:09| https://vaultwarden.discourse.group/ |
2022-01-06 15:39:09| Report suspected bugs/issues in the software itself at: |
2022-01-06 15:39:09| https://github.com/dani-garcia/vaultwarden/issues/new |
2022-01-06 15:39:09--------------------------------------------------------------------/
2022-01-06 15:39:09[INFO] No .env file found.
2022-01-06 15:39:09/--------------------------------------------------------------------\
@BlackDex commented on GitHub (Jan 7, 2022):
Please post the
Support Stringwhich you can generate via the /admin/diagnostics page.@mburgess00 commented on GitHub (Jan 7, 2022):
Your environment (Generated via diagnostics page)
Config (Generated via diagnostics page)
Show Running Config
Environment settings which are overridden:
@BlackDex commented on GitHub (Jan 7, 2022):
It seems to work for me.
At least on the
testingtagged image.Could you check if the mail was expired? The expire time is 5 day's.
Also, if you have changed the rsa generated keys used to encode the JWT tokens, decoding them will not work.
@mburgess00 commented on GitHub (Jan 11, 2022):
Thanks for the reply. The mail had been sent moments before the link was clicked so I'm sure it wasn't expired. The only thing I could think with the rsa generated keys is that we are running two instances of the container in AWS ECS in a fault-tolerant configuration. Would it be possible that the containers have their own keys? If so is there a way to inject/store the key outside of the container?