-
-
Notifications
You must be signed in to change notification settings - Fork 132
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Configuration wizard does not make keyring entry for refresh token. #521
Comments
This causes ...
|
Looks like an issue with the default keyring entry name generated by the config. Meanwhile you can force a specific name (if you also configured SMTP, you can use the same keyring name), see the |
I cannot reproduce the issue, could you share your configuration? |
Here is my configuration. backend.type = "imap"
backend.host = "outlook.office365.com"
backend.port = 993
backend.encryption.type = "tls"
backend.auth.type = "oauth2"
backend.auth.method = "xoauth2"
backend.auth.client-id = "08162f7c-0fd2-4200-a84a-f25a4db0b584"
backend.auth.auth-url = "https://login.microsoftonline.com/common/oauth2/v2.0/authorize"
backend.auth.token-url = "https://login.microsoftonline.com/common/oauth2/v2.0/token"
backend.auth.pkce = true
backend.auth.redirect-scheme = "http"
backend.auth.redirect-host = "localhost"
backend.auth.redirect-port = 49152
backend.auth.scopes = ["https://outlook.office.com/IMAP.AccessAsUser.All", "https://outlook.office.com/SMTP.Send"]
backend.auth.client-secret.keyring = "imap-oauth2-client-secret"
backend.auth.access-token.keyring = "imap-oauth2-access-token"
message.send.backend.type = "smtp"
message.send.backend.host = "smtp.office365.com"
message.send.backend.port = 587
message.send.backend.encryption.type = "start-tls"
message.send.backend.auth.type = "oauth2"
message.send.backend.auth.method = "xoauth2"
message.send.backend.auth.client-id = "08162f7c-0fd2-4200-a84a-f25a4db0b584"
message.send.backend.auth.auth-url = "https://login.microsoftonline.com/common/oauth2/v2.0/authorize"
message.send.backend.auth.token-url = "https://login.microsoftonline.com/common/oauth2/v2.0/token"
message.send.backend.auth.pkce = true
message.send.backend.auth.redirect-scheme = "http"
message.send.backend.auth.redirect-host = "localhost"
message.send.backend.auth.redirect-port = 49152
message.send.backend.auth.scopes = ["https://outlook.office.com/IMAP.AccessAsUser.All", "https://outlook.office.com/SMTP.Send"]
message.send.backend.auth.client-secret.keyring = "smtp-oauth2-client-secret"
message.send.backend.auth.access-token.keyring = "smtp-oauth2-access-token" |
at
|
I still cannot reproduce your name issue. I placed your configuration under a
That said, the keyring should not return an error if it tries to delete an entry that does not exist. I opened a dedicated issue for that purpose: #543. So I would suggest to share the same keyring names between IMAP and SMTP to avoid duplicated setups, and to force a name for the refresh token: - backend.auth.client-secret.keyring = "imap-oauth2-client-secret"
- backend.auth.access-token.keyring = "imap-oauth2-access-token"
+ backend.auth.client-secret.keyring = "himalaya-oauth2-client-secret"
+ backend.auth.access-token.keyring = "himalaya-oauth2-access-token"
+ backend.auth.access-token.keyring = "himalaya-oauth2-refresh-token"
- message.send.backend.auth.client-secret.keyring = "smtp-oauth2-client-secret"
- message.send.backend.auth.access-token.keyring = "smtp-oauth2-access-token"
+ message.send.backend.auth.client-secret.keyring = "himalaya-oauth2-client-secret"
+ message.send.backend.auth.access-token.keyring = "himalaya-oauth2-access-token"
+ message.send.backend.auth.refresh-token.keyring = "himalaya-oauth2-access-token" Then you should be able to configure properly with Let me know if it works for you. |
Thank you for your help. |
Now at least you have a correct keyring name. Did you try to not reset entries before? |
In both cases it should have been tried. |
I will give another shot with my Gmail account and let you know. |
I got. |
Is it one of the specification?
The text was updated successfully, but these errors were encountered: