Admin Registration Error - Solved!
Hi there,
I have got an Immich stack running in docker swarm behind Traefik and Authentik.
I can successfully navigate to the Admin Registration screen where I can put in my email/name/pwd. But when I click Sign-up, nothing happens. In the browser console, I get this error:
Object { message: "Request failed with status code 404", name: "AxiosError", code: "ERR_BAD_REQUEST", config: {…}, request: XMLHttpRequest, response: {…}, stack: "" }
with a response URL of "https://immich.domain.tld/api/auth/admin-sign-up"
I initially thought it was an Authentik thing blocking something, but I have since updated the provider to allow ^/api/.*. But nothing has changed.
All containers/services are running in the stack and I checked the logs of everything, and the only thing that looks out of place is the postgres error ERROR: relation "system_config" does not exist at character 128
I do see LOG [RouterExplorer] Mapped {/auth/admin-sign-up, POST} route +2ms
in the server logs... not sure if that is relevant.7 Replies
Docker compose:
Here is my yml for the server and web. I do not use the immich proxy:
Solved! I needed to add to the server service:
Sweet!
Yup! Now trying to set up SSO with Authentik 😅
Following the guide?
Yes, but I've misunderstood Authentik + traefik works.
I thought I could create an OAuth provider and hook it into my embedded outpost, but it doesn't like that because you can only hook in proxy providers. So I have an OAuth provider and application but no outpost A bit out of scope for this discord server though 🙂
I thought I could create an OAuth provider and hook it into my embedded outpost, but it doesn't like that because you can only hook in proxy providers. So I have an OAuth provider and application but no outpost A bit out of scope for this discord server though 🙂
Yeah I'm not sure how it works with traefik unless you are only using it to terminate tls
Just to close this off, in Authentik, you create an OAuth provider, link the necessary details as per immich docs, remove the Traefik forward auth middleware, then it should be good to go 🙂