Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Consider allowing localhost in redirect_uri #651

Closed
git9999999 opened this issue Mar 21, 2022 · 15 comments
Closed

Consider allowing localhost in redirect_uri #651

git9999999 opened this issue Mar 21, 2022 · 15 comments
Assignees
Labels
type: bug A general bug
Milestone

Comments

@git9999999
Copy link

Expected Behavior
It should be possible to Overwrite the with a Config properties, to allow the use of localhost as Redirect Host.

Current Behavior
I am not a oauth2 specialist, and i am sure there are good reasons to prevent that behaviour by default. But for local development, people are use the enter the url localhost:4200 and not 127.0.0.1:4200

Current Code

	String requestedRedirectHost = requestedRedirect.getHost();
		if (requestedRedirectHost == null || requestedRedirectHost.equals("localhost")) {
			// As per https://tools.ietf.org/html/draft-ietf-oauth-v2-1-01#section-9.7.1
			// While redirect URIs using localhost (i.e.,
			// "http://localhost:{port}/{path}") function similarly to loopback IP
			// redirects described in Section 10.3.3, the use of "localhost" is NOT RECOMMENDED.
			return false;
		}
		if (!isLoopbackAddress(requestedRedirectHost)) {
			// As per https://tools.ietf.org/html/draft-ietf-oauth-v2-1-01#section-9.7
			// When comparing client redirect URIs against pre-registered URIs,
			// authorization servers MUST utilize exact string matching.
			return registeredClient.getRedirectUris().contains(requestedRedirectUri);
		}

Context

  1. I took me a long time to realize that localhost is not allowed.
  2. for local development is common to use localhost not 127.0.0.1

PS: In any case please add a Log statement that tell the Developers, if the use localhost, that this is the reason for the auth error they will suffer.

@git9999999 git9999999 added the type: enhancement A general enhancement label Mar 21, 2022
@jgrandja
Copy link
Collaborator

@git9999999 The reason "localhost" is not allowed is documented in the code:

// As per https://tools.ietf.org/html/draft-ietf-oauth-v2-1-01#section-9.7.1

Please review the link for full details.

Either way, we do need to improve the error message / notification for this scenario.

I'm going to close this as a duplicate of gh-680. Feel free to add additional comments there.

@jgrandja jgrandja assigned jgrandja and unassigned sjohnr Apr 27, 2022
@jgrandja jgrandja added status: duplicate A duplicate of another issue and removed type: enhancement A general enhancement labels Apr 27, 2022
@thomasletsch
Copy link

I can understand all the reasoning behind this settings, but I would like to emphasis one the points git9999999 made:

For local development it is very normal to use "localhost" as host name where all is running. Especially since a lot use docker containers running locally. The hard dis-allowance of localhost as redirect uri leads to the workaround of using http://127.0.0.1 as redirect uri in our case. imho this was not intended :-)

Anyway the spec uses the word not recommended and not not allowed. Not recommended sounds to me as you can do it, we warn you, but its your own risk. Perhaps someone has to enable this feature with a custom setting.

@tobias-meyer
Copy link

I have to agree with @thomasletsch .

Section 9.7.1 is a recommendation on how to implement the client endpoint to receive the redirect and it tells you that as the native app developer you should not make your app listen on localhost, but rather just 127.0.0.1.

Section 9.7.1 is no recommendation, that the authorization server should actively prevent the usage of localhost (in legitimate scenarios where the given arguments against using localhost don't apply). The section also says "Clients should open the network port only when starting the authorization request and close it once the response is returned.", which is another clear indication that it is not aimed at a web server which runs locally and of course constantly listens for requests.

I would even question whether disallowing localhost is a sensible default, but definitely it is not appropriate to not even allow the usage of localhost by means of a configuration property.

@jgrandja
Copy link
Collaborator

@git9999999 @thomasletsch @tobias-meyer Based on the upvotes in the original comment, I'm reopening this issue.

It's obviously causing issues for our users and that's not our intention. We do want to adhere to secure defaults, hence the reason for the current implementation.

However, we also want the framework to be easy to use during development.

We will look into this and come up with an easier solution to work with.

@jgrandja jgrandja reopened this Dec 21, 2022
@jgrandja jgrandja added type: enhancement A general enhancement and removed status: duplicate A duplicate of another issue labels Dec 21, 2022
@jgrandja jgrandja changed the title Add properties to allow localhost as Redirect Host. Consider allowing localhost in redirect_uri Dec 21, 2022
@git9999999
Copy link
Author

Hi Joe
Thank a lot for reconsidering this issue. It is the coolest Christmas present for me this year :-)
Wish you all merry Christmas
G

@jgrandja
Copy link
Collaborator

No worries @git9999999. Enjoy the holidays!

@Chr3is
Copy link

Chr3is commented Jan 5, 2023

As per https://openid.net/specs/openid-connect-registration-1_0.html#ClientMetadata

"[...]Native Clients MUST only register redirect_uris using custom URI schemes or URLs using the http: scheme with localhost as the hostname[...]"

@tinolazreg
Copy link

Any timeline on this issue? :)

@jgrandja
Copy link
Collaborator

@tinolazreg We're targeting the 1.1.0 release. See the release dates.

@rafallezanko
Copy link

rafallezanko commented Feb 18, 2023

Hi @jgrandja , I have met the same error when I tried to redirect to mobile app. I use custom URL scheme (com.duendesoftware.demo:/oauthredirect) and code inside class OAuth2AuthorizationCodeRequestAuthenticationValidator does not allow to do redirect back to mobile app.

My diagnose is that UriComponentsBuilder.fromUriString builds UriComponents where getHost() method returns null and it makes that the variable requestedRedirectHost is null.

For local tests I commented all code inside method: OAuth2AuthorizationCodeRequestAuthenticationValidator .validateRedirectUri and then the flow works fine.

Do you consider fix it in the 1.1.0 release? I hope so! ;)

UriComponents requestedRedirect = null;
try {
	requestedRedirect = UriComponentsBuilder.fromUriString(requestedRedirectUri).build();
} catch (Exception ex) { }
if (requestedRedirect == null || requestedRedirect.getFragment() != null) {
	throwError(OAuth2ErrorCodes.INVALID_REQUEST, OAuth2ParameterNames.REDIRECT_URI,
			authorizationCodeRequestAuthentication, registeredClient);
}

String requestedRedirectHost = requestedRedirect.getHost();
if (requestedRedirectHost == null || requestedRedirectHost.equals("localhost")) {
	// As per https://datatracker.ietf.org/doc/html/draft-ietf-oauth-v2-1-07#section-9.7.1
	// While redirect URIs using localhost (i.e., "http://localhost:{port}/{path}")
	// function similarly to loopback IP redirects described in Section 10.3.3,
	// the use of "localhost" is NOT RECOMMENDED.
	OAuth2Error error = new OAuth2Error(
			OAuth2ErrorCodes.INVALID_REQUEST,
			"localhost is not allowed for the redirect_uri (" + requestedRedirectUri + "). " +
					"Use the IP literal (127.0.0.1) instead.",
			"https://datatracker.ietf.org/doc/html/draft-ietf-oauth-v2-1-07#section-9.7.1");
	throwError(error, OAuth2ParameterNames.REDIRECT_URI,
			authorizationCodeRequestAuthentication, registeredClient);
}

Best regards and have a nice day! :)
Rafał

@jgrandja
Copy link
Collaborator

Thanks for the additional info @rafallezanko. Yes, we will address this before the 1.1.0 release.

@jgrandja jgrandja added this to the 1.1.0-RC1 milestone Apr 3, 2023
@jgrandja jgrandja moved this from Planning to Prioritized in Spring Security Team Apr 3, 2023
@jgrandja jgrandja moved this from Prioritized to In Progress in Spring Security Team Apr 5, 2023
@jgrandja jgrandja modified the milestones: 1.1.0-RC1, 0.4.2 Apr 5, 2023
@jgrandja jgrandja added type: bug A general bug and removed type: enhancement A general enhancement labels Apr 5, 2023
@jgrandja
Copy link
Collaborator

jgrandja commented Apr 5, 2023

@git9999999 @thomasletsch @tobias-meyer

I reviewed the relevant specifications and although the use of localhost is NOT RECOMMENDED, it does not explicitly state that it is prohibited. Based on this, the current implementation is too strict and therefore I will apply the required changes to allow for localhost in the redirect_uri. This will be back-ported to the 0.4.x branch.

@rafallezanko
Copy link

rafallezanko commented Apr 6, 2023

@jgrandja I think your fix does not allow to provide custom URL scheme eg. mobile device (com.duendesoftware.demo:/oauthredirect).

Can you check please? The following code in class OAuth2AuthorizationCodeRequestAuthenticationValidator does not allow to provide custom URL scheme.

			UriComponents requestedRedirect = null;
			try {
				requestedRedirect = UriComponentsBuilder.fromUriString(requestedRedirectUri).build();
			} catch (Exception ex) { }
			if (requestedRedirect == null || requestedRedirect.getFragment() != null) {
				throwError(OAuth2ErrorCodes.INVALID_REQUEST, OAuth2ParameterNames.REDIRECT_URI,
						authorizationCodeRequestAuthentication, registeredClient);
			}

Should I open new issue?

@jgrandja
Copy link
Collaborator

jgrandja commented Apr 6, 2023

@rafallezanko I just tried it and com.duendesoftware.demo:/oauthredirect works.

@rafallezanko
Copy link

Perfect, thank you for fast feedback.

tjholmes66 added a commit to tjholmes66/spring-authorization-server that referenced this issue Oct 2, 2023
* Update to io.spring.javaformat:spring-javaformat-checkstyle:0.0.35

Closes spring-projectsgh-1089

* Update to jackson-bom:2.14.2

Closes spring-projectsgh-1090

* Update to junit-jupiter:5.9.2

Closes spring-projectsgh-1091

* Release 1.0.1

* Next Development Version

* Update to Spring Security 6.1.0-M1

Closes spring-projectsgh-1093

* Update to nimbus-jose-jwt:9.30.2

Closes spring-projectsgh-1094

* Update to assertj-core:3.24.2

Closes spring-projectsgh-1095

* Update to mockito-core:4.11.0

Closes spring-projectsgh-1096

* Release 1.1.0-M1

* Next Development Version

* Add user property to deploy_docs workflow

* Fix broken support link

Closes spring-projectsgh-1092

* Fix client secret encoding when client dynamically registered

Closes spring-projectsgh-1056

* Polish spring-projectsgh-1056

* Allow PasswordEncoder to be configured in OidcClientRegistrationAuthenticationProvider

Issue spring-projectsgh-1056

* Upgrade client secret when available

Closes spring-projectsgh-1099

* Polish spring-projectsgh-1105

* Add support for OAuth 2.0 Device Authorization Grant

Closes spring-projectsgh-44

* Switch to spring-security SNAPSHOT dependencies

Issue spring-projectsgh-44

* Use spring-security 6.1 in snapshot tests

Issue spring-projectsgh-1106

* Update to actions/checkout@v3

Closes spring-projectsgh-1117

* Use spring-io/spring-gradle-build-action

Closes spring-projectsgh-1120

* Use spring-io/spring-gradle-build-action

Closes spring-projectsgh-1120

* Revert accidental change in versions

Issue spring-projectsgh-1120

* Polish spring-projectsgh-1106

* Update to Spring Framework 6.0.7

Closes spring-projectsgh-1130

* Update to Spring Security 1.1.0-M2

Closes spring-projectsgh-1131

* Update to nimbus-jose-jwt:9.31

Closes spring-projectsgh-1132

* Update to Spring Framework 6.0.7 in buildSrc

Issue spring-projectsgh-1130

* Release 1.1.0-M2

* Next Development Version

* Polish spring-projectsgh-1106 Device Authorization Grant

* Avoid persisting client principal in device authorization request

Issue spring-projectsgh-1106

* Polish spring-projectsgh-1068

Issue spring-projectsgh-1077

* Add OidcLogoutAuthenticationToken.isPrincipalAuthenticated()

Issue spring-projectsgh-1077

* Ensure ID Token is active before processing logout request

Issue spring-projectsgh-1077

* Allow localhost in redirect_uri

Closes spring-projectsgh-651

* Fix refresh token error code INVALID_CLIENT to INVALID_GRANT

Closes spring-projectsgh-1139

* Do not require authorizationRequest for device grant

Issue spring-projectsgh-1127

* Add tests for OAuth 2.0 Device Authorization Grant

This commit adds tests for the following components:
* AuthenticationConverters
* AuthenticationProviders
* Endpoint Filters

Issue spring-projectsgh-44
Closes spring-projectsgh-1127

* JDBC device_code authorization

Issue spring-projectsgh-1156

* Polish spring-projectsgh-1143

* Add tests and update examples in docs

Closes spring-projectsgh-1156

* Polish ref-doc

Issue spring-projectsgh-1156

* Add customization to support public clients for device grant

Issue spring-projectsgh-1157

* Polish samples

Closes spring-projectsgh-1157

* Add documentation for OAuth 2.0 Device Authorization Grant

Closes spring-projectsgh-1158

* Polish spring-projectsgh-1127

* Polish spring-projectsgh-1158

* Add documentation for OpenID Connect 1.0 Logout Endpoint

Closes spring-projectsgh-1069

* Update Stack Overflow tag to spring-authorization-server

* Update to Spring Framework 5.3.27

Closes spring-projectsgh-1162

* Update to Spring Security 5.8.3

Closes spring-projectsgh-1163

* Update to io.spring.javaformat:spring-javaformat-checkstyle:0.0.38

Closes spring-projectsgh-1164

* Update to Spring Framework 6.0.8

Closes spring-projectsgh-1165

* Update to Spring Security 6.0.3

Closes spring-projectsgh-1166

* Update to io.spring.javaformat:spring-javaformat-checkstyle:0.0.38

Closes spring-projectsgh-1167

* Update to Spring Framework 6.0.8

Closes spring-projectsgh-1168

* Update to Spring Security 6.1.0-RC1

Closes spring-projectsgh-1169

* Update to io.spring.javaformat:spring-javaformat-checkstyle:0.0.38

Closes spring-projectsgh-1170

* Update to json-path:2.8.0

Closes spring-projectsgh-1171

* Release 0.4.2

* Next Development Version

* Release 1.0.2

* Next Development Version

* Release 1.1.0-RC1

* Next Development Version

* Update to org.jfrog.buildinfo:build-info-extractor-gradle:4.29.0

Closes spring-projectsgh-1175

* Apply ArtifactoryPlugin to SpringRootProjectPlugin

Closes spring-projectsgh-1177

* Fix artifact build properties for Artifactory

- Apply SpringArtifactoryPlugin in SpringRootProjectPlugin (which applies ArtifactoryPlugin)
- In SpringArtifactoryPlugin don't set publication if MavenPublishPlugin is not applied

Closes spring-projectsgh-1179

* Add test for dynamic client registration with custom metadata

Issue spring-projectsgh-1172

* Add logout success page to default client sample

Sample client (located in 'samples/messages-client' directory) is configured with a custom logout success page where
the end-user is redirected to upon successful logout action.

Fixes spring-projectsgh-1142

* Add sample featured-authorizationserver

Issue spring-projectsgh-1189

* Merge custom-consent-authorizationserver into featured-authorizationserver

Issue spring-projectsgh-1189

* Merge federated-identity-authorizationserver into featured-authorizationserver

Issue spring-projectsgh-1189

* Update io.spring.ge.conventions plugin to 0.0.13

Closes spring-projectsgh-1190

* Update spring-asciidoctor-backends to 0.0.5

Closes spring-projectsgh-1192

* Merge device-grant-authorizationserver into featured-authorizationserver

Issue spring-projectsgh-1189

* Merge device-client into messages-client

Issue spring-projectsgh-1189

* Use custom consent page for device code flow

Issue spring-projectsgh-1189

* Use current authentication for device authorization

Issue spring-projectsgh-1189

* Reuse error handling

Issue spring-projectsgh-1189

* Handle web client response error

Issue spring-projectsgh-1189

* Update @SInCE

* Rename featured-authorizationserver to demo-authorizationserver

Issue spring-projectsgh-1189

* Rename messages-client to demo-client

Issue spring-projectsgh-1189

* Update sample README

Issue spring-projectsgh-1189

* Add integration tests for device grant

Issue spring-projectsgh-1116

* Update web ui design for demo-client

Issue spring-projectsgh-1196

* Polish web ui design for demo-client

Issue spring-projectsgh-1196

* Update web ui design for demo-authorizationserver

Issue spring-projectsgh-1196

* Polish web ui design for demo-client

Issue spring-projectsgh-1196

* Polish demo sample

Issue spring-projectsgh-1189

* Update to Spring Boot 3.1.0-RC1

Closes spring-projectsgh-1198

* Refresh Getting Started example

Closes spring-projectsgh-1186

* Use Spring Boot starter in samples

Closes spring-projectsgh-1187

* Invalidate tokens previously issued when code is reused

Closes spring-projectsgh-1152

* Polish spring-projectsgh-1152

* Add How-to: Authenticate using Social Login

Closes spring-projectsgh-538

* Add How-to: Authenticate using a Single Page Application with PKCE

Closes spring-projectsgh-539

* Hash the sid claim in the ID Token

Closes spring-projectsgh-1207

* Simplified federated login in demo sample

Closes spring-projectsgh-1208

* Polish spring-projectsgh-1186

* Polish spring-projectsgh-538

* Remove FederatedIdentityConfigurer from demo sample

Issue spring-projectsgh-1208

* Update exception handling config in ref-doc

Closes spring-projectsgh-1205

* Update exception handling config in samples

Closes spring-projectsgh-1204

* Polish ref-doc

Issue spring-projectsgh-1205

* Polish tests

* Add How-to: Implement an Extension Authorization Grant Type

Closes spring-projectsgh-686

* Update to Spring Framework 6.0.9

Closes spring-projectsgh-1213

* Update to Spring Security 6.1.0

Closes spring-projectsgh-1214

* Update to jackson-bom 2.15.0

Closes spring-projectsgh-1215

* Update to junit-jupiter 5.9.3

Closes spring-projectsgh-1216

* Release 1.1.0

* Next Development Version

* Revert serialVersionUID to 0.4.0

Closes spring-projectsgh-1218

* Revert serialVersionUID to 1.0.0

Closes spring-projectsgh-1219

* Revert serialVersionUID to 1.1.0

Closes spring-projectsgh-1220

* Exclude project dependency from spring-boot-dependencies

Closes spring-projectsgh-1228

* Update to Spring Boot 3.1.0

* Update com.gradle.enterprise plugin to 3.13.3

Closes spring-projectsgh-1234
Issue spring-projectsgh-1231

* Prepare for automated validation scripts

See https://github.com/gradle/gradle-enterprise-build-validation-scripts/blob/main/Gradle.md

Issue spring-projectsgh-1231

* ID Token contains sid claim after refresh_token grant

Closes spring-projectsgh-1224

* Use substring instead of replaceFirst in OAuth2AuthorizationConsent

Closes spring-projectsgh-1222

* Validate authorized principal instead of sub during logout

Closes spring-projectsgh-1235

* Revert "Prepare for automated validation scripts"

This reverts commit ece9f10.

Issue spring-projectsgh-1231

* Add debug log entries

Closes spring-projectsgh-1245
Closes spring-projectsgh-1246
Closes spring-projectsgh-1247
Closes spring-projectsgh-1248

* Polish additional logging

Issue spring-projectsgh-1245, spring-projectsgh-1246, spring-projectsgh-1247, spring-projectsgh-1248

* Enable caching of :asciidoctor gradle task

* Use direct code import

Issue spring-projectsgh-1231

* Next Minor Version

* Fix NPE on access token in OAuth2AuthorizationCodeAuthenticationProvider

Closes spring-projectsgh-1233

* Polish spring-projectsgh-1233

* Fix to save all values for multi-valued request parameters

Fixes spring-projectsgh-1250

* Polish spring-projectsgh-1252

* Fix to save all values for multi-valued device grant parameters

Fixes spring-projectsgh-1269

* Polish spring-projectsgh-1252

* Update to Spring Framework 5.3.28

Closes spring-projectsgh-1272

* Update to Spring Security 5.8.4

Closes spring-projectsgh-1273

* Update to jackson-bom 2.14.3

Closes spring-projectsgh-1274

* Update to Spring Framework 6.0.10

Closes spring-projectsgh-1276

* Update to Spring Security 6.0.4

Closes spring-projectsgh-1277

* Update to Spring Framework 6.0.10

Closes spring-projectsgh-1278

* Update to Spring Security 6.1.1

Closes spring-projectsgh-1279

* Update to junit-jupiter 5.9.3

Closes spring-projectsgh-1280

* Update to junit-jupiter 5.9.3

Closes spring-projectsgh-1281

* Update to jackson-bom 2.15.2

Closes spring-projectsgh-1282

* Update feature planning section to using GitHub Projects

* Release 1.1.1

* Next Development Version

* Fix generating ID token with null sid when refresh_token grant

Closes spring-projectsgh-1283

* Polish spring-projectsgh-1289

* Fix NPE in DefaultErrorController

Closes spring-projectsgh-1286

* Migrate docs to Antora

Issue spring-projectsgh-1295

* Polish Antora migration

Issue spring-projectsgh-1292
Closes spring-projectsgh-1295

* Remove unused antora-playbook.yml

* Replaces 'install' with 'publishToMavenLocal' command in README

* Adds how-to guide on adding authorities to access tokens

Closes spring-projectsgh-542

* Polish spring-projectsgh-1264

* Update order of guides in nav.adoc

* Fix userCode validation

Issue spring-projectsgh-44

* Polish spring-projectsgh-1309

* Add Revved up by Gradle Enterprise badge

* Move badges to header

This is similar to Spring Boot:
  https://github.com/spring-projects/spring-boot/blob/main/README.adoc

* Fix workflow status link

* Fix samples test suite execution and failing tests

Closes spring-projectsgh-1324

* Polish spring-projectsgh-1325

* Move deploy-docs.yml to correct folder

Issue spring-projectsgh-1295

* Remove manual list of guides

Issue spring-projectsgh-1295

* Remove reference to gh-pages

Issue spring-projectsgh-1295

* Update to Spring Framework 6.0.11

Closes spring-projectsgh-1338

* Update to Spring Security 6.1.2

Closes spring-projectsgh-1339

* Update to org.hsqldb:hsqldb 2.7.2

Closes spring-projectsgh-1340

* Release 1.1.2

* Next Development Version

* Adds ability to inject custom metadata at client registration

Closes spring-projectsgh-1172

* Polish spring-projectsgh-1326

* Adds dynamic client registration how-to guide

Closes spring-projectsgh-647

* Polish spring-projectsgh-1320

* Add code challenge methods for oidc provider configuration response

Closes spring-projectsgh-1302

* Update to Spring Framework 6.1.0-M5

Closes spring-projectsgh-1364

* Update to Spring Security 6.2.0-M3

Closes spring-projectsgh-1365

* Update to nimbus-jose-jwt 9.35

Closes spring-projectsgh-1366

* Update to junit-jupiter 5.10.0

Closes spring-projectsgh-1367

* Update to okhttp 4.11.0

Closes spring-projectsgh-1368

* Release 1.2.0-M1

* Next Development Version

---------

Co-authored-by: Joe Grandja <jgrandja@vmware.com>
Co-authored-by: Siva Kumar Edupuganti <esivakumar18@gmail.com>
Co-authored-by: Yuta Saito <uc4w6c@bma.biglobe.ne.jp>
Co-authored-by: Shannon Pamperl <shanman190@gmail.com>
Co-authored-by: Steve Riesenberg <sriesenberg@vmware.com>
Co-authored-by: HuiYeong <huiyeong@lguplus.co.kr>
Co-authored-by: Xu Xiaowei <xuxiaowei@xuxiaowei.com.cn>
Co-authored-by: Janne Valkealahti <janne.valkealahti@gmail.com>
Co-authored-by: Dmitriy Dubson <ddubson@vmware.com>
Co-authored-by: neochae <neochae@lguplus.co.kr>
Co-authored-by: heartape <heartape@163.com>
Co-authored-by: Dejan Varmedja <114813331+fndejan@users.noreply.github.com>
Co-authored-by: Jerome Prinet <jprinet@gradle.com>
Co-authored-by: Pavel Efros <efros.pavel@gmail.com>
Co-authored-by: Martin Lindström <martin.lindstrom@litsec.se>
Co-authored-by: cbilodeau <cbilodeau@upgrade.com>
Co-authored-by: Rob Winch <rwinch@users.noreply.github.com>
Co-authored-by: Dmitriy Dubson <d.dubson@gmail.com>
Co-authored-by: Martin Bogusz <m.bogusz@celonis.com>
Co-authored-by: Eric Haag <ehaag@gradle.com>
Co-authored-by: Tuxzx <tuxzx@outlook.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
type: bug A general bug
Projects
Status: Done
Development

No branches or pull requests

8 participants