fix: configurable lockout threshold via config.toml to prevent lockout loop#414
Merged
Merged
Conversation
…force lockout Adds explicit [auth.security] section to Supabase config with max_failed_login_attempts = 10 and lockout_duration = 15m. Without this section, Supabase GoTrue uses aggressive exponential backoff defaults that lock users out for 5+ hours after repeated failed login attempts.
|
🤖 Auto-rebase: The branch was rebased successfully locally but could not be pushed to the fork. Please enable 'Allow edits from maintainers' in the PR settings, or rebase manually: |
1 similar comment
|
🤖 Auto-rebase: The branch was rebased successfully locally but could not be pushed to the fork. Please enable 'Allow edits from maintainers' in the PR settings, or rebase manually: |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Problem
Supabase GoTrue has aggressive exponential backoff defaults that lock users out for 5+ hours after repeated failed sign-in attempts. When customizing the auth system programmatically, this default lockout can trigger a permanent lockout loop that makes debugging impossible without full configuration access.
Fix
Added
[auth.security]section tosites/sh1pt.com/supabase/config.tomlwith explicit, configurable values:This prevents the exponential backoff from escalating beyond a 15-minute lockout window and sets a reasonable threshold (10 attempts) before triggering protection.
Testing