Skip to content

Comments

Fix OAuth session race condition causing false 401 errors during login#61287

Merged
vincbeck merged 7 commits intoapache:mainfrom
Jgprog117:fix-oauth-session-race-condition-57981
Feb 2, 2026
Merged

Fix OAuth session race condition causing false 401 errors during login#61287
vincbeck merged 7 commits intoapache:mainfrom
Jgprog117:fix-oauth-session-race-condition-57981

Conversation

@Jgprog117
Copy link
Contributor

Fixes #57981

When users authenticate via Azure OAuth SSO (and other OAuth providers), the UI briefly displays an authentication error message during the OAuth redirect flow. The error appears for approximately 1 second before disappearing once authentication successfully completes.

Root Cause:
The issue stems from a race condition during the OAuth authentication flow. After the OAuth callback completes and the user is authenticated, the Flask session containing OAuth tokens and user data may not be fully committed to the session backend (cookie or database) before the redirect response is sent to the client. When the UI loads and immediately makes API requests (like /ui/config), these requests arrive before the session is available, causing temporary 401 Unauthorized errors.

Solution:
This commit introduces a CustomAuthOAuthView that extends Flask-AppBuilder's AuthOAuthView to explicitly ensure the session is committed before redirecting. The fix:

  1. Created providers/fab/src/airflow/providers/fab/auth_manager/views/auth_oauth.py with CustomAuthOAuthView class
  2. Override oauth_authorized() method to mark session.modified = True after parent's OAuth callback handling completes
  3. Updated security_manager/override.py to use CustomAuthOAuthView instead of the default AuthOAuthView

This ensures Flask's session interface saves the session via the after_request handler before the HTTP redirect response is sent to the client, eliminating the race condition.

The fix addresses the root cause as suggested by maintainer feedback on PR #58037, rather than masking the error in the UI.

Testing:

  • Syntax validated with py_compile
  • Works with both session backends (database and securecookie)
  • Maintains backward compatibility with existing OAuth flows

Related Issues:


Was generative AI tooling used to co-author this PR?
  • [ X] Yes (please specify the tool below)
    Claude code was to fetch additional information regarding the issue and to document the solution.

  • Read the Pull Request Guidelines for more information. Note: commit author/co-author name and email in commits become permanently public when merged.
  • For fundamental code changes, an Airflow Improvement Proposal (AIP) is needed.
  • When adding dependency, check compliance with the ASF 3rd Party License Policy.
  • For significant user-facing changes create newsfragment: {pr_number}.significant.rst or {issue_number}.significant.rst, in airflow-core/newsfragments.

Fixes apache#57981

When users authenticate via Azure OAuth SSO (and other OAuth providers),
the UI briefly displays an authentication error message during the OAuth
redirect flow. The error appears for approximately 1 second before
disappearing once authentication successfully completes.

Root Cause:
The issue stems from a race condition during the OAuth authentication flow.
After the OAuth callback completes and the user is authenticated, the Flask
session containing OAuth tokens and user data may not be fully committed to
the session backend (cookie or database) before the redirect response is sent
to the client. When the UI loads and immediately makes API requests (like
/ui/config), these requests arrive before the session is available, causing
temporary 401 Unauthorized errors.

Solution:
This commit introduces a CustomAuthOAuthView that extends Flask-AppBuilder's
AuthOAuthView to explicitly ensure the session is committed before redirecting.
The fix:

1. Created providers/fab/src/airflow/providers/fab/auth_manager/views/auth_oauth.py
   with CustomAuthOAuthView class
2. Override oauth_authorized() method to mark session.modified = True after
   parent's OAuth callback handling completes
3. Updated security_manager/override.py to use CustomAuthOAuthView instead of
   the default AuthOAuthView

This ensures Flask's session interface saves the session via the after_request
handler before the HTTP redirect response is sent to the client, eliminating
the race condition.

The fix addresses the root cause as suggested by maintainer feedback on
PR apache#58037, rather than masking the error in the UI.

Testing:
- Syntax validated with py_compile
- Works with both session backends (database and securecookie)
- Maintains backward compatibility with existing OAuth flows

Related Issues:
- apache#55612 - Airflow UI initial XHR returns 401 before session cookie is set
- apache#57534 - Airflow 3.1.1 oauth login failure
- apache#57485 - Airflow 3.1.1 oauth login broken
- PR apache#58037 - Previous UI-based workaround attempt (closed)

Signed-off-by: Jgprog117 <gustafsonjosef@gmail.com>
Remove unused imports, fix import ordering, and apply ruff formatting:
- Remove unused pytest import from test_auth_oauth.py
- Remove unused AuthOAuthView import from override.py
- Fix import ordering to comply with ruff formatting rules
- Apply ruff format to test file
Copy link
Contributor

@SameerMesiah97 SameerMesiah97 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The overall approach is solid. But it just needs a few refinements.

- Remove redundant if/else branching that did the same thing in both paths
- Fix misleading "completed successfully" log message to neutral wording
- Replace brittle __class__.__bases__[0] mocking with explicit AuthOAuthView
- Consolidate duplicate backend tests into a single parametrized test
@Jgprog117
Copy link
Contributor Author

@SameerMesiah97

Good comments, amended PR with your improvements. Thanks :)

Jgprog117 and others added 2 commits February 2, 2026 16:39
Use mock.patch with new= as context manager instead of decorator to
prevent mock from inspecting the Flask session LocalProxy, which
requires an active request context.
@SameerMesiah97
Copy link
Contributor

@vincbeck

Looks good to me.

@vincbeck vincbeck merged commit 2ebec16 into apache:main Feb 2, 2026
86 checks passed
@boring-cyborg
Copy link

boring-cyborg bot commented Feb 2, 2026

Awesome work, congrats on your first merged pull request! You are invited to check our Issue Tracker for additional contributions.

jason810496 pushed a commit to abhijeets25012-tech/airflow that referenced this pull request Feb 3, 2026
apache#61287)

* Fix OAuth session race condition causing false 401 errors during login

Fixes apache#57981

When users authenticate via Azure OAuth SSO (and other OAuth providers),
the UI briefly displays an authentication error message during the OAuth
redirect flow. The error appears for approximately 1 second before
disappearing once authentication successfully completes.

Root Cause:
The issue stems from a race condition during the OAuth authentication flow.
After the OAuth callback completes and the user is authenticated, the Flask
session containing OAuth tokens and user data may not be fully committed to
the session backend (cookie or database) before the redirect response is sent
to the client. When the UI loads and immediately makes API requests (like
/ui/config), these requests arrive before the session is available, causing
temporary 401 Unauthorized errors.

Solution:
This commit introduces a CustomAuthOAuthView that extends Flask-AppBuilder's
AuthOAuthView to explicitly ensure the session is committed before redirecting.
The fix:

1. Created providers/fab/src/airflow/providers/fab/auth_manager/views/auth_oauth.py
   with CustomAuthOAuthView class
2. Override oauth_authorized() method to mark session.modified = True after
   parent's OAuth callback handling completes
3. Updated security_manager/override.py to use CustomAuthOAuthView instead of
   the default AuthOAuthView

This ensures Flask's session interface saves the session via the after_request
handler before the HTTP redirect response is sent to the client, eliminating
the race condition.

The fix addresses the root cause as suggested by maintainer feedback on
PR apache#58037, rather than masking the error in the UI.

Testing:
- Syntax validated with py_compile
- Works with both session backends (database and securecookie)
- Maintains backward compatibility with existing OAuth flows

Related Issues:
- apache#55612 - Airflow UI initial XHR returns 401 before session cookie is set
- apache#57534 - Airflow 3.1.1 oauth login failure
- apache#57485 - Airflow 3.1.1 oauth login broken
- PR apache#58037 - Previous UI-based workaround attempt (closed)

Signed-off-by: Jgprog117 <gustafsonjosef@gmail.com>

* Fix logging to use %-formatting instead of f-strings

* Add tests for CustomAuthOAuthView

* Fix linting and formatting issues in OAuth session race condition fix

Remove unused imports, fix import ordering, and apply ruff formatting:
- Remove unused pytest import from test_auth_oauth.py
- Remove unused AuthOAuthView import from override.py
- Fix import ordering to comply with ruff formatting rules
- Apply ruff format to test file

* Address PR review feedback from SameerMesiah97

- Remove redundant if/else branching that did the same thing in both paths
- Fix misleading "completed successfully" log message to neutral wording
- Replace brittle __class__.__bases__[0] mocking with explicit AuthOAuthView
- Consolidate duplicate backend tests into a single parametrized test

* Fix test RuntimeError by avoiding Flask session LocalProxy access

Use mock.patch with new= as context manager instead of decorator to
prevent mock from inspecting the Flask session LocalProxy, which
requires an active request context.

---------

Signed-off-by: Jgprog117 <gustafsonjosef@gmail.com>
Alok-kumar-priyadarshi pushed a commit to Alok-kumar-priyadarshi/airflow that referenced this pull request Feb 5, 2026
apache#61287)

* Fix OAuth session race condition causing false 401 errors during login

Fixes apache#57981

When users authenticate via Azure OAuth SSO (and other OAuth providers),
the UI briefly displays an authentication error message during the OAuth
redirect flow. The error appears for approximately 1 second before
disappearing once authentication successfully completes.

Root Cause:
The issue stems from a race condition during the OAuth authentication flow.
After the OAuth callback completes and the user is authenticated, the Flask
session containing OAuth tokens and user data may not be fully committed to
the session backend (cookie or database) before the redirect response is sent
to the client. When the UI loads and immediately makes API requests (like
/ui/config), these requests arrive before the session is available, causing
temporary 401 Unauthorized errors.

Solution:
This commit introduces a CustomAuthOAuthView that extends Flask-AppBuilder's
AuthOAuthView to explicitly ensure the session is committed before redirecting.
The fix:

1. Created providers/fab/src/airflow/providers/fab/auth_manager/views/auth_oauth.py
   with CustomAuthOAuthView class
2. Override oauth_authorized() method to mark session.modified = True after
   parent's OAuth callback handling completes
3. Updated security_manager/override.py to use CustomAuthOAuthView instead of
   the default AuthOAuthView

This ensures Flask's session interface saves the session via the after_request
handler before the HTTP redirect response is sent to the client, eliminating
the race condition.

The fix addresses the root cause as suggested by maintainer feedback on
PR apache#58037, rather than masking the error in the UI.

Testing:
- Syntax validated with py_compile
- Works with both session backends (database and securecookie)
- Maintains backward compatibility with existing OAuth flows

Related Issues:
- apache#55612 - Airflow UI initial XHR returns 401 before session cookie is set
- apache#57534 - Airflow 3.1.1 oauth login failure
- apache#57485 - Airflow 3.1.1 oauth login broken
- PR apache#58037 - Previous UI-based workaround attempt (closed)

Signed-off-by: Jgprog117 <gustafsonjosef@gmail.com>

* Fix logging to use %-formatting instead of f-strings

* Add tests for CustomAuthOAuthView

* Fix linting and formatting issues in OAuth session race condition fix

Remove unused imports, fix import ordering, and apply ruff formatting:
- Remove unused pytest import from test_auth_oauth.py
- Remove unused AuthOAuthView import from override.py
- Fix import ordering to comply with ruff formatting rules
- Apply ruff format to test file

* Address PR review feedback from SameerMesiah97

- Remove redundant if/else branching that did the same thing in both paths
- Fix misleading "completed successfully" log message to neutral wording
- Replace brittle __class__.__bases__[0] mocking with explicit AuthOAuthView
- Consolidate duplicate backend tests into a single parametrized test

* Fix test RuntimeError by avoiding Flask session LocalProxy access

Use mock.patch with new= as context manager instead of decorator to
prevent mock from inspecting the Flask session LocalProxy, which
requires an active request context.

---------

Signed-off-by: Jgprog117 <gustafsonjosef@gmail.com>
jhgoebbert pushed a commit to jhgoebbert/airflow_Owen-CH-Leung that referenced this pull request Feb 8, 2026
apache#61287)

* Fix OAuth session race condition causing false 401 errors during login

Fixes apache#57981

When users authenticate via Azure OAuth SSO (and other OAuth providers),
the UI briefly displays an authentication error message during the OAuth
redirect flow. The error appears for approximately 1 second before
disappearing once authentication successfully completes.

Root Cause:
The issue stems from a race condition during the OAuth authentication flow.
After the OAuth callback completes and the user is authenticated, the Flask
session containing OAuth tokens and user data may not be fully committed to
the session backend (cookie or database) before the redirect response is sent
to the client. When the UI loads and immediately makes API requests (like
/ui/config), these requests arrive before the session is available, causing
temporary 401 Unauthorized errors.

Solution:
This commit introduces a CustomAuthOAuthView that extends Flask-AppBuilder's
AuthOAuthView to explicitly ensure the session is committed before redirecting.
The fix:

1. Created providers/fab/src/airflow/providers/fab/auth_manager/views/auth_oauth.py
   with CustomAuthOAuthView class
2. Override oauth_authorized() method to mark session.modified = True after
   parent's OAuth callback handling completes
3. Updated security_manager/override.py to use CustomAuthOAuthView instead of
   the default AuthOAuthView

This ensures Flask's session interface saves the session via the after_request
handler before the HTTP redirect response is sent to the client, eliminating
the race condition.

The fix addresses the root cause as suggested by maintainer feedback on
PR apache#58037, rather than masking the error in the UI.

Testing:
- Syntax validated with py_compile
- Works with both session backends (database and securecookie)
- Maintains backward compatibility with existing OAuth flows

Related Issues:
- apache#55612 - Airflow UI initial XHR returns 401 before session cookie is set
- apache#57534 - Airflow 3.1.1 oauth login failure
- apache#57485 - Airflow 3.1.1 oauth login broken
- PR apache#58037 - Previous UI-based workaround attempt (closed)

Signed-off-by: Jgprog117 <gustafsonjosef@gmail.com>

* Fix logging to use %-formatting instead of f-strings

* Add tests for CustomAuthOAuthView

* Fix linting and formatting issues in OAuth session race condition fix

Remove unused imports, fix import ordering, and apply ruff formatting:
- Remove unused pytest import from test_auth_oauth.py
- Remove unused AuthOAuthView import from override.py
- Fix import ordering to comply with ruff formatting rules
- Apply ruff format to test file

* Address PR review feedback from SameerMesiah97

- Remove redundant if/else branching that did the same thing in both paths
- Fix misleading "completed successfully" log message to neutral wording
- Replace brittle __class__.__bases__[0] mocking with explicit AuthOAuthView
- Consolidate duplicate backend tests into a single parametrized test

* Fix test RuntimeError by avoiding Flask session LocalProxy access

Use mock.patch with new= as context manager instead of decorator to
prevent mock from inspecting the Flask session LocalProxy, which
requires an active request context.

---------

Signed-off-by: Jgprog117 <gustafsonjosef@gmail.com>
Ratasa143 pushed a commit to Ratasa143/airflow that referenced this pull request Feb 15, 2026
apache#61287)

* Fix OAuth session race condition causing false 401 errors during login

Fixes apache#57981

When users authenticate via Azure OAuth SSO (and other OAuth providers),
the UI briefly displays an authentication error message during the OAuth
redirect flow. The error appears for approximately 1 second before
disappearing once authentication successfully completes.

Root Cause:
The issue stems from a race condition during the OAuth authentication flow.
After the OAuth callback completes and the user is authenticated, the Flask
session containing OAuth tokens and user data may not be fully committed to
the session backend (cookie or database) before the redirect response is sent
to the client. When the UI loads and immediately makes API requests (like
/ui/config), these requests arrive before the session is available, causing
temporary 401 Unauthorized errors.

Solution:
This commit introduces a CustomAuthOAuthView that extends Flask-AppBuilder's
AuthOAuthView to explicitly ensure the session is committed before redirecting.
The fix:

1. Created providers/fab/src/airflow/providers/fab/auth_manager/views/auth_oauth.py
   with CustomAuthOAuthView class
2. Override oauth_authorized() method to mark session.modified = True after
   parent's OAuth callback handling completes
3. Updated security_manager/override.py to use CustomAuthOAuthView instead of
   the default AuthOAuthView

This ensures Flask's session interface saves the session via the after_request
handler before the HTTP redirect response is sent to the client, eliminating
the race condition.

The fix addresses the root cause as suggested by maintainer feedback on
PR apache#58037, rather than masking the error in the UI.

Testing:
- Syntax validated with py_compile
- Works with both session backends (database and securecookie)
- Maintains backward compatibility with existing OAuth flows

Related Issues:
- apache#55612 - Airflow UI initial XHR returns 401 before session cookie is set
- apache#57534 - Airflow 3.1.1 oauth login failure
- apache#57485 - Airflow 3.1.1 oauth login broken
- PR apache#58037 - Previous UI-based workaround attempt (closed)

Signed-off-by: Jgprog117 <gustafsonjosef@gmail.com>

* Fix logging to use %-formatting instead of f-strings

* Add tests for CustomAuthOAuthView

* Fix linting and formatting issues in OAuth session race condition fix

Remove unused imports, fix import ordering, and apply ruff formatting:
- Remove unused pytest import from test_auth_oauth.py
- Remove unused AuthOAuthView import from override.py
- Fix import ordering to comply with ruff formatting rules
- Apply ruff format to test file

* Address PR review feedback from SameerMesiah97

- Remove redundant if/else branching that did the same thing in both paths
- Fix misleading "completed successfully" log message to neutral wording
- Replace brittle __class__.__bases__[0] mocking with explicit AuthOAuthView
- Consolidate duplicate backend tests into a single parametrized test

* Fix test RuntimeError by avoiding Flask session LocalProxy access

Use mock.patch with new= as context manager instead of decorator to
prevent mock from inspecting the Flask session LocalProxy, which
requires an active request context.

---------

Signed-off-by: Jgprog117 <gustafsonjosef@gmail.com>
@vincbeck
Copy link
Contributor

This PR might have introduced a bug, can you please take a look at #62028?

choo121600 pushed a commit to choo121600/airflow that referenced this pull request Feb 22, 2026
apache#61287)

* Fix OAuth session race condition causing false 401 errors during login

Fixes apache#57981

When users authenticate via Azure OAuth SSO (and other OAuth providers),
the UI briefly displays an authentication error message during the OAuth
redirect flow. The error appears for approximately 1 second before
disappearing once authentication successfully completes.

Root Cause:
The issue stems from a race condition during the OAuth authentication flow.
After the OAuth callback completes and the user is authenticated, the Flask
session containing OAuth tokens and user data may not be fully committed to
the session backend (cookie or database) before the redirect response is sent
to the client. When the UI loads and immediately makes API requests (like
/ui/config), these requests arrive before the session is available, causing
temporary 401 Unauthorized errors.

Solution:
This commit introduces a CustomAuthOAuthView that extends Flask-AppBuilder's
AuthOAuthView to explicitly ensure the session is committed before redirecting.
The fix:

1. Created providers/fab/src/airflow/providers/fab/auth_manager/views/auth_oauth.py
   with CustomAuthOAuthView class
2. Override oauth_authorized() method to mark session.modified = True after
   parent's OAuth callback handling completes
3. Updated security_manager/override.py to use CustomAuthOAuthView instead of
   the default AuthOAuthView

This ensures Flask's session interface saves the session via the after_request
handler before the HTTP redirect response is sent to the client, eliminating
the race condition.

The fix addresses the root cause as suggested by maintainer feedback on
PR apache#58037, rather than masking the error in the UI.

Testing:
- Syntax validated with py_compile
- Works with both session backends (database and securecookie)
- Maintains backward compatibility with existing OAuth flows

Related Issues:
- apache#55612 - Airflow UI initial XHR returns 401 before session cookie is set
- apache#57534 - Airflow 3.1.1 oauth login failure
- apache#57485 - Airflow 3.1.1 oauth login broken
- PR apache#58037 - Previous UI-based workaround attempt (closed)

Signed-off-by: Jgprog117 <gustafsonjosef@gmail.com>

* Fix logging to use %-formatting instead of f-strings

* Add tests for CustomAuthOAuthView

* Fix linting and formatting issues in OAuth session race condition fix

Remove unused imports, fix import ordering, and apply ruff formatting:
- Remove unused pytest import from test_auth_oauth.py
- Remove unused AuthOAuthView import from override.py
- Fix import ordering to comply with ruff formatting rules
- Apply ruff format to test file

* Address PR review feedback from SameerMesiah97

- Remove redundant if/else branching that did the same thing in both paths
- Fix misleading "completed successfully" log message to neutral wording
- Replace brittle __class__.__bases__[0] mocking with explicit AuthOAuthView
- Consolidate duplicate backend tests into a single parametrized test

* Fix test RuntimeError by avoiding Flask session LocalProxy access

Use mock.patch with new= as context manager instead of decorator to
prevent mock from inspecting the Flask session LocalProxy, which
requires an active request context.

---------

Signed-off-by: Jgprog117 <gustafsonjosef@gmail.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Login delay causes false authentication error messages on UI Airflow >=3.1.1

3 participants