<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Special Cases on Quollix</title><link>https://quollix.org/docs/community/developer-guides/quallix/special-cases/</link><description>Recent content in Special Cases on Quollix</description><generator>Hugo</generator><language>en-us</language><atom:link href="https://quollix.org/docs/community/developer-guides/quallix/special-cases/index.xml" rel="self" type="application/rss+xml"/><item><title>'NETWORK_CHANGED' error and 'TypeError: Failed to fetch'</title><link>https://quollix.org/docs/community/developer-guides/quallix/special-cases/network-changed-error/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://quollix.org/docs/community/developer-guides/quallix/special-cases/network-changed-error/</guid><description>&lt;p&gt;During some operations such as starting an app, browsers may report a &lt;code&gt;NETWORK_CHANGED&lt;/code&gt; or &lt;code&gt;TypeError: Failed to fetch&lt;/code&gt; error. This is expected behavior and does not indicate a failed operation.&lt;/p&gt;
&lt;h2 id="why-this-happens"&gt;Why this happens&lt;/h2&gt;
&lt;p&gt;Quollix runs inside a Docker container and dynamically connects to and disconnects from app-specific Docker networks during certain operations. If a browser request is in flight while Docker reconfigures the container’s network, the browser may abort the request and report one of the above errors, even though the backend operation completes successfully.&lt;/p&gt;</description></item><item><title>OpenCloud integration issues</title><link>https://quollix.org/docs/community/developer-guides/quallix/special-cases/opencloud-integration-issues/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://quollix.org/docs/community/developer-guides/quallix/special-cases/opencloud-integration-issues/</guid><description>&lt;p&gt;Quollix acts as the reverse proxy in front of OpenCloud. OpenCloud uses a mandatory OpenID Connect (OIDC) authentication flow. Even when using local users (IDM), OpenCloud always authenticates via its internal OIDC provider. Because of this, OpenCloud must be able to reach its own OIDC discovery endpoint at the URL defined by &lt;code&gt;OC_URL&lt;/code&gt;.&lt;/p&gt;
&lt;p&gt;During authentication, OpenCloud performs OIDC discovery and token validation requests from its own container to the URL defined by &lt;code&gt;OC_URL&lt;/code&gt;. These requests are routed through the reverse proxy (Quollix) and then forwarded back to the OpenCloud service itself. This internal request loop only happens during authentication, but it is the source of most issues in local, containerized setups.&lt;/p&gt;</description></item></channel></rss>