You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Describe the bug
Hi, I'm setting up a private ingress and I'd like to protect it with Google OIDC.
The ingress is protected with the Public Hosted zone certificate.
I've followed this guide. When I try to connect though, the server blocks here with an error 500.
I'm sure the error isn't returned by the application I'm creating the ingress for, also I've checked hundred times the secret, it is correctly set up with the keys clientID and clientSecret.
Expected outcome
Proceed safely authenticated, without Error 500.
Some of you might say that this error is the same of this one: #2819
But when I try to set the secret values as base64 (without considering that Kubernetes itself already encodes them as base64), I get another issue. During the authentication I get redirected here:
I've checked a lot of times not to include any space or new line in the base64 encoding, I'm currently transforming them with the following command, where xc and xp are aliases to xclip. (Also verified that by double checking with an online base64 encoder decoder) echo -n $(xp) | base64 -w 0 | xc
The text was updated successfully, but these errors were encountered:
Hey @LucaSoato , Thanks for bringing this to our attention. This looks like a bug and we will take a look. Meanwhile, could you please try to upgrade the controller version to v2.10.1 to see if its still and issue?
Hi @shraddhabang, I can confirm that the error persists even in the latest version.
I'm sure it upgraded because we also met the no identity-based policy allows the elasticloadbalancing:DescribeListenerAttributes action error (that we already solved by extending the policy).
LucaSoato
changed the title
AWD Load Balancer Controller + Google OIDC ---> Error 500
AWS Load Balancer Controller + Google OIDC ---> Error 500
Nov 28, 2024
Describe the bug
Hi, I'm setting up a private ingress and I'd like to protect it with Google OIDC.
The ingress is protected with the Public Hosted zone certificate.
I've followed this guide. When I try to connect though, the server blocks here with an error 500.
I'm sure the error isn't returned by the application I'm creating the ingress for, also I've checked hundred times the secret, it is correctly set up with the keys
clientID
andclientSecret
.Expected outcome
Proceed safely authenticated, without Error 500.
Environment
Additional Context:
Some of you might say that this error is the same of this one: #2819
But when I try to set the secret values as base64 (without considering that Kubernetes itself already encodes them as base64), I get another issue. During the authentication I get redirected here:
https://accounts.google.com/signin/oauth/error/v2?authError=&client_id=<The client id here is BASE64 Encoded while it shouldn't be>&flowName=GeneralOAuthFlow
I've checked a lot of times not to include any space or new line in the base64 encoding, I'm currently transforming them with the following command, where xc and xp are aliases to xclip. (Also verified that by double checking with an online base64 encoder decoder)
echo -n $(xp) | base64 -w 0 | xc
The text was updated successfully, but these errors were encountered: