-
Notifications
You must be signed in to change notification settings - Fork 184
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Error redeeming authorization code #102
Comments
in that log the sso-proxy is trying to redeem from the sso-auth at this address the host names of the |
@danbf Thank you for your answer. I checked your mentioned environment variables and I saw they were all equal, except the "HOST" environment variable, which was missing the What else could be wrong? The log message itself is unfortunately not really helpful. |
@weeco sorry i was not clearer. sso/quickstart/kubernetes/sso-auth-deployment.yml Lines 31 to 32 in 6db5495
trying to think up the rest of the reasons why a 403 would be returned. can you tell me a bit more about your k8 setup, is it AWS like the blog https://medium.com/@while1eq1/single-sign-on-for-internal-apps-in-kubernetes-using-google-oauth-sso-2386a34bc433 . and it's probably better to use your real domains substituting for the |
Hmm accordingly my I am running it inside of a Gcloud Kubernetes Cluster. I wrote my own Helm chart which is indeed based on the kubernetes config given in the medium article. The SSO auth and proxy are sitting in it's own namespace (ingress), while the protected backend service sits in another namespace (monitoring). Since we don't have log messages which tell us what is wrong, what could I do so that we can investigate the problem? Should I copy all the kubernetes configs where I'll redact stuff like the actual domains? Edit: Specifically I am surprised that the error message thrown in the SSO proxy |
when i saw something like this, it was a 404 and it was the sso-auth not getting an expected host header, #88 (comment) which is fixed in sso/internal/proxy/providers/sso.go Line 113 in af20521
since sso-auth doesn't seem to produce a 403, https://github.com/buzzfeed/sso/search?q=403&unscoped_q=403 , i'm thinking it's the |
and i see there is an issue already for this; #44 |
Ok I'll tomorrow post the kubernetes config. #44 is about creating a general helm chart, however I have created a kubernetes chart for our specific needs. But I reviewed the official helm chart and gave me input there as well. |
Ok I figured it out. You were right, it was the ingress controller. We have configured the ingress controller to set a default whitelist source IP range if no whitelist is specified. So that was totally my fault. One could add some advanced topics in the medium article which describes how to create two seperate ingresses (one for the proxy and one for the oauth container) so that you can specify a whitelist for those who are allowed to authenticate and another ingress with a global whitelist, so that the Google OAuth callback reaches your container. Thanks for all the suppport! |
i added in a split dns support for sorta what you are talking about in #88 , we have an internal to-do to setup a kubernetes quickstart where we could include stuff like this. the issues you brought up i think will help with that. |
Just wanted to comment on this as well after working through it. Our issue ended up being similar. We currently have security groups to prevent access to our nodes. So our proxy was hitting the following. Using
|
Oh also |
I just setup the SSO auth, but I get an internal server error after I chose my google account:
The SSO proxy log says:
What is this error message supposed to tell me and how can I fix it?
error redeeming authorization code
In the SSO auth container I only see a few 302 redirects, but no error messages or warnings.
The text was updated successfully, but these errors were encountered: