You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
OAuth2 token validation fails due to the assertion !now.isBefore(issuedAt) where issuedAt rounded to have no milliseconds, but now has millseconds and nanoseconds.
There have been multiple cases for us where clock skew caused failures aswell.
This time we experienced a situation where synchronizing the clocks did not work and the only solution was to forward the local connector's clock artificially. This, however, is not a solution for production, as all our connectors run in AKS nodes.
Expected Behavior
The token validation should have 1-5s leeway to account for clock skew.
This has already resulted in a case where one of two connector running on the same Azure AKS cluster, but on different nodes with a minimal time difference of about ~200-300 ms, failed to retrieve the catalog of the other connector. The rejection of the token comes from the MIW, but it's (very probably) the exact same issue.
We would also like to offer contributing code for this. We have been looking into this process, and we'd love to move forward to being able to contribute to the Eclipse EDC in meaningful ways, where it would make sense. If that would be fine with you.
We would also like to offer contributing code for this. We have been looking into this process, and we'd love to move forward to being able to contribute to the Eclipse EDC in meaningful ways, where it would make sense. If that would be fine with you.
Contributions are always welcome. Please post a solution proposal that includes a configurable not-before leeway or a targetted PR that does this.
Bug Report
Describe the Bug
OAuth2 token validation fails due to the assertion
!now.isBefore(issuedAt)
whereissuedAt
rounded to have no milliseconds, butnow
has millseconds and nanoseconds.There have been multiple cases for us where clock skew caused failures aswell.
This time we experienced a situation where synchronizing the clocks did not work and the only solution was to forward the local connector's clock artificially. This, however, is not a solution for production, as all our connectors run in AKS nodes.
Expected Behavior
Observed Behavior
Steps to Reproduce
Context Information
Detailed Description
Oauth2ExpirationIssuedAtValidationRule
Possible Implementation
Oauth2ExpirationIssuedAtValidationRule
to account for clock skew between the DAPS and connectorsThe text was updated successfully, but these errors were encountered: