-
Notifications
You must be signed in to change notification settings - Fork 6
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[vault] unable to create provider #405
Comments
rewrite rule as alternative to solve this issue? |
rewrite rule not successfully either... |
hostname v2 and dynamic backend as next step |
I encountered an issue where Vault needed to resolve the Keycloak domain (keycloak.example.com) to an internal IP, but the domain points to an external IP. Here's how I solved it:
|
@Aladex |
several different types of solution tested, 2 options left. Both of them come with additional changes needed. Still working on it |
short description: A new issue occurred for necessary CA Cert for Vault OIDC connection - upbound/provider-vault#45, also there is another open issue, when oidc creation fails: upbound/provider-vault#25 so, currently oidc creation was disabled from crossplane and implemented in vault-initializer container. |
On kind Deployment only - following error occurs when configuring oidc provider via cmdline:
“unable to create provider: oidc: issuer did not match the issuer returned by provider” with keycloak idp
oidc_discovery_url=https://keycloak-127-0-0-1.nip.io/realms/sx-cnp-oss
2024-08-06T21:22:55.065Z [ERROR] auth.oidc.auth_oidc_28b6b006: error checking oidc discovery URL: error="error creating provider with given values: NewProvider: unable to create provider: Get "https://keycloak-127-0-0-1.nip.io/realms/sx-cnp-oss/.well-known/openid-configuration\": dial tcp 127.0.0.1:443: connect: connection refused"
oidc_discovery_url=http://keycloak-service.keycloak.svc.cluster.local:8080/realms/sx-cnp-oss
2024-08-06T21:36:42.019Z [ERROR] auth.oidc.auth_oidc_28b6b006: error checking oidc discovery URL: error="error creating provider with given values: NewProvider: unable to create provider: oidc: issuer did not match the issuer returned by provider, expected "http://keycloak-service.keycloak.svc.cluster.local:8080/realms/sx-cnp-oss\" got "https://keycloak-127-0-0-1.nip.io/realms/sx-cnp-oss\""
this is because of frontend_url defined in keycloak realm (which is needed for backstage oidc plugin)
Issues:
hashicorp/vault/issues/25024
https://discuss.hashicorp.com/t/unable-to-create-provider-oidc-issuer-did-not-match-the-issuer-returned-by-provider-with-keycloak-idp/61851
currently no Workaround after deployment via argo:
remove frontend url from Keycloak realm
add oidc config:
when re-add frontend url to keycloak
....
so for development backstage oidc login will not work so far...
The text was updated successfully, but these errors were encountered: