-
Notifications
You must be signed in to change notification settings - Fork 5.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
WebUI PKCE auth flow not working as expected in v2.9 #16592
Comments
If I understood correct, the error should be explanatory that PKCE is not supported by IDP? |
@Marvin9 The error of the IDP only happens when you checkout the master branch, but if you checkout the v2.9.3 you get the error shown at the end of the post, therefore it seems that argo isn't attempting using PKCE flow. |
No.. The error The issue here is that PKCE auth flow only works on the master branch, not if you checkout any if the
Correct. |
Correct. This feature won't be released until Monday, with 2.10.0-rc1. |
@crenshaw-dev |
@Kerwood the number of commits was so high that it broke GitHub's release not generation tool, so I used my own script. My script sucks, and I haven't had time to fix either it or the list it generated. 😛 |
That explains it. |
Not a good way. I usually look at the merge date and compare it to the release date of rc-1 releases. |
We have the PKCE flow working with Azure with other applications (like kubectl and various other mobile/Javascript applications) ... Is there a workaround for ... Keep in mind that the PKCE flow does not actually work with Azure, because Azure is non-compliant with RFC8414 and the /.well-known/openid-configuration endpoint is missing the code_challenge_methods_supported property. But that is another issue. I have hit the Authorization Server does not support S256 code challenge method blocker. For reference: |
@michael-basil |
Describe the bug
tldr; The PKCE auth flow only works if you checkout the master branch and not on any of the
v2.9.*
tags.In the v2.9.0 release, @Marvin9 added support for using authorization code flow with PKCE in the webUI ❤️ , which is lovely.
Unfortunately it does not seem to work in
v2.9.*
as expected.If I clone the
argo-cd
repo and start a local instance from themaster
branch it works as expected. But if I check out any if thev2.9.*
tags and run it locally again, the PKCE auth flow is not utilized.I think the "if" statement here does not validate the
enablePKCEAuthentication
config correctly for some reason.Below is the config I am using for my local instance.
Keep in mind that the PKCE flow does not actually work with Azure, because Azure is non-compliant with RFC8414 and the
/.well-known/openid-configuration
endpoint is missing thecode_challenge_methods_supported
property. But that is another issue.With above config, running argocd locally with the
make start
command, on themaster
branch, the PKCE auth flow is triggered and you should see below error if using Azure as an IDP.If I do a
git checkout v2.9.3
and start up argocd again, it will use the auth code flow without PKCE and in my case Azure will provide the following error, because it was expecting the PKCE flow.The text was updated successfully, but these errors were encountered: