-
Notifications
You must be signed in to change notification settings - Fork 3.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
token not valid for running mode
after SSO authentication
#4991
Comments
Did you also add |
Yes I did. Below is the yaml for argo-server. Application goes through the entire SSO authentication successfully but fails to run after that. Can you also confirm if using JWT token doesnt impact in anyway since argo document says it uses JWE. apiVersion: apps/v1
kind: Deployment
metadata:
name: argo-server
spec:
selector:
matchLabels:
app: argo-server
template:
metadata:
labels:
app: argo-server
spec:
containers:
- args:
- server
- --namespaced
- --auth-mode
- sso
image: argoproj/argocli:v2.12.3
name: argo-server
ports:
- containerPort: 2746
name: web
readinessProbe:
httpGet:
path: /
port: 2746
scheme: HTTP
initialDelaySeconds: 10
periodSeconds: 20
nodeSelector:
kubernetes.io/os: linux
serviceAccountName: argo-server |
It does not make sense to have groups without RBAC enabled. Groups are only used for RBAC. scopes:
- groups
- email
rbac:
enabled: true |
I tried this but same issue. |
Possibly fixed by: #4735 Please try upgrading |
Upgrded to 2.12.8 but that didnt work
I tried |
Have you tried private browsing mode yet? |
Yes I have. same issue. |
Any chance you are using istio with argo? I saw this same behavior when running argo with istio. The fix was to add an annotation for the argo server deployment spec to exclude the kubernetes api IP range from being handled by istio. EG spec:
selector:
matchLabels:
app: argo-server
template:
metadata:
labels:
app: argo-server
annotations:
sidecar.istio.io/inject: "true"
traffic.sidecar.istio.io/excludeOutboundIPRanges: yourk8api/32 The idea for this came from experience with other istio race condition issues outlined in 1282. If you are using ssl termination this may help eliminate the login issues. @simster7 this might be of interest. |
I'm also having problems getting service account bearier tokens working with Behaviour I would like is real users using SSO to login, but also supporting ServiceAccounts with Bearer tokens for service-to-service API calls. |
Is there any solution to this ? |
I think there are mixed problem in this issue. Maybe raise a new issue if you’re having problems. You should be able to use multiple auth modes. |
@Deepa050 Did you find a solution to this? We're facing the same problem on version 3.0.1 with SSO via argocd/dex. |
Alright - I think I just got lucky and found the problem. I assume you copied the credentials from the "Using Your Login With The CLI" dialogue in the UI. If I do that, for the token it does this:
if I remove the inner quotes it works:
|
@mruoss would you like to sumbit a PR to fix this mistake? |
closes argoproj#4991 Signed-off-by: Michael Ruoss <michael.ruoss@ufirstgroup.com>
@Deepa050 any updates? Have you resolved the issue? Even with |
@gardnerdev Did you try using the button on "Using Your Login With The CLI" on the user page in the web UI? It copies all the necessary commands to your clipboard. |
@mruoss the issue is about:
why should I use CLI? |
oh right. I thought this was about using the CLI. Sorry. |
@alexec any advise how to debug this issue? |
Just FYI, the solution for us was to ensure we were specifying both SSO and Client with the server configuration: Hopefully this helps someone else :) |
missing
|
Improved the docs and error message in #11300 |
token not valid for running mode
after SSO authentication
Summary
Argo UI comes back to login page with error
{"code":16,"message":"token not valid for running mode”}
after completing SSO user authentication.Diagnostics
I have added sso configuration in the config map "workflow-controller-configmap"
I have added the required secrets for SSO and also starting argo-server in "--auth-mode sso"
argo-server logs :
Please note we use JWT token for SSO and not JWE.
Message from the maintainers:
Impacted by this bug? Give it a 👍. We prioritise the issues with the most 👍.
The text was updated successfully, but these errors were encountered: