Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

oauth/kratos/self-service/login/browser response 400 #1120

Open
dragonTour opened this issue Mar 29, 2023 · 8 comments
Open

oauth/kratos/self-service/login/browser response 400 #1120

dragonTour opened this issue Mar 29, 2023 · 8 comments

Comments

@dragonTour
Copy link

**Describe **

[root@xxx~]# kubectl get po -n plc
NAME                                       READY   STATUS    RESTARTS        AGE
api-server-699f874c78-xwhbg                1/1     Running   0               5m1s
artifact-tracker-server-7994d496fd-jz9t2   1/1     Running   0               5m1s
auth-server-86887f8c4c-g78b2               1/1     Running   0               5m1s
cloud-proxy-686cd6d5d4-zqs8q               2/2     Running   0               5m
config-manager-server-5979b8b6b5-b2smq     1/1     Running   0               5m
cron-script-server-7dd548cd97-s9kd7        1/1     Running   3 (4m3s ago)    5m
hydra-6c76c6b44c-hx24p                     2/2     Running   0               4m59s
indexer-server-59f4bdd4b-v5wmc             1/1     Running   2 (3m49s ago)   4m59s
kratos-6f6bd87774-5fbhl                    2/2     Running   0               4m59s
metrics-server-67569d59b5-zgx42            1/1     Running   0               4m59s
pl-elastic-es-data-0                       1/1     Running   0               156m
pl-elastic-es-master-0                     1/1     Running   0               156m
pl-elastic-es-master-1                     1/1     Running   0               156m
pl-nats-0                                  1/1     Running   0               156m
pl-nats-1                                  1/1     Running   0               156m
pl-nats-2                                  1/1     Running   0               156m
plugin-server-7996bc6557-srn9x             1/1     Running   0               4m58s
postgres-6f75677777-dn8wj                  1/1     Running   0               156m
profile-server-85887b9d76-qx8d9            1/1     Running   0               12s
project-manager-server-584c48bd77-js5rj    1/1     Running   3 (4m ago)      4m58s
scriptmgr-server-854f4d6c76-dbbcd          1/1     Running   0               4m57s
vzconn-server-758d8bb49d-mt4h9             1/1     Running   0               4m57s
vzmgr-server-65db5fc5c5-d877l              1/1     Running   3 (3m56s ago)   4m56s

all pods are ready
image

click login ,then response 400, cannot jump to the login page
image

cloud version: latest

@yantingqiu
Copy link

I had the same problem. Navigate to dev.withpixie.dev requests https://work.dev.withpixie.dev/api/authorized and return "failed to fetch token - unauthenticated". Meanwhile,click login ,then response 401, cannot jump to the login page

aimichelle pushed a commit that referenced this issue Apr 6, 2023
…anager (#1188)

Summary: Add `access-tls-socket-fd-via-syscall` feature flag to cloud
config manager

This feature flag will be used to opt internal clusters into the new tls
tracing implementation developed in #1120. We may want a more
sophisticated toggle for gradually opting in more clusters, but this
will suffice for the initial set of testing (validating some hand picked
clusters).

Relevant Issues: #692

Type of change: /kind feature

Test Plan: Verified the following:
- [x] Deploying a new pixie install without launch darkly credentials
results in the default, `false`, value
([P354](https://phab.corp.pixielabs.ai/P354))
- [x] Deploying a new pixie install with a cloud with launch darkly
credentials results in a `true` value
([P355](https://phab.corp.pixielabs.ai/P355))

Signed-off-by: Dom Del Nano <ddelnano@pixielabs.ai>
ddelnano added a commit to ddelnano/pixie that referenced this issue May 1, 2023
…anager (pixie-io#1188)

Summary: Add `access-tls-socket-fd-via-syscall` feature flag to cloud
config manager

This feature flag will be used to opt internal clusters into the new tls
tracing implementation developed in pixie-io#1120. We may want a more
sophisticated toggle for gradually opting in more clusters, but this
will suffice for the initial set of testing (validating some hand picked
clusters).

Relevant Issues: pixie-io#692

Type of change: /kind feature

Test Plan: Verified the following:
- [x] Deploying a new pixie install without launch darkly credentials
results in the default, `false`, value
([P354](https://phab.corp.pixielabs.ai/P354))
- [x] Deploying a new pixie install with a cloud with launch darkly
credentials results in a `true` value
([P355](https://phab.corp.pixielabs.ai/P355))

Signed-off-by: Dom Del Nano <ddelnano@pixielabs.ai>
@rex422
Copy link

rex422 commented Jul 24, 2023

I also encountered the same problem, about the response 400 error, did you find the reason for this part?

@tanjunchen
Copy link

@dragonTour @yantingqiu I have the same question, do you have fixed it?

@aakosarev
Copy link

@dragonTour @yantingqiu I have the same question, do you have fixed it?

I have the same problem. Did you manage to solve it?

@aakosarev
Copy link

I also encountered the same problem, about the response 400 error, did you find the reason for this part?

Hello! Did you manage to solve the problem?

@yuval0499
Copy link

Hey! I also encountered the same problem.
Any progress to solve this behavior ?

@aakosarev
Copy link

aakosarev commented Oct 30, 2023 via email

@zhxiaohe
Copy link

zhxiaohe commented Apr 1, 2024

@aakosarev @yuval0499 @tanjunchen edit kratos deployment: oryd/kratos:v0.10.1 to oryd/kratos:latest

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

7 participants