Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Pinniped CLI is hiding an error during login to an OIDC provider #1566

Closed
cfryanr opened this issue Jun 29, 2023 · 0 comments
Closed

Pinniped CLI is hiding an error during login to an OIDC provider #1566

cfryanr opened this issue Jun 29, 2023 · 0 comments
Assignees
Labels
bug Something isn't working good first issue Good for newcomers state/accepted All done!

Comments

@cfryanr
Copy link
Member

cfryanr commented Jun 29, 2023

What happened?

See https://kubernetes.slack.com/archives/C01BW364RJA/p1687991154864069?thread_ts=1687985547.285319&cid=C01BW364RJA. This community user was trying to configure the CLI to use an OIDC identity provider without using the Pinniped Supervisor. They were using Azure AD as the OIDC identity provider, although this problem is not specific to Azure AD.

When there is an error returned by the OIDC provider's token endpoint, the CLI does not show the details of the error to the user on this line: https://github.com/vmware-tanzu/pinniped/blob/v0.24.0/pkg/oidcclient/login.go#L941

This makes it hard for the user to debug the settings in their OIDC provider if they have configured the client wrong.

What did you expect to happen?

The text of the error could be shown.

What is the simplest way to reproduce this behavior?

Do something that will cause an error at the token endpoint. For example, configure the client to require client auth using a client secret. This should cause the token endpoint to return an error, because the Pinniped CLI will not send a client secret. That should reproduce the error being hidden from the CLI user.

In what environment did you see this bug?

  • Pinniped server version:
  • Pinniped client version:
  • Pinniped container image (if using a public container image):
  • Pinniped configuration (what IDP(s) are you using? what downstream credential minting mechanisms are you using?):
  • Kubernetes version (use kubectl version):
  • Kubernetes installer & version (e.g., kubeadm version):
  • Cloud provider or hardware configuration:
  • OS (e.g: cat /etc/os-release):
  • Kernel (e.g. uname -a):
  • Others:

What else is there to know about this bug?

@cfryanr cfryanr added the good first issue Good for newcomers label Jul 20, 2023
@pinniped-ci-bot pinniped-ci-bot added enhancement New feature or request priority/backlog Prioritized for an upcoming iteration bug Something isn't working and removed enhancement New feature or request labels Jul 20, 2023
@pinniped-ci-bot pinniped-ci-bot added the state/started Someone is working on it currently label Sep 25, 2023
@pinniped-ci-bot pinniped-ci-bot added state/finished Code finished but not yet delivered and removed state/started Someone is working on it currently labels Sep 25, 2023
@pinniped-ci-bot pinniped-ci-bot added state/delivered Ready for manual acceptance review and removed state/finished Code finished but not yet delivered labels Oct 5, 2023
@pinniped-ci-bot pinniped-ci-bot added state/accepted All done! and removed priority/backlog Prioritized for an upcoming iteration state/delivered Ready for manual acceptance review labels Oct 9, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Something isn't working good first issue Good for newcomers state/accepted All done!
Projects
None yet
Development

No branches or pull requests

2 participants