Bug 1826990
Summary: | HTTP/2 frontend support breaks oauth flow | ||
---|---|---|---|
Product: | OpenShift Container Platform | Reporter: | Miciah Dashiel Butler Masters <mmasters> |
Component: | Networking | Assignee: | Miciah Dashiel Butler Masters <mmasters> |
Networking sub component: | router | QA Contact: | Hongan Li <hongli> |
Status: | CLOSED ERRATA | Docs Contact: | |
Severity: | high | ||
Priority: | high | CC: | amcdermo, aos-bugs, bparees, deads, dhansen, hongli, jeder, mmasters, nmalik, sdodson, slaznick, sttts, wking |
Version: | 4.4 | Keywords: | ServiceDeliveryBlocker |
Target Milestone: | --- | ||
Target Release: | 4.4.0 | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: | Story Points: | --- | |
Clone Of: | 1825354 | Environment: | |
Last Closed: | 2020-05-04 11:50:00 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1825354 | ||
Bug Blocks: | 1826992 |
Description
Miciah Dashiel Butler Masters
2020-04-22 23:55:07 UTC
*** Bug 1826992 has been marked as a duplicate of this bug. *** Miciah, Can you please answer the questions outlined on the bug this was cloned from, see https://bugzilla.redhat.com/show_bug.cgi?id=1825354#c3 Who is impacted? Customers running 4.5. What is the impact? Browsers that use HTTP/2 and perform aggressive connection coalescing may re-use a previous connection to one route to connect to a different route if the two routes use the same certificate. In particular, this may break the OAuth flow from OpenShift Console, which both use the default certificate. How involved is remediation? A user can wait 30 seconds for keepalive connections to timeout and then retry, or use a browser that does not perform aggressive connection coalescing. Is this a regression? Yes, the issue is caused by HTTP/2 support that was enabled in 4.4. Sorry, I mixed up my Bugzilla reports (we swapped target releases on this bug and bug 1825354 after I opened this one). "Customers running 4.5" should be replaced with "Customers running 4.4". Following is the corrected text: Who is impacted? Customers running 4.4. What is the impact? Browsers that use HTTP/2 and perform aggressive connection coalescing may re-use a previous connection to one route to connect to a different route if the two routes use the same certificate. In particular, this may break the OAuth flow from OpenShift Console, which both use the default certificate. How involved is remediation? A user can wait 30 seconds for keepalive connections to timeout and then retry, or use a browser that does not perform aggressive connection coalescing. Is this a regression? Yes, the issue is caused by HTTP/2 support that was enabled in 4.4. Verified with upgrade from 4.3.12 to 4.4.0-0.nightly-2020-04-25-191512 and issue has been fixed. follow below steps and the console, prometheus, grafana UI are all accessible after upgrade. Steps to Reproduce: 1. Create 4.3.12 cluster. 2. Apply OAuth templates 3. Wait for authentication to finish processing the oauth changes 4. Remove OAuth templates 5. Wait for authentication to finish processing the oauth changes 6. Upgrade to 4.4.0-0.nightly-2020-04-25-191512 And the routes are still using HTTP/1.1 after upgrade: $ curl https://console-openshift-console.apps.hongli-bv.qe.devcluster.openshift.com -k -I HTTP/1.1 200 OK $ curl https://oauth-openshift.apps.hongli-bv.qe.devcluster.openshift.com -k -I HTTP/1.1 403 Forbidden Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2020:0581 |