Bug 2052644 - Infinite OAuth redirect loop post-upgrade to 4.10.0-rc.1
Summary: Infinite OAuth redirect loop post-upgrade to 4.10.0-rc.1
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: OpenShift Container Platform
Classification: Red Hat
Component: Management Console
Version: 4.10
Hardware: Unspecified
OS: Unspecified
unspecified
urgent
Target Milestone: ---
: 4.10.0
Assignee: Jon Jackson
QA Contact: Yadan Pei
URL:
Whiteboard:
: 2049814 (view as bug list)
Depends On: 2052095
Blocks:
TreeView+ depends on / blocked
 
Reported: 2022-02-09 17:24 UTC by OpenShift BugZilla Robot
Modified: 2022-04-14 15:08 UTC (History)
6 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2022-03-12 04:42:06 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Github openshift console pull 11018 0 None open [release-4.10] Bug 2052644: Fix auth redirect loop caused by duplicate state-token cookie 2022-02-09 17:25:05 UTC
Red Hat Product Errata RHSA-2022:0056 0 None None None 2022-03-12 04:42:24 UTC

Comment 2 Yanping Zhang 2022-02-10 10:11:07 UTC
Steps to verifiy:
1. Launch 4.9.19 cluster. Login web console, keep console page open.
2. Upgrade the cluster to 4.10.0-0.nightly-2022-02-10-062935
3. Go back on console page, logout, and try login again, could login successfully now.
The bug is fixed.

Comment 5 errata-xmlrpc 2022-03-12 04:42:06 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Moderate: OpenShift Container Platform 4.10.3 security update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHSA-2022:0056

Comment 6 Jon Jackson 2022-04-14 15:08:41 UTC
*** Bug 2049814 has been marked as a duplicate of this bug. ***


Note You need to log in before you can comment on or make changes to this bug.