-
Notifications
You must be signed in to change notification settings - Fork 233
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Problem with 2.222.1 LTS release #303
Comments
Additional info about LDAP config and role-based authz with 2.222.1. Looks like the JCasC configuration scripts were not applied at all, and it is still back to default auth/authz, that explains why you cannot login with LDAP creds. I am able to login with operator creds. I think communication from operator to cr is completely broken with the new release. |
We need to get a crumb issued first and then call the generateNewToken endpoint to get the token. So initially call
followed by
I am going to give a shot at fixing this issue. |
Tested with curl requests and I am able to generate a token...
|
So we have to use https://golang.org/pkg/net/http/cookiejar/ here https://github.com/jenkinsci/kubernetes-operator/blob/master/pkg/controller/jenkins/client/jenkins.go#L153 by default and it should work for both use cases. |
Hi @apogrebnyak |
@jakalkhalili: As stated here #305 (comment) it will be fixed in 0.4.0. |
After upgrading to 2.222.1 LTS image, I see a lot of warnings like this:
I saw there was a CVE for previous LTS version (2.204.5). I think this is the result of that CVE fix.
Currently I am able to login into the Jenkins CR when running with default Security Realm and Authorization. However, when switching to LDAP and Role-based Strategy I can no longer log in.
The identical setup works fine with 2.204.5.
The text was updated successfully, but these errors were encountered: