-
Notifications
You must be signed in to change notification settings - Fork 57
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
v0.10.4 seems not to access properly the secrets #290
Comments
I think this error points to authelia treating the value of your base64 encoded hash as the secret (in plaintext) which is why its complaining. I would avoid encoding the values that are in the manifest since K8s will base64 encode them anyways. As far as the format of the file, here is what mine looks like (truncated) apiVersion: v1
kind: Secret
metadata:
name: authelia
namespace: authelia
labels:
app.kubernetes.io/managed-by: Helm
annotations:
meta.helm.sh/release-name: authelia
meta.helm.sh/release-namespace: authelia
type: Opaque
stringData:
LDAP_PASSWORD: >-
this_is_a_really_good_password
STORAGE_PASSWORD: >-
this_is_another_really_good_password
SOME_CLIENT_SECRET: >-
$pbkdf2-sha512$310000$wowLookAtThisAmazingSaltAndHashOfTheProperLength
A_COOL_PRIVATE_KEY: |
-----BEGIN PRIVATE KEY-----
this_is_obviously_a_valid_private_key...
-----END PRIVATE KEY----- |
Yep, when you use |
@Crowley723 @james-d-elliott Thank you for your answers. However, as reported (and I have just checked it again, to be sure), if I am using the non base64-encoded string like:
the error I get then is:
|
Ok, figured out what was wrong: I was generating a standard base64 secret, as opposed to a bcrypt-base64 variant. The moment this secret has been properly generated, all has started to work. Thank you! |
I am defining the secrets on a k8s manifest:
Then, in authelia config file, I am including this secret:
Finally, I am using this secret when declaring the oidc clients:
The error I am getting when authelia gets initialised is:
I have a number of questions, but I do not know to whom should be pointed:
meaning that is decoding it once, and tries to decode it a second time. I assume that the reason the "stringData" works is that I am passing it encoded, and stringData encodes it a second time.
2. Using stringData, with a base64-encoded input, and pointing the path field to the secret, complains about having client_secret as plain text. This seems to suggest that it has decoded it only once and does not see it has the format of a hashed password.
Or am I doing something seriously wrong?
The text was updated successfully, but these errors were encountered: