-
Notifications
You must be signed in to change notification settings - Fork 62
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
JWT validation fails after EKS OIDC provider's key rotation #181
Comments
Hi, @nomatterz. Thanks for reporting this issue. The auth-jwt plugin should handle key rotation without problem. The JWT validation code uses https://github.com/coreos/go-oidc/blob/v3/oidc/jwks.go#L97-L131 under the hood, which refreshes its cached keys from the remote JWKS if it cannot find a It would be helpful if you could provide any other important details related to AWS EKS and how the auth-jwt plugin is being used in the environment. That would be helpful to try to reproduce the issue. Thanks! |
Hi @austingebauer
I've configured jwt auth method in vault for specific eks cluster:
I'm using banzaicloud mutating webhook for authenticating to vault, getting token and fetching secrets (https://banzaicloud.com/docs/bank-vaults/mutating-webhook/)
after initial configuration everything works fine. But after some time (I suspect OIDC provider rotates keys) i receive error
With no logs output regarding this fail in vault itself. After auth method disabling and reconfiguration everything works fine again. |
I'm using AWS EKS(1.21) with external Vault(1.7.2).
I've configured jwt auth method in Vault:
Everything works fine until OIDC provider rotates keys.
after rotation i'm getting error while login to Vault
After disabling and reconfiguring (with exactly the same parameters) auth method in Vault this is fixed immediately.
Is there a way to handle this key rotation automatically by auth-jwt plugin itself without manual reconfiguration?
The text was updated successfully, but these errors were encountered: