dosubot[bot] commented on issue #7928: URL: https://github.com/apache/incubator-devlake/issues/7928#issuecomment-2316284240
<!-- Answer --> To resolve the issue of the basic auth username/password pop-up still appearing after adding `oauth2-proxy`, you may need to ensure that the `oauth2-proxy` is correctly configured and that the old configurations are not interfering. Here are a few steps to troubleshoot and resolve this: 1. **Verify `oauth2-proxy` Configuration**: Ensure that the `oauth2-proxy` configuration is correct and that it is properly integrated with your OKTA settings. 2. **Check Ingress Configuration**: Make sure that your Ingress configuration is routing traffic through the `oauth2-proxy`. This typically involves updating the Ingress annotations to use `oauth2-proxy`. ```yaml apiVersion: networking.k8s.io/v1 kind: Ingress metadata: name: devlake-ingress annotations: nginx.ingress.kubernetes.io/auth-url: "https://<your-domain>/oauth2/auth" nginx.ingress.kubernetes.io/auth-signin: "https://<your-domain>/oauth2/start?rd=$request_uri" spec: rules: - host: <your-domain> http: paths: - path: / pathType: Prefix backend: service: name: devlake port: number: 80 ``` 3. **Delete and Recreate Pods**: If the configuration changes are not taking effect, you may need to delete the existing pods to ensure that the new configuration is applied. You can do this by deleting the pods, and Kubernetes will automatically recreate them with the updated configuration. ```shell kubectl delete pod -l app=devlake ``` 4. **Check Logs**: Check the logs of the `oauth2-proxy` and `devlake` pods to ensure that there are no errors and that the authentication flow is working as expected. ```shell kubectl logs <oauth2-proxy-pod-name> kubectl logs <devlake-pod-name> ``` 5. **Update Helm Chart**: Ensure that your Helm chart values are correctly set to use `oauth2-proxy`. Here is an example of what your `values.yaml` might look like: ```yaml authproxy: enabled: true image: quay.io/oauth2-proxy/oauth2-proxy:v7.4.0-amd64 env: - name: OAUTH2_PROXY_PROVIDER value: oidc - name: OAUTH2_PROXY_PROVIDER_DISPLAY_NAME value: OKTA - name: OAUTH2_PROXY_COOKIE_SECRET value: s3cr3tK3yTh4tIsV3ryS3cur3AndR4nd0m== - name: OAUTH2_PROXY_COOKIE_DOMAINS value: localhost:4180 - name: OAUTH2_PROXY_COOKIE_SECURE value: 'false' - name: OAUTH2_PROXY_EMAIL_DOMAINS value: '*' - name: OAUTH2_PROXY_OIDC_ISSUER_URL value: https://<your-okta-domain>/oauth2/default - name: OAUTH2_PROXY_CLIENT_ID value: <your-client-id> - name: OAUTH2_PROXY_CLIENT_SECRET value: <your-client-secret> - name: OAUTH2_PROXY_UPSTREAMS value: http://localhost:4000 - name: OAUTH2_PROXY_HTTP_ADDRESS value: http://0.0.0.0:4180 - name: OAUTH2_PROXY_REVERSE_PROXY value: 'true' - name: OAUTH2_PROXY_SKIP_AUTH_ROUTES value: ^/grafana.* ``` After making these changes, redeploy the Helm chart: ```shell helm upgrade devlake devlake/devlake --values values.yaml ``` By following these steps, you should be able to resolve the issue and ensure that the `oauth2-proxy` is correctly handling authentication. <!-- Dosu Comment Footer --> *To continue talking to [Dosu](https://dosu.dev), mention @dosu.* -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: dev-unsubscr...@devlake.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org