Closed farcaller closed 1 year ago
It looks like the OP_SESSION should be either a base64 string of the json (that is base64 inside of secret's base64) or a path to the json file.
That, at least, got me to
{"log_message":"(I) established incoming bus peer connection","timestamp":"2022-09-20T10:35:25.519162154Z","level":3}
but I'm still waiting for the web frontend to acknowledge the connect server's existence.
After sitting like that for 1 hour it still didn't progress. No new error messages in the logs (other than the health check).
I'm still waiting for the web frontend to acknowledge the connect server's existence.
Hey @farcaller. Thanks for bringing this to our attention. If by web front end, you mean 1Password.com, then that is expected behaviour until a request is made to the Connect server.
The credentials file contains encrypted credentials that are unlocked with the same bearer token that is used to authenticate a request. Therefore you won't see an update in 1Password.com until a valid request is sent to your Connect server.
If you're able to send a request to say, list the vaults, you should be able to confirm that it's working as expected and the tile in 1Password.com should update accordingly. 🙂
I was getting the exact same issue you were, and this was how I got it working (Im on mac, not sure if that matters or not):
1password-credentials.json
cat 1password-credentials.json | openssl base64 | tr -d '\n' | pbcopy
kubectl edit secret op-credentials
paste the following, important to note: I had to change data
to stringData
. Dont forget to paste your clipboard (the result of pbcopy
).
apiVersion: v1
stringData:
1password-credentials.json: PASTE_HERE
kind: Secret
metadata:
name: op-credentials
namespace: onepassword
type: Opaque
as for the token, I just did the following (note: no base64 encoding required):
kubectl create secret generic onepassword-token --from-literal=token=YOUR_NONBASE64ENCODED_TOKEN
It looks like @Apollorion and @ag-adampike have provided solutions for you so I'll be closing this ticket. But feel free to reopen if you are still having issues.
Your environment
Chart Version:
Helm Version: 1.8.1
Kubernetes Version: 1.24
What happened?
1P cannot talk home. The logs say:
What did you expect to happen?
1P works
Steps to reproduce
I created the secret from file just as it says in the docs:
I verified that the secret's value (the JSON) is passed into the pod via
OP_SESSION
.