Open natalian98 opened 8 months ago
This is likely resolved by https://github.com/canonical/traefik-k8s-operator/pull/354. Can you please retry with the latest revision in edge? If it's still a problem, feel free to reopen the issue.
The issue still occurs, both in latest/edge
(rev203) and latest/stable
(rev194).
@simskij Could you reopen it? I'm not a repo collaborator so I can't do it. Thank you.
Bug Description
When deployed on aws ec2 instance, traefik requests certificates with uncorrect SANs. This can be verified by decoding the cert:
The common name and subject alternative name is
ip-10-64-140-44.ec2.internal
instead of just10.64.140.44
- the ip assigned by metallb. Due to this, other charms don't trust the certificate. The issue can be reproduced by launching those tests on an ec2 instance. The login flow will fail withlogin.OAuthLogin(NewTransportWithCode)
error in grafana:I made a quick test with SAN hardcoded to
["10.64.140.44"]
. The certificate was issued correctly and I was able to complete the flow.To Reproduce
Environment
microk8s 1.28-stable, metallb enabled juju 3.1/stable
Relevant log output
Additional context
No response