-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
v1.12.0 seemingly breaks ingresses with auth snippets #12655
Comments
This issue is currently awaiting triage. If Ingress contributors determines this is a relevant issue, they will accept it by applying the The Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
@craigcabrey I also faced the same issue For this issue now we need to set The "risk" list is here.. Annotations Risks - Ingress-Nginx Controller |
I got the same problem, invalid TLS certificate after upgrading
This fixed the problem, Thanks ! I was not expecting a breaking change on minor version bump too. |
thanks, can confirm this also works for me. I'll leave this open for the maintainers to decide what to do with it. |
I was also caught by this off guard. Was doing a bit of Helm chart maintenance and suddenly 90% of my ingresses respond with a 404. Not sure if a change like this should've landed in a minor release. Even the PR marks it as a breaking change. |
@abhiverma001 thank you for sharing that link, I have been banging my head all morning trying to figure out why upgrading to 1.12 kept provisioning fake certificates. |
Is this bug planned to get fixed in the future releases or expected to have the risk level annotations done to consume the latest images. |
the |
I also needed to set |
I am also facing the same 404 error after upgrading to |
Commenting on a 404 log message requires data on what specific snippets are configured and if snippets are allowed and risk level set etc etc. |
the ingress calling the auth
|
The ingress serving the auth
|
What happened:
Upgrade to v1.12.0 using Helm chart 4.12.0 (I do this using Argo if it matters). Many ingresses which make use of a forward auth seem to break with a
404
.What you expected to happen:
Existing ingresses continue to function as expected.
NGINX Ingress controller version (exec into the pod and run
/nginx-ingress-controller --version
):before (working):
after (broken):
Ingress with auth snippets applied (e.g. for Authentik integration):
Kubernetes version (use
kubectl version
):v1.29.12+k3s1
Environment:
Cloud provider or hardware configuration: Self hosted homelab
OS (e.g. from /etc/os-release):
Fedora CoreOS 41.20241109.3.0
Kernel (e.g.
uname -a
):6.11.6-300.fc41.x86_64
Install tools:
Please mention how/where was the cluster created like kubeadm/kops/minikube/kind etc.
Basic cluster related info:
kubectl version
kubectl get nodes -o wide
How was the ingress-nginx-controller installed: Helm via Argo (not sure how to get the full release out of argo)
Current State of the controller:
kubectl describe ingressclasses
kubectl -n <ingresscontrollernamespace> get all -A -o wide
kubectl -n <ingresscontrollernamespace> describe po <ingresscontrollerpodname>
kubectl -n <ingresscontrollernamespace> describe svc <ingresscontrollerservicename>
Logs show it sees the ingress:
Anything else we need to know:
Reliably reproducible. No difference in Helm chart versions, I isolated it down to the v1.12.0 image of the nginx controller causing the unexpected behavior.
Ingresses wihtout auth snippets function as expected.
The text was updated successfully, but these errors were encountered: