Hi,
TL;DR
I am currently trying to roll out the full ziti stack on my OKD cluster in separated namespaces and currently working on the router using this guide.
Error:
+ echo 'INFO: identity secret does not exist, attempting router enrollment'
INFO: identity secret does not exist, attempting router enrollment
+ [[ -n '' ]]
+ ziti router enroll /etc/ziti/config/ziti-router.yaml --jwt /etc/ziti/config/enrollment.jwt --verbose
[ 0.000] DEBUG ziti/ziti/util.LogReleaseVersionCheck: ZITI_CHECK_VERSION is not 'true'. skipping version check
[ 0.044] FATAL ziti/router/enroll.(*RestEnroller).Enroll: {cause=[token signature is invalid: key is of invalid type: RSA verify expects *rsa.PublicKey]} failed to parse JWT
Which relates to this LOC: ziti/router/enroll/enroll.go at baad419e49197c44650826ee42f031f4a58019eb · openziti/ziti · GitHub
Full description:
Currently live (not publicly exposed, only reachable from within the cluster atm):
- controller
- console
Missing:
- router
- browzer-bootstrapper
My ziti controller is reachable from within the router enrollment job's pod (tested via curl).
I've ran the helm chart from my WSL2 Ubuntu environment using
helm install --debug \
--namespace demo-ziti-router --generate-name \
openziti/ziti-router \
--set-file enrollmentJwt=./router1.jwt \
--set advertisedHost=router.ziti.demo.local \
--set ctrl.endpoint=demo-openziti-controller-ctrl.demo-ziti-controller.svc.cluster.local:443 \
--set persistence.size=1Gi \
--set edge.advertisedHost=router.ziti.demo.local
The enrollment JWT was generated using the ziti CLI insode of the controller pod: I've (1) copied the JWT string over and (2) copied the jwt file from the pod to my local file system. Both approaches resulted in different file hashes but none of them resulted in the same
{cause=[token signature is invalid: key is of invalid type: RSA verify expects *rsa.PublicKey]} failed to parse JWT
error.
CRLF breaks didn't seem to be the issue:
❯ sha256sum router1.jwt && dos2unix router1.jwt && sha256sum router1.jwt
dd3d6854fc2b2e44f173031f0287a8ac27eeaf0aa59268311a8dce2baf81bd15 router1.jwt
dos2unix: converting file router1.jwt to Unix format...
dd3d6854fc2b2e44f173031f0287a8ac27eeaf0aa59268311a8dce2baf81bd15 router1.jwt
Checking the JWT via jwt.io didn't provide any new clues.
JWT (already manually disabled for sharing purposes):
eyJhbGciOiJSUzI1NiIsImtpZCI6ImEzNmU2MjAzYzk0NGJjZmY2NzgwNGI1MjAyZmQzZDljODdlNDFmMzciLCJ0eXAiOiJKV1QifQ.eyJpc3MiOiJodHRwczovL2NvbnRyb2xsZXIueml0aS5qb2luZXkuZGV2OjQ0MyIsInN1YiI6InozcXYxeDF0N0IiLCJhdWQiOlsiIl0sImV4cCI6MTcxMDgxMDIxMCwianRpIjoiZmI4YmIwM2YtYTVmMS00YjY3LWE4YzItNTBhZjU1MmZhZGVjIiwiZW0iOiJlcm90dCIsImN0cmxzIjpudWxsfQ.By7Klk1K6XZo_5VRJMqavl8_b09CiqrtY0JQsP8cvZds9HJFXetpR8PhcIYsF867vV26Hz0pgUNlaZ6EmoLvKs8BvRXAnwXBn0_j4klTGLgHC0Hgc2b6XRx9UACzJ1SmPxiG4p6wB9FvImo4ZWoOUSKxhmeytgO-BCZz3T061TTw_TByF4y8TLk1frgbi6DF8U0Vcg__7pM4BlMhODSSlAWvDmdYNzC_gxcclE7mg3w3WzfrhrLSwkSg8yoot1zXCrPAP9HPCBBGL5URWppP0fnw10au9lQXTs-K1Phz76yrbR3qNresrqFPLEiFQCpxUpcki_pr7TzgXlzCBEO0Bp4aoTU9rooTnEGKOdMGsxQikhWmpyv-mEFjwkxKmMgBnzz_P9VMIOBeVZkn5iSD6pKaTtQqiTI4aO4beip8x6xoJXoteX7ZEr8gby9d7kbEII2Td1pwW4YGpLaScgnc8wcDXAyQsAgNSWduwZ88F45-D9_QL3JvM0uHiGTVdoTqdkwdLXCnveFyt24Ffo2Hp1BT_57xXA8MsU5QhsEuAttWwVW1oLhFHST1Fdv1-eUToNXc1KI4TGnWCRc7-ATOopqfjHtOxJXbONZ7IlRg6W91hMPYqGw-zx7pJ1wvFrOdzbRc_OyLJJYSt0uCGaefXcoduiyHcBPeijbY5LMGGC4
Does any1 have an idea what to check next? I'm asking because I'm kinda frustrated atm.