-
Bug
-
Resolution: Unresolved
-
Undefined
-
None
-
quay-v3.16.2
-
False
-
-
False
-
-
Hello,
I have configured an on-premise Quay instance and configured it to use an 'authentik' instance as OIDC provider/server.
Quay is running behind a nginx reverse proxy handling TLS termination.
I identified two critical cases where URLs for Quay are not generated correctly and do not use the configured SERVER_HOSTNAME value.
- When Quay is starting and validating its configuration, the Callback-URL [{{http://quay/oauth2/auth0/callback}}] is generated.
- I assume `quay` is taken from the container's hostname.
I expected a https URL using SERVER_HOSTNAME.
'auth0' is also not correct. Quay does not seem to use the OpenID Connect Auto-Discovery to generate the correct Callback-URL - => I have to add [{{http://quay/oauth2/auth0/callback}}] as allowed Callback-URL in my OIDC provider, otherwise Quay will crash on start-up
- I assume `quay` is taken from the container's hostname.
- At the end of a login flow using my OIDC provider, I am redirected to Quay at {{{}/oauth2/MY_PROVIDER_NAME/callback?code=
{}}}Where I am authenticated.
But the header location: https://[::1]/ sends me to the wrong address- It looks like the final redirect after the login is using the Host-Header instead of the SERVER_HOSTNAME config option
- This is highly unexpected to me, as my setup only sets the X-Forwarded-Host header by default.
- The workaround is setting the Host header on the reverse-proxy
- It looks like the final redirect after the login is using the Host-Header instead of the SERVER_HOSTNAME config option