-
Notifications
You must be signed in to change notification settings - Fork 65
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Incident] 403 Errors on UofT and Temple Hubs #3137
Comments
There was an upgrade last night in the oauthenticator (15.1 -> 16) package that appears to have caused issues for logging across many hubs. That change has now been rolled back This incident should now be resolved and students should be able to log in as before. Both UofT and Temple have been communicated with and the corresponding Freshdesk tickets are now closed. |
This was @jmunroe first time going through the Incident Response process in 'incident commander' role. I can confirm that the documentation given at https://team-compass.2i2c.org/projects/managed-hubs/incidents/ was sufficient for me to follow. My one small hiccup was not seeing immediately how to create the Slack channel. The instructions referred to "checking the box for While it was clear to me that this constituted an "incident" so I felt I needed to shift focus to it as soon as I learned about it (via Freshdesk email notification), I was a bit hesitant to assume I should take on the 'Incident Commander' role. In life guarding/first aid contexts, the first person on the scene is automatically in that role until they are officially relieved of that role so I assumed it would be the same here. |
I appreciated @consideRatio being available and willing to assist with this outage even though he was scheduled for leave today. The PR that caused the outage #3118 looked like it affected many parts of our infrastructure. We should revisit our testing procedures to improve our likelihood of catching authentication related errors. Was the nature of the upgrade such at all hubs needs to be changed over together? I don't understand enough about details of the upgrade z2jh and oauthenticator to know if they are intimately linked or could have been split into two separate changes. For testing, I think we need to have at least one 'regular user' (non-privileged, non-admin, non-2i2c) account able to log in for the hubs. This is especially important for our education hubs where we are often not using GitHub or Google but and education oauth provider. For UofT, I have a UTORid that I think would have caught the issue if I had tested it with those credentials. I don't know how we would have verified the Temple hub. My understanding is authentication was still working against Google but the problem was related to these other oauth providers and the changes in oauthenticator 16.0. |
@consideRatio (and a few others) is on leave today and tomorrow, so we should revisit this incident early next week to debrief and create an incident report. |
Summary
Community reports of errors with the UofT hubs at https://jupyter.utoronto.ca/ and https://r.datatools.utoronto.ca/ like:
403 : Forbidden
Sorry, you are not currently authorized to use this hub. Please contact the hub administrator.
First report was just after midnight (Eastern) today. We are able to replicate the issue. Please give it a look, thanks!
Impact on users
Users cannot log into the JuptyerHub.
Important information
Tasks and updates
After-action report template
The text was updated successfully, but these errors were encountered: