Fix cookie policy for Seqera Platform JWT token refresh#6411
Fix cookie policy for Seqera Platform JWT token refresh#6411pditommaso merged 3 commits intomasterfrom
Conversation
Update lib-httpx to version 2.1.0 and configure cookie policy to ACCEPT_ALL for proper JWT token refresh handling in Tower and Wave clients. 🤖 Generated with [Claude Code](https://claude.ai/code) Co-Authored-By: Claude <noreply@anthropic.com> Signed-off-by: Paolo Di Tommaso <paolo.ditommaso@gmail.com>
|
@jordeu any chance you can validate this? |
Ok, let me launch a +1h pipeline to validate |
Signed-off-by: Paolo Di Tommaso <paolo.ditommaso@gmail.com>
… prod] Signed-off-by: Paolo Di Tommaso <paolo.ditommaso@gmail.com>
7528ff9 to
20baecf
Compare
|
I'll merge this, however validation would still be important |
|
Sorry, I couldn't validate before. I've checked with the |
|
umm, i've tested locally using a short lived jwt token and it was refreshing correctly |
Yes, I also tested this part, but not altogether. Not sure what is going on, but that cookie problem might not be the full solution. |
|
(oops, this is a PR and it cannot be re-opened) |
|
Looking at this now. Just to check if I correctly understood the issue. Nextflow needs a jwt token for validating the fusion license. This token expires, and the httpx client refreshes it, but something fails after refreshing that we get 401 when checking the license. It can be reproduced running a pipeline with fusion and wave enabled with a duration larger than 1 hour. Is it correct? or do I miss something? |
|
Yeah, but it much simpler using a local platform instance and setting jwt lifespan to a few mins. Let's chat over slack |
Summary
CookiePolicy.ACCEPT_ALLfor JWT token refresh functionalityChanges
Test plan
🤖 Generated with Claude Code