-
Notifications
You must be signed in to change notification settings - Fork 102
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Community Edition] JsonWebTokenError: invalid signature
on room creation in CE vanilla deploy method
#325
Comments
Solution 1A, hardcoding the key in your YAML, does seem to work. Please note that it requires re-logging in once you've applied hcce.yaml. I'm guessing the re-login is required to issue a new JWT that uses the new key. However that is not the correct long-term solution so let's keep this issue open. |
Solution 1B, using the docker method, also seems to work. See this
|
For 2B, answer from @Doginal and chatgpt, validated by @kfarr as working. We need each node worker (the hardware you provisioned for gke) on the gke cluster to have those ports open to the internet as coturn and dialog like to connect via ip not dns. To convert these AWS CLI commands to their equivalent gcloud commands for use with Google Cloud Platform, you'll need to use the gcloud compute firewall-rules create command. This command is used to create firewall rules in Google Cloud, similar to how security group rules are managed in AWS. Here are the equivalent gcloud commands for each of your AWS CLI commands: For TCP port 4443: For TCP port 5349: For UDP ports 35000 to 60000: |
I can confirm running these gcloud commands immediately allowed my two browsers to have working audio. |
After deployment using vanilla deployment method, and when user attempts to create a room, there is an error:
Potential causes:
\n
instead of\\n
it needs to be escaped"-----BEGIN PRIVATE KEY-----\nMIIE"
... where MIIE are the first 4 characters of the key"-----BEGIN PRIVATE KEY-----\\nMIIE"
Potential solutions:
1A) Hardcode the key in your YAML;
1B) newline within docker method
2B) May involve create a k8s network policy YAML, and/or changing GCP specific settings for Service workers / applications behind the haproxy firewall
The text was updated successfully, but these errors were encountered: