25a91019c2
- When two different Issuers have the same host (i.e. they differ only by path) then they must have the same secretName. This is because it wouldn't make sense for there to be two different TLS certificates for one host. Find any that do not have the same secret name to put an error status on them and to avoid serving OIDC endpoints for them. The host comparison is case-insensitive. - Issuer hostnames should be treated as case-insensitive, because DNS hostnames are case-insensitive. So https://me.com and https://mE.cOm are duplicate issuers. However, paths are case-sensitive, so https://me.com/A and https://me.com/a are different issuers. Fixed this in the issuer validations and in the OIDC Manager's request router logic. |
||
---|---|---|
.. | ||
conversion.go.tmpl | ||
defaults.go.tmpl | ||
doc.go.tmpl | ||
register.go.tmpl | ||
types_credentialissuerconfig.go.tmpl | ||
types_oidcproviderconfig.go.tmpl |