ContainerImage.Pinniped/internal/controller
Ryan Richard 25a91019c2 Add spec.secretName to OPC and handle case-insensitive hostnames
- When two different Issuers have the same host (i.e. they differ
  only by path) then they must have the same secretName. This is because
  it wouldn't make sense for there to be two different TLS certificates
  for one host. Find any that do not have the same secret name to
  put an error status on them and to avoid serving OIDC endpoints for
  them. The host comparison is case-insensitive.
- Issuer hostnames should be treated as case-insensitive, because
  DNS hostnames are case-insensitive. So https://me.com and
  https://mE.cOm are duplicate issuers. However, paths are
  case-sensitive, so https://me.com/A and https://me.com/a are
  different issuers. Fixed this in the issuer validations and in the
  OIDC Manager's request router logic.
2020-10-23 16:25:44 -07:00
..
apicerts dynamiccertauthority: fix cert expiration test failure 2020-10-23 15:34:25 -04:00
identityprovider Implement per-issuer OIDC JWKS endpoint 2020-10-16 17:51:40 -07:00
issuerconfig Concierge controllers add labels to all created resources 2020-10-15 10:14:23 -07:00
kubecertagent Concierge controllers add labels to all created resources 2020-10-15 10:14:23 -07:00
supervisorconfig Add spec.secretName to OPC and handle case-insensitive hostnames 2020-10-23 16:25:44 -07:00
utils.go Implement per-issuer OIDC JWKS endpoint 2020-10-16 17:51:40 -07:00