ContainerImage.Pinniped/generated/1.19/crds
Monis Khan 59d67322d3
Static validation for OIDC clients
The following validation is enforced:

1. Names must start with client.oauth.pinniped.dev-
2. Redirect URIs must start with https://
   or http://127.0.0.1
   or http://::1
3. All spec lists must not have duplicates

Added an integration test to assert all static validations.

Signed-off-by: Monis Khan <mok@vmware.com>
2022-06-15 15:09:40 -04:00
..
authentication.concierge.pinniped.dev_jwtauthenticators.yaml Regenerate code after updating controller-gen to v0.8.0 2022-03-08 11:27:05 -08:00
authentication.concierge.pinniped.dev_webhookauthenticators.yaml Regenerate code after updating controller-gen to v0.8.0 2022-03-08 11:27:05 -08:00
config.concierge.pinniped.dev_credentialissuers.yaml Regenerate code after updating controller-gen to v0.8.0 2022-03-08 11:27:05 -08:00
config.supervisor.pinniped.dev_federationdomains.yaml Update comment in FederationDomainTLSSpec 2022-04-05 09:53:22 -07:00
config.supervisor.pinniped.dev_oidcclients.yaml Static validation for OIDC clients 2022-06-15 15:09:40 -04:00
idp.supervisor.pinniped.dev_activedirectoryidentityproviders.yaml Regenerate code after updating controller-gen to v0.8.0 2022-03-08 11:27:05 -08:00
idp.supervisor.pinniped.dev_ldapidentityproviders.yaml Regenerate code after updating controller-gen to v0.8.0 2022-03-08 11:27:05 -08:00
idp.supervisor.pinniped.dev_oidcidentityproviders.yaml Regenerate code after updating controller-gen to v0.8.0 2022-03-08 11:27:05 -08:00