Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Allow to use private IdPs with the OIDC provisioner #1940

Merged
merged 1 commit into from
Aug 13, 2024

Conversation

maraino
Copy link
Contributor

@maraino maraino commented Jul 23, 2024

This commit allows the OIDC provisioner to be used with private identity providers using a certificate from step-ca.

Fixes #1909

cc: @tashian

This commit allows using the OIDC provisioner with private identity
providers using a certificate from step-ca.

Fixes #1909
@maraino maraino requested a review from dopey July 23, 2024 02:04
@github-actions github-actions bot added the needs triage Waiting for discussion / prioritization by team label Jul 23, 2024
@hslatman hslatman added this to the v0.27.3 milestone Jul 31, 2024
@hslatman hslatman merged commit 92e95e4 into master Aug 13, 2024
16 checks passed
@hslatman hslatman deleted the mariano/self-trust branch August 13, 2024 07:59
@hslatman
Copy link
Member

Merged this, as it was previously approved, and should go into the next release.

pool.AddCert(crt)
}

tr, ok := http.DefaultTransport.(*http.Transport)
Copy link
Member

@hslatman hslatman Aug 13, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This could turn out to be problematic in certain cases. We can follow up with a fix if so.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
needs triage Waiting for discussion / prioritization by team
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Step CA in Docker doesn't trust it's self
3 participants