Bug 2141850
| Summary: | auth_openidc.conf probably should be mode 0640 by default | ||
|---|---|---|---|
| Product: | Red Hat Enterprise Linux 8 | Reporter: | Orion Poplawski <orion> |
| Component: | mod_auth_openidc | Assignee: | Tomas Halman <thalman> |
| Status: | CLOSED ERRATA | QA Contact: | Scott Poore <spoore> |
| Severity: | low | Docs Contact: | |
| Priority: | low | ||
| Version: | 8.7 | CC: | aboscatt, spoore |
| Target Milestone: | rc | Keywords: | Triaged |
| Target Release: | --- | Flags: | pm-rhel:
mirror+
|
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| Whiteboard: | |||
| Fixed In Version: | mod_auth_openidc-2.3-8090020230425101425.b46abd14 | Doc Type: | If docs needed, set a value |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2023-11-14 15:27:16 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
|
Description
Orion Poplawski
2022-11-10 20:54:09 UTC
Verified.
Version ::
mod_auth_openidc-2.4.9.4-5.module+el8.9.0+18723+672ccf5d.x86_64
# dnf module info mod_auth_openidc
Updating Subscription Management repositories.
Unable to read consumer identity
This system is not registered with an entitlement server. You can use subscription-manager to register.
Last metadata expiration check: 0:06:56 ago on Thu 04 May 2023 09:11:21 AM EDT.
Name : mod_auth_openidc
Stream : 2.3 [d][a]
Version : 8090020230425101425
Context : b46abd14
Architecture : x86_64
Profiles : default [d]
Default profiles : default
Repo : rhel-AppStream
Summary : Apache module suporting OpenID Connect authentication
Description : This module enables an Apache 2.x web server to operate as an OpenID Connect Relying Party and/or OAuth 2.0 Resource Server.
Requires : platform:[el8]
Artifacts : cjose-0:0.6.1-3.module+el8.9.0+18395+74bc73c4.src
: cjose-0:0.6.1-3.module+el8.9.0+18395+74bc73c4.x86_64
: cjose-debuginfo-0:0.6.1-3.module+el8.9.0+18395+74bc73c4.x86_64
: cjose-debugsource-0:0.6.1-3.module+el8.9.0+18395+74bc73c4.x86_64
: cjose-devel-0:0.6.1-3.module+el8.9.0+18395+74bc73c4.x86_64
: mod_auth_openidc-0:2.4.9.4-5.module+el8.9.0+18723+672ccf5d.src
: mod_auth_openidc-0:2.4.9.4-5.module+el8.9.0+18723+672ccf5d.x86_64
: mod_auth_openidc-debuginfo-0:2.4.9.4-5.module+el8.9.0+18723+672ccf5d.x86_64
: mod_auth_openidc-debugsource-0:2.4.9.4-5.module+el8.9.0+18723+672ccf5d.x86_64
Hint: [d]efault, [e]nabled, [x]disabled, [i]nstalled, [a]ctive
Results ::
# ls -l /etc/httpd/conf.d/auth_openidc.conf
-rw-r-----. 1 root apache 57516 Apr 25 07:13 /etc/httpd/conf.d/auth_openidc.conf
manually run gating tests:
test_oidc.py .... [100%]
-------------------- generated xml file: /root/federation_testing/result_oidc.xml ---------------------
====================================== 4 passed in 3.02 seconds =======================================
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Moderate: mod_auth_openidc:2.3 security and bug fix update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2023:6940 |