Bug 1715020 - OAuth object validation allows multiple IdPs being set within a single IdP object
Summary: OAuth object validation allows multiple IdPs being set within a single IdP ob...
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: OpenShift Container Platform
Classification: Red Hat
Component: apiserver-auth
Version: 4.1.0
Hardware: Unspecified
OS: Unspecified
unspecified
unspecified
Target Milestone: ---
: 4.1.z
Assignee: Erica von Buelow
QA Contact: scheng
URL:
Whiteboard: 4.1.2
Depends On:
Blocks: 1718956
TreeView+ depends on / blocked
 
Reported: 2019-05-29 11:55 UTC by Standa Laznicka
Modified: 2019-06-19 06:45 UTC (History)
4 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2019-06-19 06:45:34 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2019:1382 0 None None None 2019-06-19 06:45:44 UTC

Description Standa Laznicka 2019-05-29 11:55:28 UTC
Description of problem:
When modifying the oauth/cluster object, user is allowed to specify multiple identity provider types within a single identity provider object (see example below)

Version-Release number of selected component (if applicable):
4.1

How reproducible:
Always

Steps to Reproduce:
1. oc edit oauth cluster
2. the following is allowed in spec.identityProviders:
- name: misconfiguredIdP
  htpasswd:
    fileData:
      name: htpasswd-config
  basicAuth:
    uri: https://example.com
    tlcClientCert:
      name: mycert
    tlsClientKet:
      name: mykey

Actual results:
Successful edit

Expected results:
Validation refuses to create an IdP config like that

Comment 5 errata-xmlrpc 2019-06-19 06:45:34 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2019:1382


Note You need to log in before you can comment on or make changes to this bug.