New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[release-4.2] Bug 1768785: RequestHeaders IdP: fix TLS handshake #21
[release-4.2] Bug 1768785: RequestHeaders IdP: fix TLS handshake #21
Conversation
OAuth server uses the APIServer wrapping for its endpoints. This wrapping has its own RequestHeader IdP for the cluster admin login with client cert. As a part of that, before the RequestHeader is set, DelegatingAuthenticationOptions() adds its own ClientCA to the serving info config. The result of the above behavior is that during TLS handshake, when the names for acceptable client certificate CAs are announced, the CAs of the above mentioned apiserver RequestHeader IdP are announced. When users configure their own RequestHeader IdP to be used in OpenShift for the oauth-server to try to retrieve the users from, oauth-server was not adding this RequestHeader's client CA name among the acceptable client certificate CA names mentioned above. This commit adds the client CA data from the user specified RequestHeader IdP to 'GenericConfig.SecureServing.ClientCA', which is later converted to tlsConfig object which defines the data to be used in TLS handshakes.
|
@openshift-cherrypick-robot: This pull request references Bugzilla bug 1764558, which is invalid:
Comment In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
/retitle [release-4.2] Bug 1768785: RequestHeaders IdP: fix TLS handshake |
|
@openshift-cherrypick-robot: This pull request references Bugzilla bug 1768785, which is invalid:
Comment In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
/bugzilla refresh |
|
@stlaz: This pull request references Bugzilla bug 1768785, which is valid. The bug has been moved to the POST state. The bug has been updated to refer to the pull request using the external bug tracker. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
/lgtm |
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: deads2k, openshift-cherrypick-robot The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
|
/bugzilla refresh |
|
@derekwaynecarr: This pull request references Bugzilla bug 1768785, which is valid. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
@openshift-cherrypick-robot: All pull requests linked via external trackers have merged. Bugzilla bug 1768785 has been moved to the MODIFIED state. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
This is an automated cherry-pick of #19
/assign stlaz