discoverOpenIDURLs and checkOIDCPasswordGrantFlow fail if endpoints are private to the data plane.
This enabled the oauth server traffic to flow through the dataplane to enable reaching private endpoints e.g ldap https://issues.redhat.com/browse/HOSTEDCP-421
This enabled fallback to the management cluster network so for public endpoints we are not blocking on having data plane, e.g. github https://issues.redhat.com/browse/OCPBUGS-8073
This issue is to enable the CPO oidc checks to flow through the data plane and fallback to the management side to satisfy both cases above.
This woudl cover https://issues.redhat.com/browse/RFE-5638
- blocks
-
OCPBUGS-38131 discoverOpenIDURLs and checkOIDCPasswordGrantFlow fail if endpoints are private to the data plane
- Closed
- is cloned by
-
OCPBUGS-38131 discoverOpenIDURLs and checkOIDCPasswordGrantFlow fail if endpoints are private to the data plane
- Closed
- is depended on by
-
RFE-5638 Allow bypassing "checkOIDCPasswordGrantFlow" for OIDC IdentityProviders
- Accepted
- is related to
-
RFE-6872 Surface control-plane operator errors in HostedControlPlane conditions
- Backlog
- links to
-
RHEA-2024:3718 OpenShift Container Platform 4.17.z bug fix update