-
Bug
-
Resolution: Unresolved
-
Undefined
-
None
-
4.17.0
-
Important
-
Yes
-
Auth - Sprint 250
-
1
-
False
-
-
The newest Go versions (1.22 and above) introduced a regression into the behavior of the Server's path routing. Customers who would have a password-based IDP (like htpasswd) that has whitespaces in the name, would have an oauth-server that panics.
-
Release Note Not Required
-
In Progress
Description of problem:
When there is more than one password-based IDP (like htpasswd) and its name contains whitespaces, it causes the oauth-server to panic, if Golang is v1.22 or higher.
Version-Release number of selected component (if applicable):
How reproducible:
always
Steps to Reproduce:
1. Create a cluster with OCP 4.17 2. Create at least two password-based IDP (like htpasswd) with whitespaces in the name. 3. oauth-server panics.
Actual results:
oauth-server panics (if Go is at version 1.22 or higher).
Expected results:
NO REGRESSION, it worked with Go 1.21 and lower.
Additional info:
- clones
-
OCPBUGS-42772 Go's 1.22 net/http.ServeMux causes oauth-server to panic with idp names that contain whitespacs
- Verified
- depends on
-
OCPBUGS-42772 Go's 1.22 net/http.ServeMux causes oauth-server to panic with idp names that contain whitespacs
- Verified
- is related to
-
OCPBUGS-44099 oauth-server panic with OAuth2.0 idp names that contain whitespaces
- Verified
- relates to
-
AUTH-550 Impact statement request for OCPBUGS-43587 Go's 1.22 net/http.ServeMux causes oauth-server to panic with idp names that contain whitespacs [4.17]
- Closed
- links to