Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Added required config option idp_id to Keystone OpenIDC charm #1235

Merged
merged 1 commit into from
Jul 2, 2024
Merged

Conversation

jadonn
Copy link
Contributor

@jadonn jadonn commented Jun 25, 2024

This change makes z-o-t pass in the value of idp_id when configuring the Keystone OpenIDC charm during testing.

The idp_id cannot be set to a default value. It has to match the name of the identity provider you set up in Keystone for federation. If you do not do this, the URLs in the template do not render properly.

This change makes z-o-t pass in the value of idp_id when configuring the Keystone OpenIDC charm during testing.
@jadonn
Copy link
Contributor Author

jadonn commented Jun 25, 2024

This PR is related to this change https://review.opendev.org/c/openstack/charm-keystone-openidc/+/922049.

@freyes freyes self-requested a review June 25, 2024 15:32
@wolsen wolsen merged commit 312e320 into openstack-charmers:master Jul 2, 2024
3 checks passed
openstack-mirroring pushed a commit to openstack/charm-keystone-openidc that referenced this pull request Jul 2, 2024
The values of the protocol ID and identity provider ID are
reversed in the charm's code. This causes the mod_auth_openidc
config to render incorrectly in the Apache template. This change
fixes the reversed values and adds a config option for
defining the identity provider ID. This change also adds new
config options for enabling using mod_auth_openidc with
multiple Keystone units and with proxies.

Closes-Bug: #2065590
Func-Test-Pr: openstack-charmers/zaza-openstack-tests#1235
Change-Id: Ie7da5f9a85027a287aad9958c54848a948f8495c
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants