-
Notifications
You must be signed in to change notification settings - Fork 26
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Bug]: OIDC config is invalid after OIDC plugin breaking change #515
Comments
Currently I believe the recommended guidance is to modify the
@gaiksaya @peterzhuamazon How do you feel about me adding a python script that we call here instead to do this propagation with support for a nested secret structure and can more easily have some test cases around? Or do you have any other ideas/preference on how we can support this structure? |
Sounds good @lewijacn . At the time of writing this initially, this was the easiest approach for non-nested yaml. Please make sure to ensure than original yaml stays intact while replacing the values. We can add tests to test the same. |
@gaiksaya @peterzhuamazon Raised a PR above for you to review |
Describe the bug
The current non-github OIDC auth config is constructed similar to:
However after breaking changes introduced in
4.350
of the OIDC plugin, this format is no longer valid for CASC usage and will produce errors similar to below:Reference: https://github.com/jenkinsci/oic-auth-plugin/releases
To reproduce
To reproduce a clean deployment with
authType=oidc
can be used and logs will be produced indicating this invalid formatExpected behavior
Expected format should be similar to:
Or below depending on use case:
Screenshots
If applicable, add screenshots to help explain your problem.
Host / Environment
No response
Additional context
No response
Relevant log output
No response
The text was updated successfully, but these errors were encountered: