[Bug 1959722] Re: [MIR] libapache2-mod-auth-openidc

Christian Ehrhardt  1959722 at bugs.launchpad.net
Tue Jun 13 14:51:12 UTC 2023


There has been not further update for too long, for now we consider it invalid.
Feel free to re-open if there is effort backing it up and motivation to bring it to main.

** Changed in: libapache2-mod-auth-openidc (Ubuntu)
       Status: Incomplete => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
OpenStack, which is subscribed to libapache2-mod-auth-openidc in Ubuntu.
https://bugs.launchpad.net/bugs/1959722

Title:
  [MIR] libapache2-mod-auth-openidc

Status in libapache2-mod-auth-openidc package in Ubuntu:
  Invalid

Bug description:
  [Availability]
  Currently in universe

  [Rationale]
  Keystone is an OpenStack project that we're aready support in main.
  apache2 is also in main. libapache2-mod-auth-openidc will be used
  in conjunction with keystone and apache2 to provide federated
  authorization/authentication.

  [Security]
  https://ubuntu.com/security/cves?q=&package=libapache2-mod-auth-openidc&priority=&version=&status=
  It appears these are all patched in the version that is in jammy.

  [Quality Assurance]
  Package works out of the box with no prompting. There are no major bugs
  in Ubuntu and there are no major bugs in Debian. Tests are run during
  build.

  [Dependencies]
  All are in main

  [Standards Compliance]
  FHS and Debian Policy compliant

  [Maintenance]
  Package that the OpenStack Team will take care of

  [Background]
  The libapache2-mod-auth-openidc package provides the mod_auth_openidc
  authentication/authorization module for Apache2. It enables an Apache2
  web server to operate as an OpenID Connect Relying Party towards an
  OpenID Connect Provider, relaying user authentication to a provider
  nad receiving user identity information from that provider, then
  passes that identity information on to applications protected by the
  Apache web server and establishes an authentication session for the
  identified user.

  The current use case for libapache2-mod-auth-openidc will be for
  OpenStack Keystone federation. This allows users to authenticate
  directly with another identity source and then provide keystone with
  a set of user attributes, useful for organizations that already have
  a primary identity source, preventing the need for a separate set of
  cloud credentials.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libapache2-mod-auth-openidc/+bug/1959722/+subscriptions




More information about the Ubuntu-openstack-bugs mailing list