-
-
Notifications
You must be signed in to change notification settings - Fork 569
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
idp_multi_cert nil if only multiple signing certs in metadata in 1.4.3 #412
Comments
@bheeshmar |
@pitbulk No, I'm running 1.4.3 and using omniauth-saml. I worked around the symbolized keys problem for now, but the bigger issue is the lack of |
I will do a new release soon and review idp_cert_multi support |
Thanks! Looking forward to it and thanks for all the hard work! |
Having this issue too, glad to see that the fix is not far away to be released. Thanks. 👍 |
One more issue around Update: I see this is addressed in #402 . Looking forward to a release with these fixes! :) |
I will release it today. |
Released 1.5.0 |
I have a metadata file from an Azure AD instance which has 3 "signing" certs but no "encryption" certs. When I parse this with the
IdpMetadataParser
I get the first signing cert in theidp_cert
field, but a nil inidp_cert_multi
instead of the 3 certs I expect.I believe the root cause is the
certificates.size == 1 ||
condition in #merge_certificates_into, which I think can be safely eliminated.Alternatively, perhaps initializing
certs = {signing: [], encryption: []}
in #certificates would also help (and properly return symbolized keys).The text was updated successfully, but these errors were encountered: