You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
AWS secures communication with some OIDC identity providers (IdPs) through our library of trusted certificate authorities (CAs) instead of using a certificate thumbprint to verify your IdP server certificate. These OIDC IdPs include Google, and those that use an Amazon S3 bucket to host a JSON Web Key Set (JWKS) endpoint. In these cases, your legacy thumbprint remains in your configuration, but is no longer used for validation.
a new disruption is still unavoidable before 22th Oct 2028 when DigiCert's current operative intermediate cert will expire
does not solve the scenario where Atlassian legitmately switches their CA of choice to generate their end TLS certificates
yet another disruption is unavoidable before 10th Nov 2031 when DigiCert's root certificate will expire, requiring a rotation for all the api.bitbucket.org certificate chain
After Atlassian rotated their HTTPS certificate on 24th June 2022, the AWS OIDC provider stopped working.
See https://bitbucket.status.atlassian.com/incidents/3s2tb3329ftd
The certificates that are fingerprinted by the module should be those listed in https://developer.atlassian.com/cloud/bitbucket/rest/api-group-pipelines/#api-workspaces-workspace-pipelines-config-identity-oidc-keys-json-get and not the one that is used in the TLS layer of the API, although they were the same leading to this confusion.
The text was updated successfully, but these errors were encountered: