Tim Hess
Tim Hess
As pointed out [here](https://github.com/SteeltoeOSS/Dockerfiles/pull/36#discussion_r1777639672), we're not publishing images to hub.docker.com anymore, and any documentation of our docker images needs to be updated accordingly
During recent [trace actuator work](https://github.com/SteeltoeOSS/Steeltoe/pull/1356#discussion_r1763102734), we discovered that the Content-Type header in actuator responses is not being handled correctly. It might make sense for individual actuator endpoints to be able...
As identified during #1356, (specifically [here](https://github.com/SteeltoeOSS/Steeltoe/pull/1356#discussion_r1763108054)) minimal API mappings are not fully supported at this time. We should look deeper than just fixing the crash and see about a more...
## Question This is a follow-up task from [this pr](https://github.com/SteeltoeOSS/Steeltoe/pull/1334#discussion_r1718802728)
In order to work around certificate trust issues, particularly of the ASP.NET Core dev certs, it would be nice to be able to turn off certificate validation in Spring Boot...
resolves #335
Does a sample use multiple applications and/or backing services? Then it should probably use Aspire. Anticipating _little_ difficulty (excluding the obvious expected framework changes to merging our service discovery features...
## Description Provides a fix for #1524 that is automatically implemented for certificate auth ## Quality checklist - [ ] Your code complies with our [Coding Style](https://github.com/SteeltoeOSS/.github/blob/main/contributing-docs/contributing-code-style.md). - [ ]...
In [this change](https://github.com/dotnet/aspnetcore/pull/61530) that was backported to .NET 8.0.17 and 9.0.6, `X-Forwarded*` headers are no longer used if they came from an unknown proxy. Because Steeltoe does not set any...
While working on #1525, I discovered that due to one or more certificate validation issues, certificate authorization is not working when the client and server apps are not on the...