Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

SSL for self signed on prem env error. #10645

Open
benshalev849 opened this issue Jan 5, 2025 · 1 comment
Open

SSL for self signed on prem env error. #10645

benshalev849 opened this issue Jan 5, 2025 · 1 comment

Comments

@benshalev849
Copy link

benshalev849 commented Jan 5, 2025

Version Information

latest v2.45.1

Environment

on-prem on openshift.

What is the current behaviour?

When creating event and triggering it the response is as following:
"Internal error: HandshakeFailed (Error_protocol \"certificate rejected: [InvalidSignature SignatreInvalid]\" CertificateUnknown)
"type": "client_error",
"version": "2"

When doing curl in the pod itself.
curl <server> --capath /etc/ssl/certs or curl <server> --cafile <file_path> it also works, also openssl s_client <server>:443 -CAfile <file_path>.

What is the expected behaviour?

The event to work and trigger creating a PUT request to the webhook.

How to reproduce the issue?

  1. Create a webhook in an on-prem self signed env.
  2. Create the event
  3. Trigger it.

Any possible solutions/workarounds you're aware of?

I have tried the following:
(all operations i have used a bundle of ca certs that works in all of our env.)
Mounting to /etc/ssl/certs
Mounting to /etc/ssl/certs/ca-certificates.crt
Using TLS allow list in UI
Using tls verify false in env
Using HASURA_GRAPHQL_CERTIFICATE_AUTHORITY=/certs/mycrt.crt

@benshalev849 benshalev849 added the k/bug Something isn't working label Jan 5, 2025
@seanparkross
Copy link
Contributor

I have reported this to the engine team.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants