-
Notifications
You must be signed in to change notification settings - Fork 367
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
OpenShift: Cannot inject custom CA for oauth endpoint #411
Comments
Thank you for opening your first issue in this project! Engagement like this is essential for open source projects! 🤗 |
Hi 👋 This sounds like a configuration problem rather than a bug. As you've mentioned in opendatahub-io-contrib/jupyterhub-odh#75 (comment) it's like to be related to a central certificate store rather than something in oauthenticator. Other SSL issues have been discussed in the past on the community forum https://discourse.jupyter.org/ so would you mind posting there instead? Thanks! |
Hi there @X-dark 👋! I closed this issue because it was labelled as a support question. Please help us organize discussion by posting this on the http://discourse.jupyter.org/ forum. Our goal is to sustain a positive experience for both users and developers. We use GitHub issues for specific discussions related to changing a repository's content, and let the forum be where we can more generally help and inspire each other. Thanks you for being an active member of our community! ❤️ |
@manics well seems strange to me to hardcode a cacert which is not guaranteed to contain the CA chain of the OAuth endpoint. Will wait for more feedback on the downstream issue then. |
This should hopefully be fixed in #410 due to us adding support for the |
@galshi removing the pycurl import shouldn't have affected anything, as it is on by default: #410 (comment) |
Bug description
When using a oauth endpoint with a custom CA on OpenShift, I cannot get the certificate verification to work. It seems that #363 imply that the CA should be in
/run/secrets/kubernetes.io/serviceaccount/ca.crt
. This is only the case for API endpoint not OAuth endpoint (which by default get the wildcard Ingress router certificate).We can inject the custom CA with a configmap [1] but we cannot overwrite the path above as it is already a mounted secret.
[1] https://docs.openshift.com/container-platform/4.6/networking/configuring-a-custom-pki.html#certificate-injection-using-operators_configuring-a-custom-pki
The text was updated successfully, but these errors were encountered: