-
Notifications
You must be signed in to change notification settings - Fork 31
Cannot login when OAuth endpoint is using a customCA #75
Comments
Based on the linked issue it seems there might be 2 issues
|
|
@X-dark For context, I added a conditional import to that PR that defaults to the There's still some work that happens to get |
Yes I think this could be great. pycurl should use default system CA certificates and using the certificate injection mechanism it is easy to inject custom CA bundle at that level. |
I got into same situation with @akchinSTC |
@wseaton so I see your PR has been merged 3 months ago but the latest odh-jupyterhub still uses a commit from Feb 10 of oauthenticator. Is there anything specific blocking this? |
I am using 0.2.8 image of odh-jupyterhub from quay with manifests from latest HEAD from https://github.com/opendatahub-io/odh-manifests. So I guess I should be up to date. I am still seeing |
I am having the same problem, any workaround? I am using image 0.3.5, getting: " tornado.curl_httpclient.CurlError: HTTP 599: Peer's Certificate issuer is not recognized." |
…e_jsp Update JSP dependency de36bdbf4d802318be3ebc0f50133758428cf910
#137 might offer some hints. There, the same type of configmap injection mechanism was used by me, then the configmap data section referenced in a volume and added to a spawned container volume mount programmatically. Unsure how this works here with Tornado, but still, might be worth a look in general. |
Describe the bug
I get a 500 error about certificate validation after authenticating on the oauth endpoint. I have tried to inject the CA bundle using [1] but the system CA seems to be ignored.
I suspect this is related to this: jupyterhub/oauthenticator#411 but I would be happy to get feedback on my investigation.
[1] https://docs.openshift.com/container-platform/4.6/networking/configuring-a-custom-pki.html#certificate-injection-using-operators_configuring-a-custom-pki
The text was updated successfully, but these errors were encountered: