-
Notifications
You must be signed in to change notification settings - Fork 33
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: Allow java versioning for cacert #3700
base: release-0.60.0
Are you sure you want to change the base?
feat: Allow java versioning for cacert #3700
Conversation
Allow to choose between java versions for the path of CACert Signed-off-by: Julien Godin <[email protected]>
Is it okay to ping some of you guys ? @rokroskar @ableuler @aledegano for a review ? |
Thanks @JGodin-C2C! @olevski @aledegano could you please review? |
Will do ASAP |
I think a little bit more context could be helpful here:
|
Hey @aledegano
We need to inject the CA in order to get java to query some https servers using custom CAs
I'm sorry, i only seeing this one. Am i missing something ?
My two cents : we should remove these "javacert" from this |
We do support a way to inject custom CA: The parameter that you are modifying in this PR changes the path that Java refers to when including custom CAs, in other words (as far as I understand...) this parameter is only needed when the Java version within the container changes, which it shouldn't unless you are building your own image of this specific service running on a different Java version.
Yes, this other templates also refer the same parameter:
Let's figure out exactly what we are trying to achieve first! 😁 |
(I feel i should open an issue) I have a renku already deployed. I already am using the customCAs key and the CAs are available in all my pods system. However, it seems that the java cacert is not updated. However, when this pod is trying to contact my gitlab instance, it throws me an error :
Some more stuffs for more insight
Logs when the pod is starting.
Also, it seems that the problem is general :
|
For the moment, i will update and check if i have the same problem. |
Hello ! |
aefdb14
to
e586be0
Compare
@JGodin-C2C I am looking again at this PR, I understand a little bit better the problem, I am not convinced that this is the best way to solve it and, as I mentioned already above, there are several containers that have a similar configuration to commit-event-service and that, at least in principle, would need the same treatment. In the meanwhile that I am investigating this issue further: could you tell us which services in your stack are using self-signed certificates? |
Sure, Keycloak is one of them. |
Solved in #3804 |
01b058f
to
5aa1251
Compare
7502cda
to
ee8bbeb
Compare
What
Allow to choose between java versions for the path of CACert
Why
Depending on the java version that is used in the container, we may need to change the path of the cacert
Further thought
This PR uses code that was already present.
I feel we could improve the lisibility by simply passing the cacert mountpath.
Pushing a new PR would be easy and remove some unused code
What is your opinion on this ?