-
-
Notifications
You must be signed in to change notification settings - Fork 7
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Feature request: an option to disable provider's TLS certificate validation (or option to provide trusted cert) #54
Comments
I would vote for 2. because security should be the default today. |
As a temporary hack/workaround you could do something like the following:
I agree that the plugin should support both |
At first, thx @cdanis for providing a workaround. Second: Provider:
Url: "https://your-provider"
CABundleFile: "/certificates/bundle/ca_bundle.pem"
# InsecureSkipVerify: true # If you don't want to use a CA file, but not suggested I will release it this weekend hopefully. |
It might be interesting to also allow the plugin to receive the CA bundle as a raw string. This would allow k8s installations to use the I can experiment with this in a followup, since I don't think @sevensolutions has much k8s expertise. |
Good point @cdanis 👍. I'll add this tomorrow. No sorry, I'am more the Nomad-guy 😀 but it would be great if you can do some testing on k8s. |
@cdanis An inline certificate bundle has to preserve all the newlines. Provider:
UrlEnv: "PROVIDER_URL_HTTPS"
CABundle: |
-----BEGIN CERTIFICATE-----
MIIF+DCCA+CgAwIBAgIUZRLUFUYKckhgTHaOoqgg61UiMOkwDQYJKoZIhvcNAQEL
-----END CERTIFICATE----- But would this work with k8s secrets? Provider:
UrlEnv: "PROVIDER_URL_HTTPS"
CABundle: base64:LS0tLS1CRUdJTiBDRVJUSUZJQ0FU... |
Certainly k8s secrets can contain multiline values with no problem. And commonly contain TLS cert/key material. The thing I do need to check is how exactly Traefik's substitution of the secret values works, but I would guess it's probably fine.
I don't think this is necessary for k8s, nor am I sure offhand that you could use it with Traefik's |
Thanks @sevensolutions, you saved me from manual certificate renewal 🙃 |
In Docker setup (for home lab), where I use kanidm as one container and traefik as another, the kanidm uses a self-signed certificate. And then Traefik is responsible for the final certificate.
Whenever I try to supply my public idm origin as the provider URL, it says Docker can't find the host. I assigned a label to my container, so Docker could find the correct path to it, but it still failed with a TLS error, saying that the origin of my certificate was unknown.
I solved that by copying Traefik's certificate to Kanidm, however, after it expires I will need to do that again manually. Because all this happens inside Docker networks, I would prefer to have one of the simpler options:
serversTransport.insecureSkipVerify: true
The text was updated successfully, but these errors were encountered: