-
Notifications
You must be signed in to change notification settings - Fork 35
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Unknown x509 certificate #12
Comments
Adding at least the default k8s/openshift CA.crt to the trust is nice feature to have. Will the below work?:
|
Hi! Might be good to add support for both the service account as well as a 'disregard certificate validity' option, through Golangs |
You can also add support for custom certificates provided with volume mounts(backed by secrets). For example if file /tmp/custom-ca.crt exists append the it too. |
I don't use self signed cert, and errors occurred. Workarround: https://www.getambassador.io/reference/filter-reference/#installing-self-signed-certificates |
Staring it against https keycloak i get this error.
2019/01/17 11:26:54 OIDC provider setup failed: Get https://sso-keycloak-sso.cloudapps02.euan-hume-02-ocp.svcs.dxc.com/auth/realms/kubeflow/.well-known/openid-configuration: x509: certificate signed by unknown authority
The text was updated successfully, but these errors were encountered: