Skip to content
This repository has been archived by the owner on Nov 30, 2021. It is now read-only.

Configurable ability to add Root CA or allow unverified https to object store #690

Open
carraher opened this issue Jan 9, 2017 · 4 comments

Comments

@carraher
Copy link

carraher commented Jan 9, 2017

Need the ability to add root certificates authorities to containers that want to access object storage (database, builder, registry). This is needed to host secure-https on-prem object storage that is signed by a non-public CA.

Currently a non-public signed https object storage system results in
ssl.SSLError: [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:645)

  1. Allow private/internal CAs to be added to containers.
  2. Allow https to turn off verification, similar to curl -k
@bacongobbler
Copy link
Member

bacongobbler commented Jan 9, 2017

this was added in v2.10.0: deis/controller#1158

Alternatively you can fork the controller and add your root CA to the cert for now.

Will that work for you?

@bacongobbler
Copy link
Member

I just re-read your issue and the ticket I linked is different. That one is for communication from the controller to kubernetes, not from db/registry/builder to the object store. Sorry!

@bacongobbler
Copy link
Member

If you're willing to take a crack at a PR, we'd likely accept it.

@bacongobbler bacongobbler changed the title Configurable ability to add Root CA or allow unverified https Configurable ability to add Root CA or allow unverified https to object store Jan 10, 2017
@Cryptophobia
Copy link

This issue was moved to teamhephy/workflow#44

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

No branches or pull requests

3 participants