-
-
Notifications
You must be signed in to change notification settings - Fork 102
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Could not create API client for Vault login: x509: certificate signed by unknown authority - can we support tls-skip-verify? #91
Comments
Hi @kiich, sorry this isn't documented very well. Can you try the following environment variable to skip the TLS verification:
The other environment variables for working with custom certificates can be found in the release notes for version 1.4.4. All the environment variables from the Vault cli should be supported, because we are using the same go package:
|
Ahh that's brilliant! Thanks for letting me know so quickly. Let me try that out and will let you know. |
@ricoberger That was it! i can now connect to vault fine. thank you.
environment variable? i ask because i set that to work with Vault enterprise namespace but it does not seem to take effect and errors when i create the vaultsecret. |
ahh i just found #74 - let me try this. |
#74 worked a treat! thanks @ricoberger |
Nice and thanks for verifying 🙂 |
First of all, great tool! I was looking a way to create a vault secret that hashicopr vault injector retrieves as Kubernetes secret because one of our app does not let you source a file to set environment variable and only other way was to supply a kubernetes secret which i did not have the means to create until i found your tool!
I've deployed as per your readme but ran into the below:
and indeed it is because our vault dev instance has a self signed certificate.
It would be great if you can do something like what hashicorp vault secret injector does by letting you tls-skip-verify:
of course in prod, we will have a valid cert but i also then noticed there is no way to set the CA cert for the vault-secrets-operator to use so if we can support that as well, that would be awesome!
The text was updated successfully, but these errors were encountered: