Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

consul.tls ca, cert and key options should be optional #1718

Closed
bitsofinfo opened this issue Jun 8, 2017 · 5 comments
Closed

consul.tls ca, cert and key options should be optional #1718

bitsofinfo opened this issue Jun 8, 2017 · 5 comments

Comments

@bitsofinfo
Copy link
Contributor

bitsofinfo commented Jun 8, 2017

What did you do?

Attempt to connect traefik to a consul endpoint running TLS that presents a legit CA signed SSL certificate.

I have no need to present my own certificate when connecting to consul as a client over TLS. Other tools support this fine, such as https://github.com/hashicorp/consul-template

[consul]
  endpoint = "myconsul.mydomain.com:8501" # SSL port
  watch = true
  prefix = "traefik-stage"

[consul.tls]

What did you expect to see?

Traefik should be able to connect via SSL to a consul backend presenting a legit CA signed SSL certificate without issue.

I should not have to specify the ca, cert, and key options

What did you see instead?

2017-06-08T16:23:17.882619269Z 2017/06/08 16:23:17 Error creating kv store: Failed to load TLS keypair: tls: failed to find any PEM data in certificate input

Output of traefik version: (What version of Traefik are you using?)

Traefik version v1.3.0 built on 2017-05-31_05:48:42PM

What is your environment & configuration (arguments, toml, provider, platform, ...)?

relevant TOML config section

.....
[consul]
  endpoint = "myconsul.mydomain.com:8501" SSL port
  watch = true
  prefix = "traefik-stage"

[consul.tls]

If applicable, please paste the log output in debug mode (--debug switch)

see above

@bitsofinfo
Copy link
Contributor Author

My setup authenticates to consul not via client certs, but via acl token, which also could use a config option as noted in #1717

@ldez ldez added area/provider/consul status/0-needs-triage kind/enhancement a new or improved feature. kind/bug/possible a possible bug that needs analysis before it is confirmed or fixed. and removed status/0-needs-triage kind/enhancement a new or improved feature. labels Jun 8, 2017
@nmengin
Copy link
Contributor

nmengin commented Jun 14, 2017

We have to check into libkv if this behavior is enabled.

@p3sa
Copy link

p3sa commented Jun 18, 2017

Hi @bitsofinfo I had the same issue while using the consul catalog provider, I haven't tested it out but if you prepend https:// to the endpoint value in your configuration it should work

@bitsofinfo
Copy link
Contributor Author

@p3sa I verified this works, might clarify this in the docs

bitsofinfo added a commit to bitsofinfo/traefik that referenced this issue Jun 19, 2017
document change to clarify consul ssl, vs consul ssl client certificate security
traefik#1718
@ldez ldez added kind/question a question and removed kind/bug/possible a possible bug that needs analysis before it is confirmed or fixed. labels Jun 20, 2017
@ldez
Copy link
Member

ldez commented Jun 20, 2017

I'll close this issue, because I think the question is answered, but feel free to continue the conversation.

@ldez ldez closed this as completed Jun 20, 2017
ldez pushed a commit to bitsofinfo/traefik that referenced this issue Jul 18, 2017
document change to clarify consul ssl, vs consul ssl client certificate security
traefik#1718
@traefik traefik locked and limited conversation to collaborators Sep 1, 2019
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

No branches or pull requests

5 participants