Closed harshad16 closed 3 months ago
This only allows for one global cert path, should we actually add a config on the runtime metadata to allow passing this on the UI per server?
This only allows for one global cert path, should we actually add a config on the runtime metadata to allow passing this on the UI per server?
Is the idea that a site could target multiple KFP clusters (e.g., dev, test, and production) where the "valid" certs vary from target to target?
This makes sense, although I don't recall what the overhead is to extend runtime configurations with an optional property. Does this require UI work or is that portion dynamic?
This only allows for one global cert path, should we actually add a config on the runtime metadata to allow passing this on the UI per server?
Is the idea that a site could target multiple KFP clusters (e.g., dev, test, and production) where the "valid" certs vary from target to target?
This makes sense, although I don't recall what the overhead is to extend runtime configurations with an optional property. Does this require UI work or is that portion dynamic?
@lresende @kevin-bates thanks for the comments If we want to provide this option via runtime configurations then it would require UI change.
With this my idea, was the simply provide a way for user with unsecured cluster to utilize the feature of elyra pipeline , with a simple env var set. as i understand from the notes, the insecure cluster support for overall elyra feature is not in avenue of development for now.
Nice work, I like this current proposed no-frills way
LGTM, could you also provide a little update to the docs mentioning the var so that other users can leverage it.
could you also provide a little update to the docs mentioning the var so that other users can leverage it.
@lresende , sorry totally missed this PR. As you instructed, I updated the docs with details. PTAL, at your convenience
What changes were proposed in this pull request?
As the pipeline editor fails to connect to an unsecured pipeline server due to a certs issue, this PR includes an environment variable that can be pointed to the ssl_cert, which would be used for setting up the connection.
KF_PIPELINES_SSL_SA_CERTS
can be set with cert path.and
ssl_ca_cert
var would be set with the value and passed to kfp SDK.Fixes: #3149
How was this pull request tested?
Developer's Certificate of Origin 1.1