Closed fsigalov closed 3 years ago
It turned out that the above code was not working locally either. I updated the code to set a ClientCert on the handler.
handler.ClientCertificates.Add(CertUtils.GeneratePfx(config));
And that fixes my local run, but it changes the Azure error to "The request was aborted: Could not create SSL/TLS secure channel."
fwiw, you should definitely not set HttpClientHandler.DangerousAcceptAnyServerCertificateValidator
It shouldn't be necessary, and it makes it possible for someone to man in the middle your SSL.
I don't know about what might be different in Azure WebApps, is the version of dotnet the same in both cases?
I understand that, I'm trying to get it to work at all. I can reduce it to the necessary steps after that. Yes dotnet should be the same. I'm using framework 4.7.2.
Issues go stale after 90d of inactivity.
Mark the issue as fresh with /remove-lifecycle stale
.
Stale issues rot after an additional 30d of inactivity and eventually close.
If this issue is safe to close now please do so with /close
.
Send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs.
This bot triages issues and PRs according to the following rules:
lifecycle/stale
is appliedlifecycle/stale
was applied, lifecycle/rotten
is appliedlifecycle/rotten
was applied, the issue is closedYou can:
/remove-lifecycle rotten
/close
Please send feedback to sig-contributor-experience at kubernetes/community.
/lifecycle rotten
merge to #643
I'm using a kubeconfig file that works with kubectl, but is not working through KubernetesClient in an Azure webapp. This is working on my dev machine. I'm not sure what issue the IIS hosting is causing. I saw this issue but the cert it's creating from the kubeconfig file already has DigitalSignature set. Here's my code