Closed InfoSec812 closed 4 years ago
So, even when I was pointing at an upstream with a valid CA (LetsEncrypt) it was not working. But, digging through the code I found an undocumented --upstream-ca
parameter which I pointed at /run/sercrets/kubernetes.io/serviceaccount/ca.crt
and that resolved the issue. I will submit a PR to update the docs.
Issues go stale after 90d of inactivity.
Mark the issue as fresh by commenting /remove-lifecycle stale
.
Stale issues rot after an additional 30d of inactivity and eventually close.
Exclude this issue from closing by commenting /lifecycle frozen
.
If this issue is safe to close now please do so with /close
.
/lifecycle stale
Stale issues rot after 30d of inactivity.
Mark the issue as fresh by commenting /remove-lifecycle rotten
.
Rotten issues close after an additional 30d of inactivity.
Exclude this issue from closing by commenting /lifecycle frozen
.
If this issue is safe to close now please do so with /close
.
/lifecycle rotten /remove-lifecycle stale
Rotten issues close after 30d of inactivity.
Reopen the issue by commenting /reopen
.
Mark the issue as fresh by commenting /remove-lifecycle rotten
.
Exclude this issue from closing again by commenting /lifecycle frozen
.
/close
@openshift-bot: Closing this issue.
I have configured:
When I make a request to either of the SSL upstreams I get the following error:
I would have expected the
--ssl-insecure-skip-verify
to allow the application to ignore the self-signed certificates.