Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Adding the local CA cert to the OS trust store #1055

Open
frippe75 opened this issue Sep 4, 2024 · 1 comment
Open

Adding the local CA cert to the OS trust store #1055

frippe75 opened this issue Sep 4, 2024 · 1 comment
Labels
enhancement New feature or request

Comments

@frippe75
Copy link

frippe75 commented Sep 4, 2024

I've deployed vault using helm. Configured it to be my local CA for example.com.
Configued cert-manager to use a vault-issuer
Deployed keycloak with certs from Vault CA (keycloak.example.com).---

Configured keycloak to allow OIDC client from vault.

But when onboarding vault.example.com as OIDC client against keycloak.example.com.
It does not trust the cert of keycloak. One it issued itself :-)

So cannot do...

vault write auth/oidc/config \
  oidc_discovery_url="https://keycloak.example.com/realms/example-com" \
  oidc_client_id="vault-client" \
  oidc_client_secret="************'" \
  default_role="default" \
  oidc_discovery_ca_pem="/tmp/vault-ca-root.pem"

Using curl outside the pod where the vault CA cert has been added to the linux tls trust store the discovery url works just fine.
Installed nc in the vault pod and I can reach the keycloak url from there...

@frippe75 frippe75 added the enhancement New feature or request label Sep 4, 2024
@frippe75
Copy link
Author

frippe75 commented Sep 4, 2024

2024-09-04T12:37:53.758Z [ERROR] auth.oidc.auth_oidc_123b42f5: error checking oidc discovery URL: error="error creating provider with given values: NewProvider: unable to create provider: Get \"https://keycloak.example.com/realms/example-com/.well-known/openid-configuration/\": tls: failed to verify certificate: x509: certificate signed by unknown authority"

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

1 participant