-
Hello, I am using argo workflow with SSO and OpenId Connect (implemented with keycloak).
How to solve it? Thanks for your advices. |
Beta Was this translation helpful? Give feedback.
Replies: 8 comments 18 replies
-
For those who have the same problem, I have solved it by setting the ca cert in a configmap and mounting it in a file under |
Beta Was this translation helpful? Give feedback.
-
Fixed in ae7eeeb
I am releasing 3.1.10 today
…Sent from my iPhone
On Sep 9, 2021, at 11:13 PM, Peter O. ***@***.***> wrote:
@LeJav did you do anything else beside mounting your CA pem file under /etc/ssl/certs? That's what I did and I am still getting this error.
—
You are receiving this because you are subscribed to this thread.
Reply to this email directly, view it on GitHub, or unsubscribe.
Triage notifications on the go with GitHub Mobile for iOS or Android.
|
Beta Was this translation helpful? Give feedback.
-
@sarabala1979 thanks for your response, however, I deleted my question, because it turned out I used the wrong certificate. With the correct one the procedure as explained by @LeJav worked for me as well. |
Beta Was this translation helpful? Give feedback.
-
I have currently no access to my configuration.
I will describe next week the modifications I have done to the Helm chart in order to mount the cert configmap in the pod.
|
Beta Was this translation helpful? Give feedback.
-
Hi @LeJav and my values.yal for volume looks like this: volumeMounts:
- name: certificate
mountPath: /etc/ssl/certs/rootCA.crt # your self-signed CA part inside the secret
subPath: ca-cert
volumes:
- name: certificate
configMap:
name: custom-root-cert still I am facing the issue of 509 error. Can you help where I am going wrong? |
Beta Was this translation helpful? Give feedback.
-
I got the same issue. I got this working in another environment and mounting the certs in
I double checked the CA certificates, in fact I can spin up a curl container and it works perfectly with the same CAs when querying the SSO endpoint. Any idea on how to debug this further? Log level in debug mode and enabling --verbose does not help at all. |
Beta Was this translation helpful? Give feedback.
-
I am sorry but I am not working any more with the configuration with the certificates mounted in the pod. |
Beta Was this translation helpful? Give feedback.
-
Another reminder since I had to debug a bit to get it to work:
inside values.yaml: server:
volumeMounts:
- name: intermediate-ca
mountPath: /etc/ssl/certs/
volumes:
- name: intermediate-ca
secret:
secretName: intermediate-ca ca-secret.yaml: apiVersion: v1
kind: Secret
metadata:
name: intermediate-ca
namespace: argo
stringData:
root-ca.crt: |
CERT1
intermediate-ca.crt: |
CERT2
type: Opaque |
Beta Was this translation helpful? Give feedback.
For those who have the same problem, I have solved it by setting the ca cert in a configmap and mounting it in a file under
/etc/ssl/certs