Skip to content
This repository has been archived by the owner on Apr 22, 2024. It is now read-only.

Platform1: Pass the trusted CA from the OIDC config to the HTTP GET call just like POST #39

Closed
sbko opened this issue Feb 22, 2024 · 3 comments · Fixed by #42
Closed
Assignees

Comments

@sbko
Copy link

sbko commented Feb 22, 2024

original PR istio-ecosystem/authservice#235

This has been requested by P1

@sergicastro sergicastro self-assigned this Feb 22, 2024
@nacx nacx assigned nacx and unassigned sergicastro Feb 22, 2024
@sergicastro sergicastro self-assigned this Feb 22, 2024
@sergicastro
Copy link
Contributor

I saw this today and started working on it.

Do you the customer needs to specify the same CA for the JWKS get call? or could it just use the config the OIDC is using?

@nacx
Copy link
Member

nacx commented Feb 22, 2024

In the original issue, I see they create an additional field for the trusted CA inside the JWKS settings.
I guess it is safe to just use the existing one in the OIDC config? In the end all endpoints should be exposed by the same IdP

@sbko
Copy link
Author

sbko commented Feb 22, 2024

I think it can use the existing one. The main problem is that the original authservice doesn't pass the configured CA trust when making HTTP GET calls.
bigbang implemented a workaround for this by setting SSL_CERTFILE env variable pointing to trust bundle https://repo1.dso.mil/big-bang/product/packages/authservice/-/merge_requests/116

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

3 participants