-
Notifications
You must be signed in to change notification settings - Fork 15
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[FEATURE] Support self-signed certificates in builds #258
Comments
Related Openshift Builds epic link: |
Sounds like an optional secret reference in the Git Source where there referenced secret contains a ca.crt. Is that what you are looking for @diksha1999 ? |
From refinement: we need a SHIP to work through the details and propose new API changes. My personal preference is that whatever path we take, it complements workflows that utilize cert-manager, and it's newer trust-manager component in particular. |
@adambkaplan I was the one initially requesting this feature. An optional secret reference that @SaschaSchwarze0 mentioned would be sufficient. The integration with cert-manager might be nice to have but I would prefer not to create a mandatory dependency to another controller here. |
Obtaining trust CAs for git servers is one use case, but it isn't the only one. OKD's Build system (which was the inspiration for Shipwright) has a lot of overlapping configuration on this front that I frankly find confusing:
I'm wondering if we start with the most general use case of adding a global TLS trust bundle to a build, so that it can be used for all network traffic? |
Having only one (global) trusted CA setting for the entire build sounds good to me. But it might make sense to still allow just adding additional certificates whilst keeping a default set of well-known public CAs. |
Is there an existing feature request for this?
Is your feature request related to a problem or use-case? Please describe.
Shipwright builds are failing due to the issues while executing the first "source-default" step of ShipWright when a self-signed custom CA bundle is being used for a Git server.
Scenarios:
Describe the solution that you would like.
Support for self-signed enterprise certificates in shipwright builds.
In enterprise environments, TLS certificates are often issued by a "corporate" certificate authority that is not globally trusted by RHEL. Actions that use HTTPS as transport (ex: cloning git source, pulling container images, downloading dependencies) need to be able to find and utilize the correct certificate authority.
Describe alternatives you have considered.
No response
Anything else?
Related Openshift Builds epic link:
https://issues.redhat.com/browse/BUILD-1152
The text was updated successfully, but these errors were encountered: