x509: Certificate signed by unknown authority #4847
-
We use Envoy Gateway(installed using helm chart) as our Gateway API in MicroK8s cluster(redhat VM, air-gapped). We have our backend application and keycloak server running as pod inside micro K8s redhat VM. Our domain 'https://ppp.company.cloud' works as expected without using keycloak as our authentication server. As everything is in air-gapped installation I use firefox browser in my VM to access the 'https://ppp.company.cloud' domain(/etc/hosts entries are made) which has a self signed certificate. But once we create a security policy I starts to get following error. How can I make the security policy trust the self-signed certificate I have created. My firefox browser doesnot trust it but gives me warning. Is there any option to make the security policy by pass the certificate validation. Could you please help here. Sharing our security policy yaml
|
Beta Was this translation helpful? Give feedback.
Replies: 2 comments 3 replies
-
the docs are not in yet, but you should be able to achieve this using the cc @zhaohuabing |
Beta Was this translation helpful? Give feedback.
-
May I ask one more question here, how is SecurityPolicy trying to connect to the issuers and verify the certificate? |
Beta Was this translation helpful? Give feedback.
Similar discussion at #4838 may be its more useful