-
Notifications
You must be signed in to change notification settings - Fork 4.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Document how to add corporate root SSL certificates #1408
Comments
I'm not exactly sure why this method isn't working, since it seems like it should. Either way, we should expose something similar to |
@r2d4 Are you able to tell whether bootlocal.sh runs before or after the certificate configuration happens? If before, there's the issue. I'd love to be able to just dump my cert into |
@r2d4 The other issue would be that |
The latest minikube VM isn't actually based off of boot2docker any more. You can find the buildroot documentation online. What I did was add the appropriate crt to both the |
@calaniz I will give this a shot. |
For what it's worth, I tried following the advice of @calaniz above, but it didn't work for me on boot. I dropped my certs into Trying to figure out a way to get this to work in Buildroot. |
Hmm, so I tried doing this again today and I think there might have been an issue with the certs I had on my local system. Reinstalling the Thanks for your help in the Slack yesterday, @r2d4! |
Is there going to be an easy way to do this at install/runtime without the need to rebuild ISOs and other steps? |
We are unable to run our docker repo without a cert and it's not exposed to the internet, iow we must use a self signed cert. |
Could someone provide the steps to create the minikube ISO with my certs and how to pass it to minikube start? |
@dkirrane I actually forgot I was supposed to write documentation for this. A few months ago, I added a flag to Minikube that lets you specify a remote volume for generating the ISO (if you're making it from scratch). See: #1657Unfortunately, I no longer have access to the workstation / network where I was doing this development work. But if I remember right, you should be able to use the
Hopefully this is helpful for you. Sorry I can't test this further anymore. |
Hi, Docker wants to have the certs for repository's in /etc/docker/certs.d/site/ca.crt |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
Any update on this? I'm not sure if I can do this, but /remove-lifecycle stale |
Stale issues rot after 30d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
Still an issue /remove-lifecycle rotten |
This is still an issue for me. /remove-lifecycle rotten |
This is also still an issue for me. I found no real sophisticated solution for this problem at the moment. |
This is still an issue for me. If we have any solution where I can inject my SSL would be very helpful. |
still an issue for me |
I tried all of the above to no avail, it's still an issue for me |
this is an issue with me as well |
This is still an issue for me. /remove-lifecycle rotten |
You can get the SSL into minikube by adding it to the If you go to I did have this all working awhile ago, wrote some docs on it and then it all stopped working :(, so I have a feeling that I also need a way to add the self signed cert into the ca-certificates or something |
This steps worked for me.
|
/remove-lifecycle rotten |
The following just worked for me, so I'm sharing it in case anybody else can benefit from it. Following on @LupusUmbrae recommendation (which I tried but did not work for me), I settled by providing the PEM-encoded certificate file for the private registry in the following path:
I set this file with 750 permissions just in case, recreated the VM and was able to connect to the registry without any further issues. minikube version: v0.28.2 |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
As @mvaldesdeleon commented if you add the SSL to the files it works, for me it turns out I needed the FQDN not just the domain root. A short document on this would help I think |
Seems also to work for me with the hint from @mvaldesdeleon. |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
I used to have this working with minikube 1.1 by following @mvaldesdeleon 's advice, but it no longer works with minikube 1.2
EDIT: Well, I take that back, somehow it pulled the image correctly:
It just couldn't put the new image in the cache for some reason... note the only one in the cache is the old
So I guess this is a minor annoyance |
This PR allows users to add root CA certificates in minikube VM. CA certificates in $HOME/.minikube/certs will be populated to system certificate store. Note: This requires a change to minikube ISO so you may need to delete and start a brand new minikube VM. Closes: kubernetes#1408 Signed-off-by: Zhongcheng Lao <[email protected]>
This PR allows users to add root CA certificates in minikube VM. CA certificates in $HOME/.minikube/certs will be populated to system certificate store. Note: This requires a change to minikube ISO so you may need to delete and start a brand new minikube VM. Closes: kubernetes#1408 Signed-off-by: Zhongcheng Lao <[email protected]>
@kevinpauli @ghandim @mvaldesdeleon @certifiedwaif @LupusUmbrae @isuftin @chino @jwflory @isuftin @ztripez I believe this issue will be solved by this PR and I am excited about it ! please let me know if this PR fixes the issue you are facing. |
This is a question/feature request.
I am currently operating minikube on a network that requires all SSL traffic to be intercepted using a root SSL certificate. Minikube is using the Virtualbox driver.
Using docker-machine and boot2docker, I was able to add my root certificate to I need to be able to append my SSL root cert to the /var/lib/boot2docker/certs directory. This does not work with the minikube ISO. What does work is appending my certificate to /etc/ssl/certs/ca-certificates.crt
I create a bootlocal.sh for this. This is the command I run from my host:
This works fine until I restart the VM. It looks like what's happening is that bootlocal may be running first or not at all because when the machine restarts, ca-certificates.crt is back to the original state without my certificate in it.
How should I add my root SSL cert into the VM so Docker can pull from registries?
minikube version: v0.18.0
OS: OSX 10.10.5
Drivername: Virtualbox
ISO: minikube-v0.18.0.iso
Install Tools: homebrew
What happened:
Corporate root SSL certificate does not exist on the VM and is not picked up by the Docker daemon
What you expected to happen:
I expect to be able to add my root SSL certificate to the VM and have Docker be able to pick it up to validate TLS communication
How to reproduce it (as minimally and precisely as possible):
The text was updated successfully, but these errors were encountered: