Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

insecure_skip_verify for upstream #1201

Open
5 tasks done
wei840222 opened this issue Nov 18, 2024 · 0 comments
Open
5 tasks done

insecure_skip_verify for upstream #1201

wei840222 opened this issue Nov 18, 2024 · 0 comments
Labels
feat New feature or request.

Comments

@wei840222
Copy link

Preflight checklist

Ory Network Project

No response

Describe your problem

In the company's own Kubernetes cluster, some applications such as Kibana use self-signed CA certificates to host HTTPS services. Since the environment is not public to the Internet, I want to directly trust these self-hosted HTTPS services.

Describe your ideal solution

add InsecureSkipVerify option in here https://github.com/ory/oathkeeper/blob/master/proxy/proxy.go#L77.

http.Transport{
  TLSClientConfig: &tls.Config{
    InsecureSkipVerify: true, // in cluster server certificate is not trusted.
}

Workarounds or alternatives

https://github.com/ory/oathkeeper/pull/1197/files

Version

v0.40.7

Additional Context

No response

@wei840222 wei840222 added the feat New feature or request. label Nov 18, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
feat New feature or request.
Projects
None yet
Development

No branches or pull requests

1 participant