-
Notifications
You must be signed in to change notification settings - Fork 6
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CERTIFICATE_VERIFY_FAILED #3
Comments
You can achieve this by parsing the kube config, something like:
I'm using environment as a custom class to contain the kube cluster configuration. Then in your client:
I set the accessToken to '' in the client cert approach, the api should not probably make the accessToken required! |
I noticed also there is a kubeconfig auth processor in the codebase (https://github.com/xclud/dart_kubernetes/blob/main/lib/src/config.dart) which could be used to parse the kubeconfig file and then setup the SecurityContext as above. |
Thanks! Could something like this work also? kubectl get secrets -o jsonpath="{.items[?(@.metadata.annotations['kubernetes.io/service-account.name']=='default')].data.token}" |
Hi
when connecting to a kubernetes cluster I use the client-certificate-data: from ~/.kube/config and get the following exception.
HandshakeException (HandshakeException: Handshake error in client (OS Error:
CERTIFICATE_VERIFY_FAILED: unable to get local issuer certificate(handshake.cc:393)))
where I am supposed to install the certificate-authority-data: from ~/.kube/config ?
Or is there an easier way to get this done?
Thanks. Bast
The text was updated successfully, but these errors were encountered: