Bug 1038853
Summary: | Facilitate SSL Mutual Auth (Client certs) configuration per-app | ||
---|---|---|---|
Product: | OpenShift Container Platform | Reporter: | Keith Robertson <kroberts> |
Component: | RFE | Assignee: | jofernan |
Status: | CLOSED CURRENTRELEASE | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | 3.0.0 | CC: | agoldste, ansilva, aweiteka, bleanhar, bretm, dgregor, dvarga, erich, jkaur, jkeck, jmoran, jstrong, libra-onpremise-devel, lmeyer, lphiri, nicholas_schuetz |
Target Milestone: | --- | ||
Target Release: | --- | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2015-08-18 12:52:44 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | |||
Bug Blocks: | 1038857, 1042924 |
Description
Keith Robertson
2013-12-05 23:58:58 UTC
Created a trello card for this feature (includes blocked bugs) - https://trello.com/c/m98XJLY1/140-request-and-validate-client-certificates The current way to implement this would be to install and configure the rubygem-openshift-origin-frontend-apache-vhost frontend on your nodes, which creates individual vhost confs in /var/lib/openshift/.httpd.d per gear. An administrator can then hand-edit these confs as desired, keeping in mind that they will be re-created from scratch (and thus changes lost) if the gear is moved. I should also note that the apache-vhost frontend only covers the standard 80/443 ports - websockets ports at 8000/8443 and port-proxy ports aren't really amenable to hand-editing. So this workaround has a number of drawbacks. *** Bug 1038857 has been marked as a duplicate of this bug. *** *** Bug 1042924 has been marked as a duplicate of this bug. *** Marking related bugs as duplicates. SSLVerifyDepth and SSLCACertificateFile would also need to be configurable as part of this solution. This is now possible with OpenShift Enterprise 3.0. Simply create a Route via the API and set 'passthrough' TLS. The connection with be terminated by the Pod (or Gear in 2.x terminology). Certificates can be injected in to Pods through the Secrets API. https://docs.openshift.com/enterprise/3.0/architecture/core_concepts/routes.html#passthrough-termination *** Bug 1259223 has been marked as a duplicate of this bug. *** |