Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Make helm chart compatible with custom CA for dex #2642

Open
anton264 opened this issue Apr 13, 2024 · 5 comments
Open

Make helm chart compatible with custom CA for dex #2642

anton264 opened this issue Apr 13, 2024 · 5 comments

Comments

@anton264
Copy link

Is your feature request related to a problem?

When using dex against self hosted sign-in methods with a custom CA dex will fail to contact the server.

Related helm chart

argo-cd

Describe the solution you'd like

It would be nice if there was a better method in the helm values to specify a CA certificate, either as a custom string or refering to a configmap.

Describe alternatives you've considered

This can be solved by using the volumemounts but can be tricky to get right.

Additional context

No response

@mkilchhofer
Copy link
Member

Are you using the --dex-server-strict-tls parameter inside argocd-server? E.g by settings:

configs:
  params:
    server.dex.server.strict.tls: true

?

@anton264
Copy link
Author

I dont see how that would solve the issue. To be clear the problem happens when dex is communicating with external auth-providers which have a self-signed CA, not in the internal communication between the argo services.

@mkilchhofer
Copy link
Member

To be clear the problem happens when dex is communicating with external auth-providers which have a self-signed CA, not in the internal communication between the argo services.

Aah now I understand. I will try to understand how that is solved in both a vanilla dex and our bundled "customized" dex.

@mkilchhofer
Copy link
Member

I studied the dex vanilla docs:
https://dexidp.io/docs/connectors/

It seems that

  1. not all connectors supports using a custom CA
  2. the ones who supports a custom CA have no common approach of using it

Do you have other opinions or ideas, @anton264 ?

@mkilchhofer
Copy link
Member

mkilchhofer commented Jun 10, 2024

@anton264 friendly ping/reminder

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants