Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Allow using custom trust store for ssl connections #196

Open
EmteZogaf opened this issue Sep 2, 2023 · 1 comment
Open

Allow using custom trust store for ssl connections #196

EmteZogaf opened this issue Sep 2, 2023 · 1 comment
Labels
enhancement New feature or request

Comments

@EmteZogaf
Copy link
Collaborator

Connections to keycloak and to the backend itself using https leads to certificate verification errors in the test environment, because the domain certificate's issuing certificate is not part of the base docker image ssl certificates.

Current workaround is to mount a custom trust store containing all necessary ca certificates and injecting it into the jvm by adding the environment variable JDK_JAVA_OPTIONS to the backend environment in the docker-compose.yml:

    environment:
      JDK_JAVA_OPTIONS: "-Djavax.net.ssl.trustStore=/mount/path/of/backend-truststore.p12 -Djavax.net.ssl.trustStorePassword=securePassword"
@EmteZogaf EmteZogaf added the enhancement New feature or request label Sep 2, 2023
@juliangruendner
Copy link
Contributor

juliangruendner commented Sep 3, 2024

@EmteZogaf check back with @michael-82 after he has finished this PR #238 and check if that does not already resolve your problem.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

2 participants