-
-
Notifications
You must be signed in to change notification settings - Fork 10
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Improving certificate management #143
Comments
I think all these suggested options are good. What I think it is important for the user experience is that:
|
Another option I just came across: # install udocker
conda create -n udocker -c conda-forge udocker --yes
conda activate udocker
# create fedcloudclient container
udocker pull tdviet/fedcloudclient:1.3.1
udocker create --name=fedcloudclient131 tdviet/fedcloudclient:1.3.1
# access site
oidc-token <your-account>
export OIDC_ACCESS_TOKEN=<access-token-from-previous-command>
udocker run --hostenv fedcloudclient131 fedcloud openstack --vo vo.access.egi.eu --site GSI-LCG2 server list |
Thank you, @sebastian-luna-valero, for the workaround. My current plan is:
|
Some sites are still using IGTF certificates from national CAs that are not included to the OS by default. Installing certificates via script from https://github.com/tdviet/python-requests-bundle-certs is not feasible, it is not supported on CentOS and need to be executed separately (additional work for end-users).
Some solutions:
--insecure
for ignoring CA checking (useful for testing but not recommended for production)fedcloud site add --trusted
to add a new site as trusted, ignoring CA checking for the siteThe text was updated successfully, but these errors were encountered: