-
Notifications
You must be signed in to change notification settings - Fork 31
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Respond 502 when target SSL untrusted #309
Respond 502 when target SSL untrusted #309
Conversation
8fe2746
to
5428bf8
Compare
The I don't seem to have anything in my |
Yea, the certificate(s) aren't committed to the repo or automatically added. Just clone https://github.com/andrewazores/vertx-fib-demo and copy its certificate (src/main/extras/app/resources/vertx-fib-demo.cer) into |
I added documentation for the new possible Looking over that document again I noticed there are a lot of places that name |
Respond with status code 502 and message "Target SSL Untrusted" when attempting a target connection fails for what appears to be an SSL trust issue Fixes cryostatio#307
4c728cd
to
c21877c
Compare
Where can I find the credentials to authenticate into vertx-fib-demo? I see that it's
Yes, that seems to be the case. I'll look over it and submit a fix after. |
The credentials for There is also a |
Tested and everything seems good. Just one last thing for the HTTP API doc. In
So the two possible reasons should be combined. The way I did this in some |
Respond with status code 502 and message "Target SSL Untrusted" when attempting a target connection fails for what appears to be an SSL trust issue
Fixes #307
This can be tested by running
smoketest.sh
. Normally, thetruststore
directory should contain thevertx-fib-demo.cer
copied from that project's repo, and this allows ContainerJFR to connect to the demo application when running in the smoketest. By removing the.cer
from the truststore (ex. simplymv truststore/vertx-fib-demo.cer .
) and re-runningsh smoketest.sh
an SSL trust failure can be easily triggered. Before this patch the response is a standard HTTP 404. After this patch the response is a 502 with the custom message "Target SSL Untrusted". This can be seen in the web-client notifications as well as with standard tooling such as curl.