You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
As "an operator" I want "to use my custom CA bundle with K8up" So that "I can use a trusted, verified TLS connection to my backup backend"
Context
To handle TLS connections that use a custom/self-signed CA as certificate issuer, we now create our own K8up container images that includes our own certificates. This allows us to have a verified connection to our S3 compatible backup backend.
We would prefer to have an option in the K8up container image itself to refer a custom CA bundle. This is supported in Restic via the --cacert flag.
Effectively, we want to appoint a CA bundle file via an env.var or config file for the K8s Pod.
We have the same problem with k8up and our s3 server runs as TLS with a self-sign certificate. We would like to use the feature for mounting certificate files.
I am interested in developing this feature. I'd like to add these features:
First, add options for using extraMount options to add certificate files
Second, add env (or s3 parse URI) for TLS insecure
Summary
As "an operator"
I want "to use my custom CA bundle with K8up"
So that "I can use a trusted, verified TLS connection to my backup backend"
Context
To handle TLS connections that use a custom/self-signed CA as certificate issuer, we now create our own K8up container images that includes our own certificates. This allows us to have a verified connection to our S3 compatible backup backend.
We would prefer to have an option in the K8up container image itself to refer a custom CA bundle. This is supported in Restic via the
--cacert
flag.Effectively, we want to appoint a CA bundle file via an env.var or config file for the K8s Pod.
Out of Scope
Further links
Acceptance Criteria
No response
Implementation Ideas
SSL_CERT_FILE
variableThe text was updated successfully, but these errors were encountered: