-
Notifications
You must be signed in to change notification settings - Fork 793
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support MacOS keychain for ca's #563
Comments
Thanks for your report. The docker/distribution client, at least, uses the system’s CAs as provided by Golang’s Please provide precise instructions how to reproduce this, and include the output of |
we use artifactory as registry skopeo --debug inspect docker://internal.registry/openshift/origin-pod:v3.9.0 |
Thanks; that uses the default Golang TLS configuration, with only https://github.com/containers/image/blob/bd10b1b53b2976f215b3f2f848fb8e7cad779aeb/docker/docker_client.go#L137 changed; that doesn’t look like it should change things. |
ehm. It could be me (probably), but I have no idea what you are trying to say. |
That’s still unknown; the discrepancy between the certificates you have configured in the macOS keychain and the certificates used by the Golang TLS stack needs to be debugged. Honestly I’m completely unfamiliar with the macOS keychain API (or, really, debugging any macOS native code), so I’m afraid I’m not likely to be that much help with this, in the very near future at least. #563 (comment) is all the pointers I can provide for that right now. Maybe if you can find some other Golang-implemented TLS client that does work, without extra configuration, with the CA trusted by the keychain, that could serve as an indication what needs to be done. But, again, AFAICT the Golang standard library intends to have the keychain roots of trust work by default, and |
@MansM Is this still something you are interested in? Could you help out with a PR? This is not something a bunch of Linux programmers are likely to fix, so we need help from someone with Mac Experience. |
I wish I could, but I lack the knowledge on MacOS internals and go code skills if you want me to run some debug code and provide you with the output I am happily to do so, but for this I am too much a consumer |
@MansM How about adding the certificate to your macOS truststore as a workaround? I did that then skopeo working fine. The command to do that as below, fyi, thanks.
|
A friendly reminder that this issue had no activity for 30 days. |
@ashley-cui @rhatdan do we have a mac package for skopeo? Can we use @lbscorpio 's suggestion to the package or should that be left to the end user? |
Skopeo's is packaged via brew, but I think its maintained by community. Brew doesn't like sudo commands, so I think this might be left for the end user. |
Thanks @ashley-cui . Closing... |
- Remove Kubic repo suggestions where skopeo exists by default - Update macOS installation steps with registry cert addition to truststore (containers#563) Signed-off-by: Lokesh Mandvekar <lsm5@fedoraproject.org>
submitted #1464 to address this in install doc. PTAL |
Is that a workaround? I understood the original report to mean that CAs added to the trusted certificate keychain are ignored; are you just reporting that this actually works fine?
Or is there some subtlety to the command above, maybe adding the certificate to an unexpected keychain, or using some unexpected option combination, in a way that is a workaround for some bug that still continues to exist? |
As a skopeo user within an enterprise I want to use skopeo
on my local mac talking to a registry from the company running an corporate ca signed cert
in order to do skopeo inspect/copy/etc
the error message I got:
x509: certificate signed by unknown authority
The text was updated successfully, but these errors were encountered: