-
Notifications
You must be signed in to change notification settings - Fork 29
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Auth server need custom CA certs when working behind company proxies #904
Comments
This is awful... xD Why does the Storage service also needs this? It shouldn't be making calls to the Internet. I am a bit concerned about this feature request (mounting overlays if detected) as from a privacy and security perspective it can be very problematic and enable all kind of attacks but a compromise might be to add a --ca-certificates flag to mount the given path in the containers. |
I thought storage service also need to connect privately hosted S3 service as it also use http protocol. I really didn’t tested need for adding certs for storage, so we can ignore it for this case. If overlay is not safe idea , hope cli could use command line args or environment variables to mount custom CA certs only during development. It could be opt-in only feature |
Can you test #905? To do it:
If you are on MacOS you may also need to run the command below before running the
Well, the unsafe part is detecting it and mounting it automatically as an attacker could then tamper with the hosts entries or even mount a malicious binary hoping that a developer enters real credentials while testing. |
This worked in my proxied environment. I have use "v" in tag. Thanks a lot for adding new feature so quickly. |
Problem
Auth server cannot communicate to oauth providers when running on laptop behind corp proxy environment with
nhost up
cli command.Context
In many corporate environments all network traffic from laptops has to go through proxies (running on-device/central) which act as
man-in-the-middle
forhttps
traffic. Due to TLS handshake failure betweenauth
server and oauth providers likeazure
, we are getting error. Same code works when running outside corp proxy environment.Workaround
We need to add proxy's CA Cert to container's system trusted certifications to make tls handshake work between
auth
server andazure
.workaround is, create
compose.override.yml
file with following overlay options in repo root, then copy.nhost/docker-compose.yaml
file generated bynhost up
to root, then rundocker compose up
to use both files.Even though this works, it hiders the developer productivity of NOT using
nhsot
cliAsk
Please provide a way to extend generated docker compose file to include extra volume mounting option so we can use custom CA certs with
auth
andstorage
services.Options:
compose.override.yml
overlay file in root and use both files.auth
andstorage
containers innhost.toml
The text was updated successfully, but these errors were encountered: