ory/oathkeeper

insecure_skip_verify for upstream

Opened this issue · 0 comments

Preflight checklist

Ory Network Project

No response

Describe your problem

In the company's own Kubernetes cluster, some applications such as Kibana use self-signed CA certificates to host HTTPS services. Since the environment is not public to the Internet, I want to directly trust these self-hosted HTTPS services.

Describe your ideal solution

add InsecureSkipVerify option in here https://github.com/ory/oathkeeper/blob/master/proxy/proxy.go#L77.

http.Transport{
  TLSClientConfig: &tls.Config{
    InsecureSkipVerify: true, // in cluster server certificate is not trusted.
}

Workarounds or alternatives

https://github.com/ory/oathkeeper/pull/1197/files

Version

v0.40.7

Additional Context

No response