[ 
https://issues.apache.org/jira/browse/NIFI-7333?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17081642#comment-17081642
 ] 

Alex Resnick commented on NIFI-7333:
------------------------------------

I am using the NiFi docker image within kubernetes and tried updating the 
truststore at /usr/local/openjdk-8/lib/security/cacerts but since the docker 
image runs as a non-root user i didn't have the permissions.  However i did 
some hackiness using init containers to copy the cacerts file to a directory 
where the nifi user had privs to write to the file and then mounted the file 
into the final container using lubernetes volumeMounts.  Definitely more 
complicated than it needs to be so I will happy once this is resolved.

> OIDC provider should use NiFi keystore & truststore
> ---------------------------------------------------
>
>                 Key: NIFI-7333
>                 URL: https://issues.apache.org/jira/browse/NIFI-7333
>             Project: Apache NiFi
>          Issue Type: Bug
>          Components: Core Framework, Security
>    Affects Versions: 1.11.4
>            Reporter: Andy LoPresto
>            Priority: Major
>              Labels: keystore, oidc, security, tls
>
> The OIDC provider uses generic HTTPS requests to the OIDC IdP, but does not 
> configure these requests to use the NiFi keystore or truststore. Rather, it 
> uses the default JVM keystore and truststore, which leads to difficulty 
> debugging PKIX and other TLS negotiation errors. It should be switched to use 
> the NiFi keystore and truststore as other NiFi framework services do. 



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

Reply via email to