Does Temporal scaler allow cert, key and ca base64 encoded as authencation method? #7110
Unanswered
knmsk
asked this question in
Q&A / Need Help
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Hi, I tried the temporal scaler with mTLS authentication options, and it works only when the decoded value of the kubernetes secrets is not base64. If you base64 the certificate and key and then insert this new value into the AWS Secrets Manager it throws:
The question is: Is it something I did wrong, or is this something that the code is missing?
Example:
<encodedbase64cert>for base64 encoded of the certificate:<encodedbase64key>for base64 encoded of the key:Creating the secret works with something like this:
When decoding, it would be:
Example of a secret that doesn't work.
When working with AWS secrets manager, you must use the base64-encoded values (
encodedbase64certandencodedbase64key) since it doesn't allow multiline strings. In the end, it would be mapped something like this:{ "cert": "<encodedbase64cert>", "key": "<encodedbase64key>" }The secret would be created like this:
When decoding:
Beta Was this translation helpful? Give feedback.
All reactions