Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add .spec.insecureSkipVerify to HelmRepository for type: oci #1345

Open
wants to merge 2 commits into
base: main
Choose a base branch
from

Conversation

unai-ttxu
Copy link

Allow connecting to Helm OCI HTTPs repositories without verifying the server's certificate chain and host name.

Example:

apiVersion: source.toolkit.fluxcd.io/v1beta2
kind: HelmRepository
metadata:
  name: myhelmrepo
  namespace: default
spec:
  type: oci
  interval: 1h
  insecureSkipVerify: true
  url: oci://my-self-signed-helm-repo-url:5000/charts

@unai-ttxu unai-ttxu force-pushed the task/support_InsecureSkipVerify_main branch from af86606 to ad14db4 Compare January 24, 2024 18:55
Signed-off-by: Unai Arrien <[email protected]>
@stefanprodan
Copy link
Member

stefanprodan commented Jan 24, 2024

To work with self-signed certs you can provide the CA to Flux, please see https://fluxcd.io/flux/components/source/helmrepositories/#cert-secret-reference

For security reasons, we decided to not have insecureSkipVerify anywhere in Flux controllers.

@unai-ttxu
Copy link
Author

To work with self-signed certs you can provide the CA to Flux, please see https://fluxcd.io/flux/components/source/helmrepositories/#cert-secret-reference

For security reasons, we decided to not have insecureSkipVerify anywhere in Flux controllers.

Hi @stefanprodan, thank you so much for the comment!

I thought it'd be a nice feature to be able to configure self-signed Helm registries without handling the self-signed CA certificates, specially in development environments. But I understand your decision since it's not a good practice.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants