Skip to content

Add the ability to provide custom CA certs to the redis client #9121

@fullykubed

Description

@fullykubed

Is your feature request related to a problem? Please describe.
I would like to use self-signed certificates (for example, when using cert-manager in a Kubernetes cluster) for the redis connection.

Currently, CA verification has to be disabled to prevent the following error:

{"event": "Redis Connection failed, retrying... (Error 1 connecting to redis-1f0f-master.authentik:6379. [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: self-signed certificate in certificate chain (_ssl.c:1000).)", "level": "info", "logger": "authentik.lib.config", "timestamp": 1712179998.699394, "redis_url": "rediss://:rC31F9HFEOUth9ob3fdBszKUlTlaGa9BtHmq1yJ1z0yGTgBlFNOIi8ZEkhSWJ5Rl@redis-1f0f-master.authentik:6379/0"}
Stream closed EOF for authentik/authentik-server-595cc7f6f9-psf4l (server)

Describe the solution you'd like

It would be ideal to expose an additional environment variable to pass a value into ssl_ca_certs for the redis client.

Describe alternatives you've considered

None

Additional context

None

Metadata

Metadata

Assignees

No one assigned

    Labels

    enhancementNew feature or request

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions