Replies: 1 comment 5 replies
-
The client is not modifying an existing truststore file. It is creating an in-memory truststore instance that is based upon the system truststore contents with the addition of the kubernetes ca cert when that is found via the configuration. That merged truststore instance will then be used by whatever http client implemenation is in place.
|
Beta Was this translation helpful? Give feedback.
5 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Hi,
I work in security for a big organization that uses your library in a number of projects. We also operate the software in environments that require FIPS compliance and we have noticed that that will not work out of the box. In our environments it is strictly prohibited that any software is modifying trust stores. We noticed that your library tries to modify the trust stores when they are loaded from disk and to be used by OkHttp. I would like to understand why the HTTP client needs to modify the trust stores and if there is a way to disable this behaviour completely.
I have seen #3582 and #3867 yet I fail to understand the reasoning here. What information are you trying to write to the trust store and why are you doing that?
Thanks for your help!
Beta Was this translation helpful? Give feedback.
All reactions