Skip to content

Commit da152d4

Browse files
mount self-signed certificates
1 parent 3049cbc commit da152d4

File tree

1 file changed

+3
-2
lines changed

1 file changed

+3
-2
lines changed

docs/configuration.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -707,8 +707,9 @@ server {
707707
## Internal Certificate Authority
708708
By default, certificates are not being verified when outbound traffic goes from Shuffle. This is due to the massive use of self-signed certificates when using internal services. You may ignore certificate warnings by adding `SHUFFLE_SKIPSSL_VERIFY=true` to the environment of each relevant service - most notably used for Orborus. If you want to accept your Certificate Authority for all requests, there are a few ways to do this:
709709

710-
1. Docker Daemon level (recommended) - point to your cert: `$ dockerd --tlscacert=/path/to/custom-ca-cert.pem`
711-
2. Add it to every app (per-image configuration). You can do this by modifying the Dockerfile for an app and manually building it with the certificate in the Dockerfile of each Docker image. Restart Shuffle after this is done.
710+
1. Mount your CA certificates (recommended): Add the ./certs:/certs mount to the Orborus service in your docker-compose.yml. Ensure that the shuffle directory contains a certs subdirectory with all the necessary certificate files. This will automatically append all certificates in ./certs to the system's root CA.
711+
2. Docker Daemon level - point to your cert: `$ dockerd --tlscacert=/path/to/custom-ca-cert.pem`
712+
3. Add it to every app (per-image configuration). You can do this by modifying the Dockerfile for an app and manually building it with the certificate in the Dockerfile of each Docker image. Restart Shuffle after this is done.
712713

713714
As this may require advanced Docker understanding, reach out to ask us about it: [[email protected]](mailto:[email protected])
714715

0 commit comments

Comments
 (0)