Uploaded image for project: 'OpenShift Bugs'
  1. OpenShift Bugs
  2. OCPBUGS-35065

OC login from MacOS is reporting error: x509: “openshift-oauth” certificate is not trusted for hosted clusters

    • Icon: Bug Bug
    • Resolution: Done
    • Icon: Major Major
    • None
    • 4.15
    • oc
    • None
    • Quality / Stability / Reliability
    • False
    • Hide

      None

      Show
      None
    • None
    • Important
    • No
    • None
    • None
    • None
    • None
    • ?
    • None
    • None
    • None

      Description of problem:

      OC client for MacOS is reporting the following issue during the oc login process in hostedclusters:
      
      error: x509: “openshift-oauth” certificate is not trusted
      
      The same issue does not happen with oc client installed on linux machines
      
      
      This is the found error in oc logs:
      
      I0607 11:31:28.701523   52029 request_token.go:588] unexpected error during system roots probe: x509: “openshift-oauth” certificate is not trusted <---
      

      Version-Release number of selected component (if applicable):

      OC client for MacOS version 4.15.16

      How reproducible:

      Easily

      Steps to Reproduce:

      - Install a hosted cluster with self-signed certificates
      - Install oc client in a MacOS machine
      - Run oc login command (oc login -u kubeadmin --server=https://<API-URL>:<port> --insecure-skip-tls-verify=true --loglevel 6) 

      Actual results:

      The message 'x509: “openshift-oauth” certificate is not trusted' is reported

      Expected results:

      It is expected that the login process happens properly

      Additional info:

       

              aos-workloads-staff Workloads Team Bot Account
              rhn-support-bgomes Bruno Gomes
              None
              None
              Ying Zhou Ying Zhou
              None
              Votes:
              0 Vote for this issue
              Watchers:
              5 Start watching this issue

                Created:
                Updated:
                Resolved: