I now have my corp CA cert (which was made as a k8s secret from the original ca file) present in /usr/local/share/ca-certificates on user pods e.g. jupyter-foo. But if I exec into that container and use openssl to try to connect to some internal site, I get Verification error: unable to verify the first certificate. Manually specifying the root CA to use, which is present in the container, succeeds.
And of course, the Notebook (running some py code) can’t speak to anything internal either.
This also doesn’t solve the problem entirely because the hub container has no cert at all and won’t talk to AD FS for logins. Any help or tips are massively appreciated.
I know this topic is from about a year ago, but I spent a couple of days figuring out how to pass a corporate CA certificate into the JupyterHub pod because I needed it to trust our internal identity server. The suggestions I found online were a bit controversial, so I ended up making my own solution based on the one suggested by abctaylor. I wanted to share it here in case it might be helpful for someone else