mirror of
https://github.com/fatedier/frp.git
synced 2026-05-15 08:05:49 -06:00
[GH-ISSUE #4988] TLS and ProxyURL settings for OIDC auth token specific connections #3931
Labels
No labels
In Progress
WIP
WaitingForInfo
bug
doc
duplicate
easy
enhancement
future
help wanted
invalid
lifecycle/stale
need-issue-template
need-usage-help
no plan
proposal
pull-request
question
todo
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/frp#3931
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @caphrim007 on GitHub (Sep 20, 2025).
Original GitHub issue: https://github.com/fatedier/frp/issues/4988
Bug Description
This is more of a question.
I've seen the settings for
transport.tlsin the frpc and frps config filesBut our experience using OIDC to authenticate to an https endpoint using something like a self-signed certificate, raises errors in FRPC logs about certificate verification.
We worked around this by adding the CA chain to
/etc/ssl/certs/ca-certificates.crt, but I was wondering if there is...or if there should be...similar TLS settings for acquiring OIDC tokens? Or is the filesystem path the only option?The URL that is fronted by this custom CA chain is the one specified in
auth.oidc.tokenEndpointURL. For example, in the following,how can one configure FRPC to verify the certificate presented at that HTTPS endpoint? is there config available in the frpc.toml file? or is it required to update system certificates?
The second part of my question is whether all of the above is also configurable (in the frpc.toml file) for Proxy settings used for acquiring OIDC auth tokens.
There is
But that doesnt appear to apply to code that fetches OIDC auth tokens.
how can one configure FRPC to use Proxy settings for OIDC auth tokens? is there config available in the frpc.toml file? or is it required to set HTTP_PROXY and HTTPS_PROXY environment variables before starting frpc?
frpc Version
0.64.0
frps Version
0.64.0
System Architecture
linux/amd64
Configurations
These configurations are high-level. you'll need a functioning oidc provider and create client ids and secrets, etc. so this isnt likely functional as-is in your environment
Logs
2025-09-20 17:16:59.462 [I] [sub/root.go:149] start frpc service for config file [/var/vcap/jobs/frpc/config/frpc.toml]
2025-09-20 17:16:59.462 [I] [client/service.go:314] try to connect to server...
2025-09-20 17:16:59.509 [W] [client/service.go:317] connect to server error: couldn't generate OIDC token for login: Post "https://foo.bar.local/auth/oauth/token": tls: failed to verify certificate: x509: certificate signed by unknown authority
2025-09-20 17:16:59.509 [I] [sub/root.go:167] frpc service for config file [/var/vcap/jobs/frpc/config/frpc.toml] stopped
Steps to reproduce
...
Affected area
@fatedier commented on GitHub (Sep 21, 2025):
transport.tlsandtransport.proxyURLare configuration options for frpc connecting to frps, and they do not apply in other scenarios.I think adding a parameter to configure the OIDC CA file is reasonable. And we can also support
insecureSkipVerifyfor debuging.I prefer adding a separate proxy configuration within the OIDC settings.