So I have nginx-ingress with tls termination between end user and boundary-worker.
But when I am trying to connect I got:
error fetching connection to send session teardown request to worker: Error dialing the worker: failed to WebSocket dial: failed to send handshake request: Get "http://<dns_name>:443/v1/proxy": x509: certificate is valid for <dns_name>
So it tries to call http http://<dns_name>:443/v1/proxy"
Am I missing something? May be there is some workaround?
Have same problem in k8s deployment, i have virtual server before worker proxy to terminate tls.
Like: client->virtual-server:443>worker:9202.
When i try to connect from client im getting
error fetching connection to send session teardown request to worker: Error dialing the worker: failed to WebSocket dial: failed to send handshake request: Get "http://boundary-worker.domain.com:9202/v1/proxy": context deadline exceeded
If i using public_addr = "boundary-worker.domain.com:443"
getting
error fetching connection to send session teardown request to worker: Error dialing the worker: failed to WebSocket dial: failed to send handshake request: Get "http://boundary-worker.domain.com:443/v1/proxy": x509: certificate is valid for *.domain.com, domain.com, not s_ij08SjLCie
I think that found this source code block, but don’t know about https option.
after this you will need to expose port 9201 or whatever you used in the boundary worker service on the Kubernetes ingress controller service , if you are on AWS; the AWS load-balancer will create a target group and listener for the new port, it should be in a health state. you can also test with telnet worker.domain.com 9201
same for the controller It has 2 port one is cluster port 9201 which is a TCP connection the worker will need to be able to access it so don’t try to put it behind TCP SSL , you can put the API port 9200 behind SSL but i haven’t tried it.