Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Could not login with self signed certificate #23

Open
whisper-bye opened this issue Mar 5, 2018 · 3 comments
Open

Could not login with self signed certificate #23

whisper-bye opened this issue Mar 5, 2018 · 3 comments
Assignees
Labels
enhancement Request for improving an existing feature

Comments

@whisper-bye
Copy link

No description provided.

@StianOvrevage
Copy link

This is a problem for me as well. As of now it does not look like it's possible to deploy Kong to Kubernetes using the Helm chart and have admin API over HTTP. Only HTTPS using a self signed certificate.

@F0otsh0T
Copy link

F0otsh0T commented Jun 26, 2019

Still a problem - any workarounds? With Konga, you can set ENV NODE_TLS_REJECT_UNAUTHORIZED to "0"

      env:
      - name: NODE_TLS_REJECT_UNAUTHORIZED
        value: "0"

@BartVB
Copy link

BartVB commented Nov 18, 2021

I worked around this problem by adding:

// SSL/TSL: this is the self signed certificate support
app.on('certificate-error', (event, webContents, url, error, certificate, callback) => {
    // On certificate error we disable default behaviour (stop loading the page)
    // and we then say "it is all fine - true" to the callback
    event.preventDefault();
    callback(true);
});

to main.js . I found that on:
https://newbedev.com/how-do-i-trust-a-self-signed-certificate-from-an-electron-app

Of course better to get some proper certificates.

@ajaysreedhar ajaysreedhar self-assigned this Jul 6, 2022
@ajaysreedhar ajaysreedhar added the enhancement Request for improving an existing feature label Jul 6, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement Request for improving an existing feature
Projects
None yet
Development

No branches or pull requests

5 participants