Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Allow for custom certificate chains #105

Merged
merged 1 commit into from
Oct 7, 2022

Conversation

EandrewJones
Copy link
Contributor

Description

When hosting Doccano behind a reverse proxy with encryption (HTTPS), it is possible that the Certificate Authority used to generate the certs is not a recognized actor by openssl (actually, this is quite likely since openssl, by default trusts no one). Under these circumstances, Doccano Client will fail to connect with the server unless the cert chain is added to the client server's list of trusted certs. Adding these certs to all users' machines is cumbersome and is not viable for some less tech savvy users.

Instead, it is much easier to share the cert chain .pem file amongst your team and pass this to the request Session's verify argument.

I have added a verify argument to other DoccanoClient init function to be passed to the session. It is not as clean as a kwargs approach, but it gets the job done and solves existing issues (#21).

@EandrewJones EandrewJones requested a review from Hironsan as a code owner October 5, 2022 17:36
@houssam7737
Copy link
Contributor

Makes sense to me, but I will let @Hironsan approve and merge this one. Not sure if they have another approach in mind.

@EandrewJones
Copy link
Contributor Author

EandrewJones commented Oct 6, 2022 via email

@Hironsan Hironsan merged commit bc750d6 into doccano:master Oct 7, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants