Skip to content

REST API client does not fall back to the OS trusted keystore #91

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
fioan89 opened this issue Apr 16, 2025 · 0 comments
Open

REST API client does not fall back to the OS trusted keystore #91

fioan89 opened this issue Apr 16, 2025 · 0 comments

Comments

@fioan89
Copy link
Collaborator

fioan89 commented Apr 16, 2025

While testing the proxy support in the plugin with mitmproxy we've noticed that the REST client does not fallback to the OS trusted certificates if it can't find anything in the JVM's default keystore.

Mitmproxy uses self-signed certificates, and it's usually simpler to add the certificate required to the operating system's certificate trust store rather than Toolbox JVM's default keystore. However, by default, JVM-based applications use only the JVM's default keystore, which means connecting to servers will fail due to not trusting the certificate presented.

Ideally, the plugin cascades in the following order:

  • JVM's default keystore
  • Coder configured CA (available in the Settings page under TLS section)
  • OS trusted keystore
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant