Access Resources with self signed TLS Certificate [Docker] #52

Closed
opened 2025-11-19 07:12:54 -06:00 by GiteaMirror · 1 comment
Owner

Originally created by @DevNinja90 on GitHub (Sep 1, 2025).

We have some resources that are only accessable via https. They automatically redirect thir webinterface via HTTP Status Code 307.
When running newt in debug mode this can be observed for the healthprobe.
A connection via pangolin is not succesfull.

We use pangolin in the cloud version for evaluation currently and newt in docker. 10.0.3.1 is the docker host and we want to access a web ui which the host runs. Unfortunately a filesystem / ssh access is not possible. TLS Certs could in theory be exchanged but this then needed to be done for every device (which we have 150 of) and they still would not be trusted.

> WARN: 2025/09/01 11:49:35 Target 1131: health check failed: Get "https://10.0.3.1/rpc": tls: failed to verify certificate: x509: certificate signed by unknown authority
> INFO: 2025/09/01 11:49:35 Target 1131 initial status: unhealthy

What could work:

  • Docker Wrapper Image which adds the CA of my custom devices and compiles again
  • A "allow self signed tls cert" flag i newt and in pangolin

Are there any plans for the secondary idea?

Originally created by @DevNinja90 on GitHub (Sep 1, 2025). We have some resources that are only accessable via https. They automatically redirect thir webinterface via HTTP Status Code 307. When running newt in debug mode this can be observed for the healthprobe. A connection via pangolin is not succesfull. We use pangolin in the cloud version for evaluation currently and newt in docker. 10.0.3.1 is the docker host and we want to access a web ui which the host runs. Unfortunately a filesystem / ssh access is not possible. TLS Certs could in theory be exchanged but this then needed to be done for every device (which we have 150 of) and they still would not be trusted. ``` > WARN: 2025/09/01 11:49:35 Target 1131: health check failed: Get "https://10.0.3.1/rpc": tls: failed to verify certificate: x509: certificate signed by unknown authority > INFO: 2025/09/01 11:49:35 Target 1131 initial status: unhealthy ``` What could work: - Docker Wrapper Image which adds the CA of my custom devices and compiles again - A "allow self signed tls cert" flag i newt and in pangolin Are there any plans for the secondary idea?
Author
Owner

@DevNinja90 commented on GitHub (Sep 1, 2025):

This isssue can be verified by making a wget command to the desired resource

@DevNinja90 commented on GitHub (Sep 1, 2025): This isssue can be verified by making a wget command to the desired resource
Sign in to join this conversation.
1 Participants
Notifications
Due Date
No due date set.
Dependencies

No dependencies set.

Reference: github-starred/newt#52