mirror of
https://github.com/open-webui/open-webui.git
synced 2026-05-07 11:28:35 -05:00
[GH-ISSUE #23503] issue: Openwebui ignores AIOHTTP_CLIENT_SESSION_SSL for ollama models management #58668
Reference in New Issue
Block a user
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @orKL3mlz on GitHub (Apr 8, 2026).
Original GitHub issue: https://github.com/open-webui/open-webui/issues/23503
Check Existing Issues
Installation Method
Docker
Open WebUI Version
v0.8.12
Ollama Version (if applicable)
0.20.3
Operating System
Debian
Browser (if applicable)
No response
Confirmation
README.md.Expected Behavior
Openwebui should ignore self signed certificate errors if
AIOHTTP_CLIENT_SESSION_SSL = Falsewhen making calls to ollama APIActual Behavior
When trying to manage ollama models from Openwebui, and if the ollama https certificate is self-signed, setting the env variable
AIOHTTP_CLIENT_SESSION_SSL = FalseandREQUESTS_VERIFY = Falsedoesn't ignore certificate errors.From web browser
Go to Admin panel > Connections > Ollama > Manage Ollama
(Makes the API call to
https://openwebui.local/ollama/api/tags/0)Steps to Reproduce
Set
AIOHTTP_CLIENT_SESSION_SSL = FalseandREQUESTS_VERIFY = Falseinside .envConfigure ollama backend to use a self-signed certificate
Configure the connection inside Openwebui
Ollama API endpoint : https://x.x.x.x/ollamaSave the settings and try to click
manageon the same screenLogs & Screenshots
Containers logs
ERROR | open_webui.routers.ollama:get_ollama_tags:452 - HTTPSConnectionPool(host='x.x.x.x', port=443): Max retries exceeded with url: /ollama/api/tags (Caused by SSLError(SSLCertVerificationError(1, '[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: self-signed certificate (_ssl.c:1016)')))Additional Information
No response
@swapnilshekade commented on GitHub (Apr 8, 2026):
Hi! I looked into this issue and it seems that the ollama model management code path might be creating aiohttp sessions without respecting AIOHTTP_CLIENT_SESSION_SSL value
I'm thinking of fixing this by centralizing the aiohttp ClientSession creation so the SSL config is applied consistently.
Does that approach sound good? If so, I can work on a PR for the same - I can take this up if no one else is been assigned for this.
@tjbck commented on GitHub (Apr 8, 2026):
Should be addressed in dev.