mirror of
https://github.com/healthchecks/healthchecks.git
synced 2026-04-25 15:05:49 +03:00
[GH-ISSUE #1253] Self signed CA #844
Labels
No labels
bug
bug
bug
feature
good-first-issue
new integration
pull-request
question
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/healthchecks#844
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @D3an1el on GitHub (Jan 7, 2026).
Original GitHub issue: https://github.com/healthchecks/healthchecks/issues/1253
Hi
I receive the following error when using gotify with self signed certificate
I have tried the following workaround issue 1033, i also have added:
REQUESTS_CA_BUNDLE=/certificates/ca-chain-bundle.cert.pemto env@cuu508 commented on GitHub (Jan 8, 2026):
Healthchecks uses libcurl for making HTTP(S) requests. It does not use the requests library, therefore setting REQUESTS_CA_BUNDLE would have no effect.
curl and libcurl validates certificates and refuses to continue if a certificate cannot be validated. It is possible to turn off validation, but doing so is strongly discouraged in curl docs.
To make curl accept a self-hosted certificate, one solution would be to add it to system's CA store. The Healthchecks docker image is based on Debian, and on Debian systems, IIUC, the procedure is to:
/usr/local/share/ca-certificatesupdate-ca-certificatesI have not thoroughly researched this, perhaps there's a simpler way.
Workaround 1
As an experiment I generated a self-hosted certificate and built a Docker image which starts with the official image, but adds the above two steps. The dockerfile I used was:
Using this image, Healthchecks was able to make webhook requests to a webserver using the self-hosted certificate.
Workaround 2
Another approach is instead of building a custom image, mount the certificate inside a container running the standard image. In docker-compose.yml:
And then run update-ca-certificates:
After some fumbling, this worked for me too.
@D3an1el commented on GitHub (Jan 10, 2026):
workaround 2 worked
&
docker compose exec -u root web update-ca-certificatesmaybe it should be added to docs ?