mirror of
https://github.com/FiloSottile/mkcert.git
synced 2026-04-25 13:36:02 +03:00
[GH-ISSUE #307] Your connection is not private / NET::ERR_CERT_AUTHORITY_INVALID on windows 10 #198
Labels
No labels
TLS stack issue
Windows
bug
duplicate
duplicate
enhancement
help wanted
help wanted
pull-request
question
question
root store
waiting for info
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/mkcert#198
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @sontek on GitHub (Nov 14, 2020).
Original GitHub issue: https://github.com/FiloSottile/mkcert/issues/307
I just did the following, in a docker container:
Then I tried using that in nginx. Then in the host machine (windows) I ran:
if I re-run that, it says its already installed:
But when I try to go to http://eventapp.local in chrome:
Any idea what might cause this?
@FiloSottile commented on GitHub (Nov 14, 2020):
The host machine and the docker container will have different roots. You need to copy the root from the container to the host machine before running
-install. You can print the path withmkcert -CAROOT.@sontek commented on GitHub (Nov 14, 2020):
ok, this makes sense. It generates a CA Root for each system. So if you want to share it across systems you need to:
In the docker container to find the root, and then share it to the other system and then:
To the files you just got, then run:
and it allows a separate system to securely access the docker container.
@FiloSottile commented on GitHub (Nov 14, 2020):
Correct. Remember that if you share these files, for example by turning the container into an image and them pushing it, they can compromise the security of all machines where that root was installed.
@FiloSottile commented on GitHub (Nov 14, 2020):
An alternative would be to generate the certificate on the host, and then copying just the certificate (not the root) into the container, instead of running mkcert inside the container.
@sontek commented on GitHub (Nov 14, 2020):
Yeah, I want to generate it in the container so each dev gets a unique one (rather than committing the cert in git). But then I need to give their host system a way to access that root so they can install it
@sontek commented on GitHub (Nov 14, 2020):
oh, thats true I could just make each dev run the mkcert command to generate the cert first