Just a general question regarding Seatable 6.0, because I couldn’t find any explicit information on this topic: Has the handling of custom (self-signed) corporate CAs been improved in 6.x (or even 5.3.12 - last time I checked was 5.2.7)
I’m referring to these past posts:
Specifically:
I addressed the issue in the past that (at the time) 3 thirdparty components in seatable-server held their own CA stores, and did not care what /etc/ssl/certs/ca-certificates.crt contained. I noticed that the seatable container executed update-ca-certificates on startup, but the components didn’t care.
Was that mitigated (for those components) by the introduction of REQUESTS_CA_BUNDLE?
Similar for the Python runner, see last topic.
Is it still necessary for me to build my own patched images?
This might be handled in Custom Certificates - SeaTable Admin Manual implicitly (mapping the CA store plus REQUESTS_CA_BUNDLE to tell thirdparty components), but I just wanted to make 100% sure before upgrading.
I think i figured it out: A cautious “yes“: In Seatable Server, I didn’t need to patch the following third party CA collections. I guess that REQUEST_CA_BUNDLE=/etc/ssl/certs/ca-certificates.crt overrides their individual CAs.
Not knowing what they exactly do, I could only test my one use case (Export table as Excel). Assuming that the issue has been solved is part educated guess, part hope - I hope that someone can verify.
EDIT (for those who face the same “my-own-CA“-challenges):
I just discovered two more areas which were affected by missing corporate CAs in Seatable:
“Dashboard“-Pages in Universal Apps would neither save nor display anything, they are just white.
Exporting Universal Apps will lack a lot of data, mainly dashboard pages and assets on them (pictures).
The bad aspect: the second issue was present even on our 5.3.12 production server, where I applied the 3 patches from above. Obviously, some other component was affected, too.
The good aspect: Apart from the fact that I could fix our production server, this was done by setting REQUEST_CA_BUNDLE=/etc/ssl/certs/ca-certificates.crt in the seatable-server container. And, of cource, the CA bundle needs to contain the custom CA as described in Custom Certificates - SeaTable Admin Manual
This all applies to Seatable 5.3.12 at the moment. I’ll update soon to 6.0.10 without patching the image as described, and answer my own question here if REQUEST_CA_BUNDLE=/etc/ssl/certs/ca-certificates.crt takes care of all custom CA issues.
Do it like thousands of other people who have used SeaTable to develop powerful processes and get their ideas and tasks done more efficiently.