mirror of
https://github.com/maziggy/bambuddy.git
synced 2026-05-09 08:25:54 +02:00
[GH-ISSUE #1085] [Feature]: Add option to disable SSL verification for OIDC #773
Labels
No labels
A1
automated
automated
bug
bug
Closed due to inactivity
contrib
dependencies
dependencies
duplicate
enhancement
feedback
hold
invalid
Notes
P1S
pull-request
security
ThumbsUp
user-report
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/bambuddy-maziggy-1#773
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @mrtncode on GitHub (Apr 22, 2026).
Original GitHub issue: https://github.com/maziggy/bambuddy/issues/1085
Originally assigned to: @netscout2001 on GitHub.
Problem or Use Case
My Authentik instance is running behind a selfsigned ssl certificate. The auth fails because bambuddy cant fetch the OIDC config from Authentik.
Proposed Solution
It would be great if we add an toggle in the oidc settings to disable SSL verification
Alternatives Considered
No response
Feature Category
Other
Priority
Critical for my use case
Mockups or Examples
No response
Contribution
Checklist
@netscout2001 commented on GitHub (Apr 22, 2026):
Thanks for the report — this is a well-known pain point for self-hosted
OIDC providers using self-signed certificates.
The feature makes sense for homelab setups where BamBuddy and the OIDC
provider (Authentik, Keycloak, PocketID, etc.) run on the same internal
network. On a local network the practical MITM risk is low, but disabling
TLS verification entirely still has real implications:
attacker on the network could substitute a malicious IdP
client_secret— interceptionwould expose it
These risks are acceptable in a trusted private network when the user
consciously opts in, but the toggle must be clearly labeled as insecure.
Proposed implementation
Rather than only a
verify=Falsetoggle, I'd suggest implementing bothoptions side by side:
Custom CA certificate field (preferred): The user pastes their
root CA certificate (PEM) into a text field. httpx uses
verify=ca_bundle— the certificate chain is still validated, justagainst a custom CA. This is the secure way to handle self-signed certs.
Disable TLS verification toggle (escape hatch): Sets
verify=Falseon the httpx client used for OIDC discovery and token exchange only —
not globally. The UI should show a visible warning when this is active
(e.g., a red badge on the provider card).
Both options would be stored on the
OIDCProvidermodel(
verify_ssl: bool = True,ca_certificate: str | None).Every login via a provider with verification disabled should produce a
WARNINGlog entry.Questions before implementation
A few things that would help scope this correctly:
or also reachable from the internet?
adding a CA bundle not an option in your setup?
If the CA certificate approach works for you, it would be the better
long-term solution.
@mrtncode commented on GitHub (Apr 22, 2026):
@netscout2001
@netscout2001 commented on GitHub (Apr 23, 2026):
Thank you for the report and for your willingness to contribute!
After careful consideration, we've decided not to add SSL verification controls to the OIDC provider settings. The feature would require significant security hardening to implement safely, and we believe there is a simpler and more robust solution for your use case.
What we recommend instead
Put a valid TLS certificate in front of your Authentik instance. This solves the problem permanently — not just for BamBuddy but for every other client connecting to it:
All three options are well-documented and actively supported by the self-hosting community.
@maziggy commented on GitHub (Apr 23, 2026):
If you find Bambuddy useful, please consider giving it a ⭐ on GitHub — it helps others discover the project!
@mrtncode commented on GitHub (Apr 23, 2026):
@netscout2001 @maziggy Thats bad :(
Why that? The other apps with OIDC I selfhost have the same thing: Option to disable SSL verification or option to use a CA certificate. Why this reqzure security hardening?
That isnt an option for me (and probably many others). I use local DNS names (so LE isnt an option for me). As far as I know mkcert only installs the CA certificate in the trust storage from the host device!