Maciej Barelkowski

Results 363 comments of Maciej Barelkowski

I checked how custom certificates are handled in WebStorm. I can accept all untrusted certificates (insecure) or add specific certificates in the UI: ![image](https://user-images.githubusercontent.com/28307541/179196648-9d8f1751-fa36-46da-8c57-6f3aca9f6f5b.png)

These are the settings available in VSCode: ![image](https://user-images.githubusercontent.com/28307541/179199862-1807b763-6320-4aff-9ce6-0e371c1007ac.png) Note that it does not have a concept of deployment without extensions (e.g. https://marketplace.visualstudio.com/items?itemName=mkloubert.vs-deploy).

Once I setup my keychain to always trust my self-signed certificate, I was able to connect with `zbctl`. Still, I haven't been able to connect with `zeebe-node` yet.

I was able to setup this properly. You can check out the repo: https://github.com/barmac/zeebe-tls-connection-test `zeebe-node` is able to connect to the instance when I provide the certificate to the client....

I tried to set the certicate/key paths [via env variables](https://github.com/camunda-community-hub/zeebe-client-node-js#using-a-self-signed-certificate), but apparently there is a bug in `zeebe-node` which prevents us from using env variables at the moment 🤡 I...

Simple solution sketch: _Given_ I have a certificate located on my disk, I can either: 1. Run Modeler with `--zeebe-ssl-certificate` flag like so: `modeler --zeebe-ssl-certificate="/path/to/my/cert.pem"`, or 2. Configure `flags.json` file...

Regarding [the OS keychain](https://github.com/camunda/camunda-modeler/issues/3028#issuecomment-1184326575), NodeJS uses per default [bundled root certificates from Mozilla CA store](https://nodejs.org/api/tls.html#tlsrootcertificates). I believe this is the reason why the custom certificate added to a system keychain...

Some additional findings: We cannot use Electron's `net` module (which uses Chromium networking behind the scenes) because gRPC is based on Node's `http2` module while Electron's `net` can only do...

The flag-based approach can be tested with these artifacts (should be available in ~15 minutes): - https://camunda-modeler-on-demand.s3.eu-central-1.amazonaws.com/3028-select-certificate-via-flag/camunda-modeler-3028-select-certificate-via-flag-linux-x64.tar.gz - https://camunda-modeler-on-demand.s3.eu-central-1.amazonaws.com/3028-select-certificate-via-flag/camunda-modeler-3028-select-certificate-via-flag-mac.dmg - https://camunda-modeler-on-demand.s3.eu-central-1.amazonaws.com/3028-select-certificate-via-flag/camunda-modeler-3028-select-certificate-via-flag-mac.zip - https://camunda-modeler-on-demand.s3.eu-central-1.amazonaws.com/3028-select-certificate-via-flag/camunda-modeler-3028-select-certificate-via-flag-win-ia32.zip - https://camunda-modeler-on-demand.s3.eu-central-1.amazonaws.com/3028-select-certificate-via-flag/camunda-modeler-3028-select-certificate-via-flag-win-x64.zip

@christian-konrad and I just had another meeting on this issue. We decided to implement two solutions: * use system keychain certificates (there is no reason for CM to ignore trusted...