Angular使用自签名证书调用URI时失败,报错“net::ERR_CERT_AUTHORITY_INVALID”。
创始人
2024-10-29 13:01:03
0

要解决Angular使用自签名证书调用URI时出现“net::ERR_CERT_AUTHORITY_INVALID”错误,可以使用以下方法:

  1. 忽略证书验证: 在Angular的HTTP请求中设置withCredentials: true,这会使请求在发送时忽略证书验证。但是这会使通信变得不安全,不建议在生产环境中使用。

    import { HttpClient } from '@angular/common/http';
    
    constructor(private http: HttpClient) {}
    
    // 发送HTTP请求
    this.http.get('https://your-uri', { withCredentials: true }).subscribe(
      response => {
        // 处理响应
      },
      error => {
        // 处理错误
      }
    );
    
  2. 导入自签名证书: 将自签名证书导入到Angular项目中,并在请求之前将其添加到可信证书存储中。

    • 将证书文件(.pem或.crt)放置在Angular项目的assets文件夹中。

    • 在Angular项目的tsconfig.json文件中,将"assets"数组中的路径添加到“include”数组中。例如:

      {
        "compilerOptions": {
          // ...
        },
        "include": [
          // ...
          "src/assets/*.pem" // 或者 "src/assets/*.crt"
        ]
      }
      
    • 创建一个名为certificate.service.ts的服务,用于导入和添加证书到可信证书存储中:

      import { Injectable } from '@angular/core';
      
      @Injectable({
        providedIn: 'root'
      })
      export class CertificateService {
        importCertificate(): Promise {
          return fetch('/assets/your-certificate.pem') // 或者 '/assets/your-certificate.crt'
            .then(response => response.text())
            .then(certificate => {
              return window.crypto.subtle.importKey(
                'spki',
                this.str2ab(atob(certificate)), // 将证书从Base64转换为ArrayBuffer
                {
                  name: 'RSA-OAEP',
                  hash: { name: 'SHA-256' }
                },
                true,
                ['verify']
              );
            })
            .then(cryptoKey => {
              return window.crypto.subtle.exportKey('spki', cryptoKey);
            })
            .then(exportedKey => {
              const buf = new Uint8Array(exportedKey);
              const blob = new Blob([buf], { type: 'application/x-x509-ca-cert' });
              const cert = new File([blob], 'your-certificate.pem', { type: 'application/x-x509-ca-cert' });
      
              return window.crypto.subtle.digest('SHA-256', buf)
                .then(hashBuffer => {
                  const hashArray = Array.from(new Uint8Array(hashBuffer));
                  const hashHex = hashArray.map(byte => ('00' + byte.toString(16)).slice(-2)).join('');
      
                  return { cert, hash: hashHex };
                });
            })
            .then(({ cert, hash }) => {
              return window.crypto.subtle.digest('SHA-1', new TextEncoder().encode(hash))
                .then(hashBuffer => {
                  const hashArray = Array.from(new Uint8Array(hashBuffer));
                  const hashHex = hashArray.map(byte => ('00' + byte.toString(16)).slice(-2)).join('');
      
                  return { cert, hash: hashHex };
                });
            })
            .then(({ cert, hash }) => {
              return new Promise((resolve, reject) => {
                const reader = new FileReader();
                reader.onloadend = () => {
                  resolve(reader.result);
                };
                reader.onerror = reject;
                reader.readAsArrayBuffer(cert);
              })
                .then(arrayBuffer => {
                  const certArray = Array.from(new Uint8Array(arrayBuffer));
                  const blob = new Blob([new Uint8Array(certArray)], { type: 'application/x-x509-ca-cert' });
      
                  const anchor = document.createElement('a');
                  anchor.style.display = 'none';
                  anchor.href = URL.createObjectURL(blob);
                  anchor.download = 'your-certificate.pem';
                  document.body.appendChild(anchor);
                  anchor.click();
                  document.body.removeChild(anchor);
                });
            })
            .catch(error => {
              console.error('Failed to import certificate:', error);
            });
        }
      
        private str2ab(str: string): ArrayBuffer {
          const buf = new ArrayBuffer(str.length);
          const bufView = new Uint8Array(buf);
      
          for (let i = 0, strLen = str.length; i <

相关内容

热门资讯

记者揭秘!智星菠萝辅助(透视辅... 记者揭秘!智星菠萝辅助(透视辅助)拱趴大菠萝辅助神器,扑克教程(有挂细节);模式供您选择,了解更新找...
一分钟揭秘!约局吧能能开挂(透... 一分钟揭秘!约局吧能能开挂(透视辅助)hhpoker辅助靠谱,2024新版教程(有挂教学);约局吧能...
透视辅助!wepoker模拟器... 透视辅助!wepoker模拟器哪个好用(脚本)hhpoker辅助挂是真的,科技教程(有挂技巧);囊括...
透视代打!hhpkoer辅助器... 透视代打!hhpkoer辅助器视频(辅助挂)pokemmo脚本辅助,2024新版教程(有挂教程);风...
透视了解!约局吧德州真的有透视... 透视了解!约局吧德州真的有透视挂(透视脚本)德州局HHpoker透视脚本,必胜教程(有挂分析);亲,...
六分钟了解!wepoker挂底... 六分钟了解!wepoker挂底牌(透视)德普之星开辅助,详细教程(有挂解密);德普之星开辅助是一种具...
9分钟了解!wpk私人辅助(透... 9分钟了解!wpk私人辅助(透视)hhpoker德州透视,插件教程(有挂教学);风靡全球的特色经典游...
推荐一款!wepoker究竟有... 推荐一款!wepoker究竟有透视(脚本)哈糖大菠萝开挂,介绍教程(有挂技术);囊括全国各种wepo...
每日必备!wepoker有人用... 每日必备!wepoker有人用过(脚本)wpk有那种辅助,线上教程(有挂规律);wepoker有人用...
玩家必备教程!wejoker私... 玩家必备教程!wejoker私人辅助软件(脚本)哈糖大菠萝可以开挂,可靠技巧(有挂神器)申哈糖大菠萝...