Skip to content

[ENHANCEMENT] MCP server using self or internal CA signed certificate cannot be used #8355

@makandre

Description

@makandre

Problem (one or two sentences)

It's possible for MCP servers to be using self-signed, or in corporate environment, an internal CA-signed certificate. There isn't any way to specify trust information to Roo so that it can connect to such servers.

Context (who is affected and when)

Users who wish to use MCP servers using self or internal CA signed certificate

Desired behavior (conceptual, not technical)

There should be a way specify/give Roo the signing certificate and indicate that it is to be trusted. Or an option to indicate a MCP server is to be trusted.

Constraints / preferences (optional)

No response

Request checklist

  • I've searched existing Issues and Discussions for duplicates
  • This describes a specific problem with clear context and impact

Roo Code Task Links (optional)

No response

Acceptance criteria (optional)

No response

Proposed approach (optional)

No response

Trade-offs / risks (optional)

No response

Metadata

Metadata

Assignees

No one assigned

    Labels

    Issue - Needs ScopingValid, but needs effort estimate or design input before work can start.enhancementNew feature or request

    Type

    No type

    Projects

    Status

    Issue [Needs Scoping]

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions