mirror of
https://github.com/louislam/uptime-kuma.git
synced 2026-03-02 22:57:00 -05:00
allow bearer auth for signal notifications #4058
Labels
No labels
A:accessibility
A:api
A:cert-expiry
A:core
A:dashboard
A:deployment
A:documentation
A:domain expiry
A:incidents
A:maintenance
A:metrics
A:monitor
A:notifications
A:reports
A:settings
A:status-page
A:ui/ux
A:user-management
Stale
ai-slop
blocked
blocked-upstream
bug
cannot-reproduce
dependencies
discussion
duplicate
feature-request
feature-request
good first issue
hacktoberfest
help
help wanted
house keeping
invalid
invalid-format
invalid-format
question
releaseblocker 🚨
security
spam
type:enhance-existing
type:new
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/uptime-kuma#4058
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @babeuloula on GitHub (Mar 30, 2025).
📑 I have found these related issues/pull requests
.
🏷️ Feature Request Type
Settings
🔖 Feature description
Hello,
I'm using Signal and I've blocked the endpoint though a basic auth. I can't use the Signal notification because I can't setting up an authentification system.
✔️ Solution
I think it would be great if we can setting up an auth system for notification provider.
❓ Alternatives
No response
📝 Additional Context
No response
@101br03k commented on GitHub (Mar 30, 2025):
uptime-kuma uses apprise as an notification system. Please check there documentation for how to use Signal using an API: https://github.com/caronc/apprise/wiki/Notify_signal
@babeuloula commented on GitHub (Mar 30, 2025):
I've already tried this.
But
signal://is not a valid protocol:And if I use
https://, I can't setting up my password because it contain special chars. I've also tried with a base64 encoded password. I've always an error 401.@101br03k commented on GitHub (Mar 30, 2025):
Ah yes, because it already asks you to select the type in the notifications section it is not needed to specify any fearther.
Do you have a signal client with REST API?
For example https://github.com/bbernhard/signal-cli-rest-api
@babeuloula commented on GitHub (Mar 30, 2025):
Yes of course I have a signal client with REST API. But I don't understand how to settting up my basic auth.
@101br03k commented on GitHub (Mar 30, 2025):
You don't need basic auth, at http://IP:PORT/v1/qrcodelink?device_name=signal-api you can connect your phone to the container, then using a configuration comparable to this it works for me.

@babeuloula commented on GitHub (Mar 30, 2025):
No I need a basic auth because my endpoint is protected by a basic auth. I don't want to expose the signal API to anyone.
@101br03k commented on GitHub (Mar 30, 2025):
What do you mean with "my endpoint"?
https://github.com/bbernhard/signal-cli-rest-api or another rest api?
Quickly looking trough the docs of the mentiond repository I do not see any option for this. Are you using a reverse proxy or something similar?
@babeuloula commented on GitHub (Mar 30, 2025):
Yes I use a nginx reverse proxy to serve the REST API
@damitti444 commented on GitHub (Apr 1, 2025):
I don't know if this is supported by uptime-kuma but have you tried passing credentials in the URL like this?
https://user:pass123@example.com/.....
source: https://developer.mozilla.org/en-US/docs/Web/HTTP/Guides/Authentication#access_using_credentials_in_the_url
also consider the security implications if you use this, i.e. password visible in logs
@babeuloula commented on GitHub (Apr 2, 2025):
Hello, Yes I've tried this and also with a base64 encoded password but I've got an error 401.
@FoxOps commented on GitHub (May 14, 2025):
Hello,
I don't think this is a Kuma problem, perse. More like a configuration on the reverse proxy side but a better management of auth on kuma side is always welcomed.
If you use nginx as a reverse proxy, there is another way to protect your signal API from unwanted traffic.
You can use "deny" and "allow" in nginx like this:
This should help you.
@babeuloula commented on GitHub (May 14, 2025):
@FoxOps Thanks for the suggestion but unfortunately I can't set up IP filtering, I have several services accessing this service and I have dynamic IPs in particular.
@shred commented on GitHub (Oct 20, 2025):
I found this issue because I'm having the same problem.
Situation: I run a bbernhard/signal-cli-rest-api behind a reverse proxy that is publicy accessible. To avoid use of the Signal endpoint by unauthorized users, the reverse proxy checks for the presence of certain bearer tokens.
It would be great if uptime-kuma offers an "API token" field that is sent as "Authorization: Bearer" token. Alternatively passing an SSL client certificate, or credentials for a HTTP basic auth.
@CommanderStorm commented on GitHub (Oct 20, 2025):
If you’d like to see this added, feel free to open a pull request!
I’d be happy to consider it if it includes the required screenshots and makes the feature opt-in (for example, with a checkbox and a short help text explaining when or why to enable it).
No need for more “+1” comments — contributions are much more helpful 🙂