-
Notifications
You must be signed in to change notification settings - Fork 192
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
"certificate has unknown CA" error getting repos #20
Comments
This is an issue of the underlaying tls stack and what the error tell you is that it can't find a certificate in your certificate storage that verify the certificate chain received from github. Since you're exercising the verifying code path, i assume you're running linux (or unix), and the only place where tls (one of its sub package certificate) is going to check is in /etc/ssl/certs/. |
@vincenthz I am running Linux -- it sounds like I I either need to:
I'm not sure how to do either of these things; digging in the source for the github bindings, it doesn't look like https can be disabled, which I'm assuming is the reason a cert is needed at all... do you have suggestions? |
can you send the list of certificate in /etc/ssl/certs. also can you run the following tool (and send the output as well) from the tls-debug package:
where destination is probably api.github.com and port is 443. |
Here's the output of the tls command:
Thanks! |
Thanks. i understand the issue now. The issue is the certificate package doesn't understand this way to store certificate (in one big file). I'll fix it in the near future, however to workaround the problem right now you can just take the certificate at the end of the chain (which is "ValiCert Class 2 Policy") from the ca-bundle.crt, and copy paste the ----- BEGIN TRUSTED CERTIFICATE ---- .... till ----- END TRUSTED CERTIFICATE ---- into one file in /etc/ssl/certs and remove the "TRUSTED" word from the BEGIN and END lines. |
Thanks! That did the trick. (Minor note: the crt file, in Fedora at least, doesn't have the "TRUSTED" word -- and the "untrusted" ? cert worked for this.) |
This is ok. my system certificate doesn't have the TRUSTED keyword either. it's no more trusted if it has the TRUSTED word in it. it just looks like there's lots of different format variations, that all do the same things .. but make the production of solid code that works in all condition much more complicated :( |
Vincent |
Yes, at the moment certificate requires one file per certificate; there's no restrictions on the file name (except that it need to valid utf8). can you please send me the actual files you've created ? |
Vincent Robert -----Original Message----- Yes, at the moment certificate requires one file per certificate; there's no Reply to this email directly or view it on GitHub: |
I don't see any tar files. might be github preventing tar file to be attached. please send it to my email address [email protected]. |
The multiple certificates in one file issue should be now fixed in certificate-1.2.0, tls-0.9.3 and tls-extra-0.4.5. Apologies to mike for squating the github repository issue tracker :-) |
Glad this all got resolved while I was traveling! |
Solved for me with certificate-1.2.0, tls-0.9.3 and tls-extra-0.4.5 |
I've been unable to build with certificate-1.2 due to changes in http-conduit's api -- see #21 for details. Thanks! |
I've been having this issue too, not really sure what I'm doing wrong with a fresh install. |
Both
userRepos
andorganizationRepos
cause this 'unknown CA' error. Here's a minimal test case:Results in:
Here's my complete set of installed dependencies, in the event this is specific to certain versions of libraries:
The text was updated successfully, but these errors were encountered: