-
Notifications
You must be signed in to change notification settings - Fork 3.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
httpie doesn't recognize cert/CA provided by mkcert #768
Comments
Does it work if you pass |
Thanks! Without verify I see:
But thanks to your tip it works!
Note I did need to add double quotes
So I use it automatically! Thanks again! |
The $ http --version
2.2.0
$ mkcert -version
v1.4.1
$ head -n 1 "$(mkcert -CAROOT)/rootCA.pem"
-----BEGIN PRIVATE KEY-----
$ http --verify="$(mkcert -CAROOT)/rootCA.pem" https://127.0.0.1:5000/api/v1/products
http: error: SSLError: HTTPSConnectionPool(host='127.0.0.1', port=5000): Max retries exceeded with url: /api/v1/products (Caused by SSLError(SSLError(136, '[X509: NO_CERTIFICATE_OR_CRL_FOUND] no certificate or crl found (_ssl.c:4232)'))) while doing a GET request to URL: https://127.0.0.1:5000/api/v1/products And the reported
These probes still doesn't work. $ openssl s_client -CAfile "$(mkcert -CAROOT)/rootCA.pem" -servername=example.com 127.0.0.1:5000
4753356224:error:0B084088:x509 certificate routines:X509_load_cert_crl_file:no certificate or crl found:crypto/x509/by_file.c:223:
openssl s_client -CAfile "$(mkcert -CAROOT)/rootCA.pem" 127.0.0.1:5000
4718126528:error:0B084088:x509 certificate routines:X509_load_cert_crl_file:no certificate or crl found:crypto/x509/by_file.c:223: According to this SSL/TLS troubleshooting guide
What do I miss here? Update: I thinks #480 is related. |
I've been using mkcert to create a 'valid' SSL cert when developing locally.
mkcert installs a CA and adds it to the system and other toolchains so it is recognized automatically.
The cert is recognized by
curl
without problems, buthttpie
is failing (unless I add--verify=no
)Perhaps this is a duplicate of #480. but my hopes were that
httpie
might be able to support it directly (or via a --cert parameter I could pass/alias)httpie version: 1.0.0
OS: OSX 10.14.3 Mojave
The text was updated successfully, but these errors were encountered: