-
-
Notifications
You must be signed in to change notification settings - Fork 141
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Unable to access api.pulsar-edit.dev on corporate network: "self signed certificate in certificate chain" #1116
Comments
The good news is that any package can be installed directly from GitHub — just use
This should do the right thing in most circumstances, and will even detect when updates are available if new commits are pushed to |
@savetheclocktower I ran that command and it had the same error although it the output suggests that the git clone worked correctly.
I also tried using a different intermediate CA (not the root CA) as the node export variable. |
If it can't even talk to NPM, then that's ridiculous, and I don't know how you get any work done. I understand how Pulsar's own server may not exactly be on a large company's radar, but NPM is pretty critical infrastructure for any programmer. It's a subsidiary of GitHub. I'm not sure I even understand the error being described here. A “self-signed” certificate, by my understanding, is something that you can make that carries no implicit authority or proof that you are who you say you are; it's something you'd do if you just wanted to use HTTPS locally without jumping through hoops. I am extremely skeptical that it's something that would apply to NPM in the year 2024. Anyway, you can try this if you have
If you get the same error with a recent version of I found this page. I doubt the exact cause is the same, but the possible solutions may work — though you'd want to substitute If none of that works, my suggestion would be to reach out to your company's IT department and explain the situation. |
@savetheclocktower From my understanding of the issue at hand: Generally the managed devices would be configured to accept the firewall's certificate as valid, but from what my research is showing is that Unfortunately, we can't add a quick fix to disable TLS for a specific request since the library's author seems quite against the idea. Which does mean hacks like But considering traffic to NPM seems to be getting blocked, I'd absolutely reach out to IT like previously suggested. EDIT: It seems we may have some options within superagent to customize the certificates we trust. Frustrating that it doesn't automatically trust what the OS has, but we could use the node configuration values to automatically update it, or allow these to be customized otherwise. But still if NPM is being blocked, this wouldn't help in this particular case. |
That at least suggests that the user's own copy of |
So diving deeper into this, it's an issue within NodeJS itself. Since It turns out that TLS is implemented in all of these via the NodeJS
Seems NodeJS pays the operating system itself zero respect for what it trusts and instead relies totally on Mozilla. So we have two options:
I'm obviously much more a fan of number 2, since it's less work on our end, and means we don't have to study and update where-ever certs are stored on each OS. Now it does seem the easiest way to utilize custom certs would still be within |
@confused-Techie I think https://github.com/nikitakit/cert-tweaks exists to do #2. |
Thanks in advance for your bug report!
What happened?
If the device is connected to a corporate network that uses an org signed intermediate certificate for all network traffic, the client gives fetch errors on
https://api.pulsar-edit.dev
which prevents any packages from being installable in this scenario.Pulsar version
v1.121.0
Which OS does this happen on?
🍎 macOS
OS details
14.7
Which CPU architecture are you running this on?
Apple M-series
What steps are needed to reproduce this?
Additional Information:
several issues were reported in Atom
atom/atom#16964
atom/atom#8465
I tried atom/apm#340 (comment)
$ NODE_EXTRA_CA_CERTS=/etc/ssl/certs/ca-certificates.crt pulsar
after copying the top-level org CA cert, and this didn't work.there is this package designed for "adding extra certificates to Atom's trust store" https://github.com/nikitakit/cert-tweaks . I don't know if this still works in the latest version of Pulsar
I realise this may be considerd an edge case requiring customisation and not a bug in pulsar itself.
The text was updated successfully, but these errors were encountered: