-
-
Notifications
You must be signed in to change notification settings - Fork 62
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
corporate proxy got in the way and cannot specify a certificate bundle using en vars like such as CARGO_HTTP_CAINFO
, SSL_CERT_FILE
& SSL_CERT_PATH
#759
Comments
cargo-binstall
through [this awesome introductory blog post](https://blog.axo.dev/2023/02/cargo-dist) about cargo-dist
. I am admittedly late to the party. Unfortunately, when I went to try this out at work, the corporate proxy got in the way and I can't yet figure out how to specify a certificate bundle like I can with other apps. I already have the customary environment variables set properly such as CARGO_HTTP_CAINFO
, SSL_CERT_FILE
, and SSL_CERT_PATH
. This is a bit frustrating but doesn't have to be the end. Excited to learn more.CARGO_HTTP_CAINFO
, SSL_CERT_FILE
& SSL_CERT_PATH
@yonkeltron It should be possible since we use Not sure whether this will fix your issue since I do not have the experience of corporate proxy, but it does work for you, I am more than happy to add that feature. |
@passcod I'm not very familiar with corp proxy env, will using |
Not familiar either. That sounds like it's intercepting TLS? Weird. Probably need to check out how cargo does it. |
Yes corporate proxies do tend to MITM and intercept TLS connections to be
cracked at the network border. This would be an amazing feature to have and
I would love to help test it out if I can contribute somehow.
I am so grateful for the attention.
Thanks,
+Jonathan
…On Fri, Feb 3, 2023, 8:13 PM Félix Saparelli ***@***.***> wrote:
Not familiar either. That sounds like it's intercepting TLS? Weird.
Probably need to check out how cargo does it.
—
Reply to this email directly, view it on GitHub
<#759 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AAAOQO2IEWFIIYGZLUPEOBDWVWUNFANCNFSM6AAAAAAUOMOYPY>
.
You are receiving this because you were mentioned.Message ID:
***@***.***>
|
@yonkeltron If that is the case, then can you check if If the answer is yes, then I can open a PR to add this feature and let you test it out. |
Hmm, I will go ahead and create a PR so that you can test this. |
Hey I'm ready to give this a shot whenever you give me the go ahead. I'll happily provide all the feedback and experience info I can muster! |
The PR linked with this issue is already ready for review and it also has pre-built artifacts for you to try out. |
Ok, after a false start owing to an error on my part, it seems to be working fine now! I love this! Can't wait to tell others once it's out. Is there any other info I can provide? |
@yonkeltron Good to hear that this resolves this issue! Since you are in corp env, is there anything else that we can make it easier to use binstall in that kinds of env or could potentially block usage of binstall? |
Right now, no. My biggest issues are a proxy and the cert it requires, both of which seem to work just fine right now. I think we're good to go but I'll keep my eyes open. Thanks so much for all of your help and support. It means a lot and your hard work really matters! Thanks, |
Thank you Jonathan! We would probably make a release this weekend or next Monday along with other fixes for http conns. |
@yonkeltron #820 adds I removed I also added |
Originally posted by @yonkeltron in #19 (comment)
The text was updated successfully, but these errors were encountered: