mirror of
https://github.com/nektos/act.git
synced 2026-04-26 01:15:51 +03:00
[GH-ISSUE #721] Issue: helm login/push yields x509: certificate signed by unknown authority with google artifact registry #454
Labels
No labels
area/action
area/cli
area/docs
area/image
area/runner
area/workflow
backlog
confirmed/not-planned
kind/bug
kind/discussion
kind/external
kind/feature-request
kind/question
meta/duplicate
meta/invalid
meta/need-more-info
meta/resolved
meta/wontfix
meta/workaround
needs-work
pull-request
review/not-planned
size/M
size/XL
size/XXL
stale
stale-exempt
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/act#454
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @ekallevig on GitHub (Jun 4, 2021).
Original GitHub issue: https://github.com/nektos/act/issues/721
Act version
act version 0.2.22-14-g8a9167d
commit
8a9167da82using nektos/act-environments-ubuntu:18.04 runner
Expected behaviour
When running either
helm registry login...orhelm chart pushwith the google artifact registry (us-east1-docker.pkg.dev), it should succeed normally.Actual behaviour
When running either
helm registry login...orhelm chart pushwith the google artifact registry (us-east1-docker.pkg.dev), it fails with the message:These same helm commands work fine on the local host machine (macos) as well as on the remote github actions runner (ubuntu 18.04). It seems like there's something off with the certificate store specifically on the act runner?
Workflow and/or repository
@catthehacker commented on GitHub (Jun 4, 2021):
Image has not been updated since February 2020, please use more recent image or update it yourself.
https://github.com/nektos/act/blob/master/IMAGES.md
@ekallevig commented on GitHub (Jun 4, 2021):
Thanks for your reply. By update do you mean running something like
sudo apt-get upgradeand generating a new image?@ekallevig commented on GitHub (Jun 4, 2021):
@catthehacker I've tried this with
catthehacker/ubuntu:act-latestwhich was updated 13 days ago and I still get the same certificate error.@catthehacker commented on GitHub (Jun 4, 2021):
Can you try running
sudo update-ca-certificatesbefore failing step?@ekallevig commented on GitHub (Jun 4, 2021):
I have tried that and it doesn't add any certs (same resulting error). I think this may be caused by the fact that I need to be on my company's VPN, which changes the cert issuer from Google to my company. Thinking I need to somehow install my company's ca cert in the runner store but I'm not sure where to get the cert and how it should be installed.
I've tried doing it this way without success:
Company Root CA.pem) from Keychain Access (macos)I'm not clear on:
@ekallevig commented on GitHub (Jun 4, 2021):
I've managed to solve the issue. I was slightly off on the method for exporting the comopany root ca file.
@orcutt989 commented on GitHub (Jul 20, 2021):
I am having the same issue, but with running Pulumi from within the container. I have no special network configuration and this action works fine on GitHub.
@catthehacker commented on GitHub (Jul 20, 2021):
@orcutt989 please create new issue
@catthehacker commented on GitHub (Jul 20, 2021):
Locking conversation here since the issue wasn't really a fault of
actnor image, but a company certificate which we have no way of pulling nor detecting.For anyone finding that issue as related to theirs, please create a new one and fill required information.