-
Type: Bug
-
Status: Resolved
-
Priority: Critical
-
Resolution: Fixed
-
Affects Version/s: NXP-9.x, NXP-10.x, NXP-11.x
-
Component/s: HotFix factory
It will allow to bypass problems like
$ curl -u hudson:xxx -sSL -X POST -H 'X-NXDocumentProperties: nuxeopackage' -H 'Content-Type: application/json' -H 'Cache-Control: no-cache' -d '{"params":{"query":"SELECT * FROM Document WHERE ecm:primaryType='\''NuxeoPackage'\'' AND nxpkg:packageName LIKE '\''nuxeo-9.10-HF%'\'' ORDER BY nxpkg:packageId DESC"},"context":{}}' "https://connect.nuxeo.com:443/nuxeo/api/v1/automation/Document.Query" curl: (60) server certificate verification failed. CAfile: /etc/ssl/certs/ca-certificates.crt CRLfile: none More details here: http://curl.haxx.se/docs/sslcerts.html curl performs SSL certificate verification by default, using a "bundle" of Certificate Authority (CA) public keys (CA certs). If the default bundle file isn't adequate, you can specify an alternate file using the --cacert option. If this HTTPS server uses a certificate signed by a CA represented in the bundle, the certificate verification probably failed due to a problem with the certificate (it might be expired, or the name might not match the domain name in the URL). If you'd like to turn off curl's verification of the certificate, use the -k (or --insecure) option.
It should be only an option, not the default behavior, to unblock a similar situation.