Self-signed certificate error on Windows (GHES) #163409
-
Why are you starting this discussion?Question What GitHub Actions topic or product is this about?Workflow Configuration Discussion DetailsHello, We have a GHES instance that uses an SSL certificate signed by my employer's CA certificate. Today I've set up a runner (v2.319.1, GHES default version) for testing purposes on my laptop, and started it as my user from a PowerShell terminal (i.e. it's not a service). When my workflow tries to checkout a repo (actions/checkout@v4) I get the following message: Btw the same certificates are there in the Local Machine's store too. The runner can initially connect to GitHub when I start it with I tried the same from an Administrator PS window too, I got the same error. How can I make the workflow use the proper certificates? Is there a way to point to the Windows certificate store with |
Beta Was this translation helpful? Give feedback.
Replies: 2 comments
-
|
It sounds like your runner isn't trusting your company's CA certificates, even though they're in your Windows certificate store. The
Here's how you can likely fix it:
This should instruct Node.js to trust your custom CA certificates, resolving the |
Beta Was this translation helpful? Give feedback.
-
|
Thank you, @shakibbinkabir! My workflow is running fine now. |
Beta Was this translation helpful? Give feedback.
It sounds like your runner isn't trusting your company's CA certificates, even though they're in your Windows certificate store. The
self-signed certificate in certificate chainerror typically means Node.js (which powers the runner and actions) doesn't know about your internal CAs.NODE_EXTRA_CA_CERTSis a good lead! However, it expects a path to a file containing PEM-encoded certificates, not a direct link to the Windows store.Here's how you can likely fix it:
Export your CA certificates: Export your "Company Global Root CA" and "Company Signing CA" from the Windows certificate store into a single file in PEM format (Base64 encoded X.509). You can do this using the Certificate Manage…