From unknown Thu Aug 14 12:23:02 2025 Content-Disposition: inline Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-Mailer: MIME-tools 5.509 (Entity 5.509) Content-Type: text/plain; charset=utf-8 From: bug#40262 <40262@debbugs.gnu.org> To: bug#40262 <40262@debbugs.gnu.org> Subject: Status: R: server certificate verification failed. Reply-To: bug#40262 <40262@debbugs.gnu.org> Date: Thu, 14 Aug 2025 19:23:02 +0000 retitle 40262 R: server certificate verification failed. reassign 40262 guix submitter 40262 Jonathan Brielmaier severity 40262 normal thanks From debbugs-submit-bounces@debbugs.gnu.org Fri Mar 27 17:57:05 2020 Received: (at submit) by debbugs.gnu.org; 27 Mar 2020 21:57:05 +0000 Received: from localhost ([127.0.0.1]:33446 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1jHwyP-000373-58 for submit@debbugs.gnu.org; Fri, 27 Mar 2020 17:57:05 -0400 Received: from lists.gnu.org ([209.51.188.17]:49666) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1jHwyN-00036u-G4 for submit@debbugs.gnu.org; Fri, 27 Mar 2020 17:57:04 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]:48474) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1jHwyM-0002eN-02 for bug-guix@gnu.org; Fri, 27 Mar 2020 17:57:03 -0400 X-Spam-Checker-Version: SpamAssassin 3.3.2 (2011-06-06) on eggs.gnu.org X-Spam-Level: X-Spam-Status: No, score=-0.7 required=5.0 tests=BAYES_40,FREEMAIL_FROM, RCVD_IN_DNSWL_LOW,SPOOFED_FREEMAIL,URIBL_BLOCKED autolearn=disabled version=3.3.2 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1jHwyK-00021F-1L for bug-guix@gnu.org; Fri, 27 Mar 2020 17:57:01 -0400 Received: from mout.web.de ([217.72.192.78]:57435) by eggs.gnu.org with esmtps (TLS1.0:DHE_RSA_AES_128_CBC_SHA1:16) (Exim 4.71) (envelope-from ) id 1jHwyJ-0001qG-Kb for bug-guix@gnu.org; Fri, 27 Mar 2020 17:56:59 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=web.de; s=dbaedf251592; t=1585346217; bh=NXtd2wDgpOt52nOlwnLyo/B+ImHQpBlre/TbcKcpEIQ=; h=X-UI-Sender-Class:To:From:Subject:Date; b=SncK+kaYyAi447kzaNVT06lsxZb5PVhkcZrlhplzc17S/0+JEf8RPDGaI2llun8dN Simh2saS+T7o6YYcbW9WOrIld3dymDPJlx6vlrWSwPDmApH21kRLw8avjKcdmVissF pZQpKgoQMm2YYz7NFwkBFlT2bXoHhXkU97JZcduQ= X-UI-Sender-Class: c548c8c5-30a9-4db5-a2e7-cb6cb037b8f9 Received: from [192.168.178.119] ([5.146.193.216]) by smtp.web.de (mrweb101 [213.165.67.124]) with ESMTPSA (Nemesis) id 0LpfC6-1jlDBe3Ssg-00fPxI for ; Fri, 27 Mar 2020 22:56:56 +0100 To: bug-guix@gnu.org From: Jonathan Brielmaier Subject: R: server certificate verification failed. Message-ID: Date: Fri, 27 Mar 2020 22:56:55 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.5.0 MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Language: en-GB Content-Transfer-Encoding: quoted-printable X-Provags-ID: V03:K1:DFlX28eOXX9Nptyk8vl+hXo0PVQXXqMFNNUkxd2zFUot11gUsNP iIsGWWFXUMXTQTE49CJjFqOsD9KcI4a1BtceUnVIaTMLpYv7iyDF9B8apax/u1434iSYseu FQnGQhBLbOfhLbm205UyVtCn/zcn1AMfv2V71aLzNIClM1R06f376dtECSCShYG9MvXVd/N IJSUPS2mKEZgKXiOgAKWQ== X-UI-Out-Filterresults: notjunk:1;V03:K0:xEevVsGorNE=:aYZsFgMzxhnl4Bmv5ar2rc UXBsLYYUpr0jbmaXpamoQmw+r11QN+lCTEfIDmK0LHlis0+kk+FFfTvFuBl0m5Lon0DZ/ARSm 6hX39TV7nGGtuRkLM0CMv1W3knQCE3ja/LkUyIR8IXjmXPDMmWBDzLLo6659vo/OiJwHeMH93 j0Tuwl42fCeIPWQQyAJvjEwW5Np5Dg9aB/K/mAk5X590jsOOHm1Bhv1xhTr6AKQHfBylxNtZ/ LOoOKcEchKsvFqcrIDPgdOe59HDOSQD3O97d6YUaLZXE7E5fQlvEFn/dff29Uy0ppQomaNVmH Ue56Im5NBbNYA2Jr+JarCq6N9g3Ek0X3YNEtYm6dIYjyJgoym/X0eqMm7knZTRIV/K/T5ArxU lHx4CDTSyvLv4WxgE8+3nwG+7ZZIWmAoPS8ddcdOdxRxq5rVwNqXruNF8wfvWx4MHs8ky2BA/ KNwXSalwcZz2L7mdO+SgfR7v6L/I2aTIqgpb4ip1QsBzR5ixse3t8zOvniasClttRXSF9oiAv Qsukj81SvQksAJX0wBksBGFK9ZS4zn7XKNzM2FE/5+Kp5OCYW8fBZfR2K+t8iMuTSz5rV2xCt rq1rK0adStF8TWIJ/cu2n/u+IHTbmTYKmQkCzAuIGJQbBprmVppi5TV9WgwPzv1hmAbbVAlFm uWn2/u4/3DRpD5Rj2J2/bnHzLsW4xwntsQKDHAMIxBzhW7S1fnsvuQnU79OaFmHLBvj5QXRZO VcC80y8ooYznrWZQB8q75gRH1OTHgqGrOJ+giZArNPLG/XZjnG6F3cLOzneWvSGdU/jxygI+d R2foByGM95do1V+OGc3JiC5uKUv+33ozIPLuU9pQr22wsqIfEV9wUmcvRwvbcJmoQoGCii5rj D63zFBoTFZpaTuKLC+f3q9Xa7H8uHKbxgcE+6MOmPiRIM5FnTjvp5X5DjgPhnZB1n0kEP9BSX bdDpsOnnRqcOvTB1AZD3r17rqarJi+NhDcZMlHt1Oaup4WjJNnjp+yloLNcxzB1eZIGK2g8xs Mcq9b8CJ3MLvF3yR+qLXnOysowWUygEhvS2PpaNkt3Rz7i17QXVYJlvNArCMkcC73Oq9QnTYQ +JIaQlv4QRdtlZ6wzSWfF5/C+tveKFfL1VfwJbvxuy2h2SfTZkxE5Gmy2YScHHCU4zzbNwLFW P+RzNqHn4sE6ItrQoNfHsFD3qucAUdFJ8d1pBC6OVgA0vI6rTMa1mHJcUkNGyQVhs9IY1mDNK wjjlcpW4CINT/3UW3Llqf8awDU8SnZsODSjyO2w== X-detected-operating-system: by eggs.gnu.org: GNU/Linux 2.2.x-3.x [generic] X-Received-From: 217.72.192.78 X-Spam-Score: 0.2 (/) X-Debbugs-Envelope-To: submit X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: debbugs-submit-bounces@debbugs.gnu.org Sender: "Debbugs-submit" X-Spam-Score: -0.8 (/) Hi, while trying to run a simple R script on my guix server, I stumbled upon a problem with HTTPS and R. It's nothing urgent... reproducer.R library(jsonlite) library(tidyverse) library(lubridate) api_parking <- "https://guix.gnu.org/packages.json" parking.raw <- fromJSON(api_parking, simplifyDataFrame =3D TRUE) $ R CMD BATCH reproducer.R [...] > library(jsonlite) > library(tidyverse) =E2=94=80=E2=94=80 Attaching packages =E2=94=80=E2=94=80=E2=94=80=E2=94=80= =E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80= =E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80= =E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80= =E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80= =E2=94=80=E2=94=80=E2=94=80 tidyverse 1.3.0 =E2=94=80=E2=94=80 =E2=9C=94 ggplot2 3.3.0 =E2=9C=94 purrr 0.3.3 =E2=9C=94 tibble 2.1.3 =E2=9C=94 dplyr 0.8.5 =E2=9C=94 tidyr 1.0.2 =E2=9C=94 stringr 1.4.0 =E2=9C=94 readr 1.3.1 =E2=9C=94 forcats 0.5.0 =E2=94=80=E2=94=80 Conflicts =E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80= =E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80= =E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80= =E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80= =E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80= =E2=94=80=E2=94=80=E2=94=80=E2=94=80=E2=94=80 tidyverse_conflicts() =E2=94=80=E2=94=80 =E2=9C=96 dplyr::filter() masks stats::filter() =E2=9C=96 purrr::flatten() masks jsonlite::flatten() =E2=9C=96 dplyr::lag() masks stats::lag() > library(lubridate) Attaching package: =E2=80=98lubridate=E2=80=99 The following object is masked from =E2=80=98package:base=E2=80=99: date > api_parking <- "https://guix.gnu.org/packages.json" > parking.raw <- fromJSON(api_parking, simplifyDataFrame =3D TRUE) Error in open.connection(con, "rb") : server certificate verification failed. CAfile: none CRLfile: none Calls: fromJSON ... parse_and_simplify -> parseJSON -> parse_con -> open -> open.connection Execution halted For the record my SSL/HTTPS related variables. $ echo $SSL_CERT_DIR /etc/ssl/certs echo $SSL_CERT_FILE /etc/ssl/certs/ca-certificates.crt echo $CURL_CA_BUNDLE /run/current-system/profile/etc/ssl/certs/ca-certificates.crt All required packages (r, r-*, nss-certs) are installed system wide. Regards Jonathan From debbugs-submit-bounces@debbugs.gnu.org Fri Mar 27 18:39:35 2020 Received: (at 40262-done) by debbugs.gnu.org; 27 Mar 2020 22:39:35 +0000 Received: from localhost ([127.0.0.1]:33465 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1jHxdX-0004IZ-G8 for submit@debbugs.gnu.org; Fri, 27 Mar 2020 18:39:35 -0400 Received: from sender4-of-o54.zoho.com ([136.143.188.54]:21484) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1jHxdW-0004IO-1V for 40262-done@debbugs.gnu.org; Fri, 27 Mar 2020 18:39:34 -0400 ARC-Seal: i=1; a=rsa-sha256; t=1585348771; cv=none; d=zohomail.com; s=zohoarc; b=m8Nq5yxvHgXwug5tZQW/TmgtOPce3giIH542hryb1ynVWRqlb/CEe6ASksSPZTPhPBBboJpBR951Bju42BOKWZvvnRlJlWMvCBwUD3JhtJ9SDmjsEcs6YTg1U500ZJYGhwHY5EBe77SqzafGHgQA+9BG4CB4YGfwpfkVMCuUtbs= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1585348771; h=Content-Type:Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:MIME-Version:Message-ID:References:Subject:To; bh=Pb8sfzpCXocpqSmzDi6qhorKf8LGC0C3hD6kk/+XVTg=; b=dYwvhUPEZCxzZVjcZ/KeyOvl7CdoTjwqlg6bv2x4kKBleYQ95QeGuyg7a0nC0TsTlaXjtHYc7baQwvHH36ZQFn1DWolsGpPFgwPsPheuECN7u4LHjgTAOdpcxkchfRzxQH5PABtAZaTJv2qzaOPhknfk4ZJ9cHMWH7IkrLOQv6s= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass header.i=elephly.net; spf=pass smtp.mailfrom=rekado@elephly.net; dmarc=pass header.from= header.from= DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; t=1585348771; s=zoho; d=elephly.net; i=rekado@elephly.net; h=References:From:To:Cc:Subject:In-reply-to:Date:Message-ID:MIME-Version:Content-Type:Content-Transfer-Encoding; bh=Pb8sfzpCXocpqSmzDi6qhorKf8LGC0C3hD6kk/+XVTg=; b=BYTt73BUaNupb4hscmYe8r2/jKrnwmL4HbbWjlUyxplyr1LcgPj036DH1wPBLv5I pRhTMF/Zw5iJOjucIXdy8X/Cywi+PoXbmw53CnZqAYKslY2gavnCtjdgzZdn6w12Rvs fgSq1789Cn00Fab7Ic+AjIpE2735Gz+Dt6Pq4p3U= Received: from localhost (p54AD4D3E.dip0.t-ipconnect.de [84.173.77.62]) by mx.zohomail.com with SMTPS id 1585348769107151.78126994710397; Fri, 27 Mar 2020 15:39:29 -0700 (PDT) References: User-agent: mu4e 1.2.0; emacs 26.3 From: Ricardo Wurmus To: Jonathan Brielmaier Subject: Re: bug#40262: R: server certificate verification failed. In-reply-to: X-URL: https://elephly.net X-PGP-Key: https://elephly.net/rekado.pubkey X-PGP-Fingerprint: BCA6 89B6 3655 3801 C3C6 2150 197A 5888 235F ACAC Date: Fri, 27 Mar 2020 23:39:25 +0100 Message-ID: <87a741xw0y.fsf@elephly.net> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable X-ZohoMailClient: External X-Spam-Score: 0.0 (/) X-Debbugs-Envelope-To: 40262-done Cc: 40262-done@debbugs.gnu.org X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: debbugs-submit-bounces@debbugs.gnu.org Sender: "Debbugs-submit" X-Spam-Score: -1.0 (-) Jonathan Brielmaier writes: > Error in open.connection(con, "rb") : > server certificate verification failed. CAfile: none CRLfile: none This is due to a change in r-curl. We patched it to respect the CURL_CA_BUNDLE environment variable, not just when it=E2=80=99s used on Win= dows. The code has changed since we developed the patch. Now the CURLOPT_CAINFO option is only set (in curl/src/handle.c:set_handle_defaults) when _WIN32 is defined and when tlsinfo->backend =3D=3D CURLSSLBACKEND_OPENSSL. Neither of these cases apply for Guix. I=E2=80=99ve adjusted the patch in r-curl. Thank you for the report! -- Ricardo From unknown Thu Aug 14 12:23:02 2025 Received: (at fakecontrol) by fakecontrolmessage; To: internal_control@debbugs.gnu.org From: Debbugs Internal Request Subject: Internal Control Message-Id: bug archived. Date: Sat, 25 Apr 2020 11:24:05 +0000 User-Agent: Fakemail v42.6.9 # This is a fake control message. # # The action: # bug archived. thanks # This fakemail brought to you by your local debbugs # administrator