You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: docs/checks/actions.md
+5-5
Original file line number
Diff line number
Diff line change
@@ -18,16 +18,16 @@ Make sure the runner has access to actions service for GitHub.com or GitHub Ente
18
18
19
19
- DNS lookup for api.github.com or myGHES.com using dotnet
20
20
- Ping api.github.com or myGHES.com using dotnet
21
-
- Make HTTP GET to https://api.github.com or https://myGHES.com/api/v3 using dotnet, check response headers contains `X-GitHub-Request-Id`
21
+
- Make HTTP GET to https://api.github.com or https://myGHES.com/api/v3 using dotnet, check response headers contains `X-GitHub-Request-Id`
22
22
---
23
23
- DNS lookup for vstoken.actions.githubusercontent.com using dotnet
24
24
- Ping vstoken.actions.githubusercontent.com using dotnet
25
-
- Make HTTP GET to https://vstoken.actions.githubusercontent.com/_apis/health or https://myGHES.com/_services/vstoken/_apis/health using dotnet, check response headers contains `x-vss-e2eid`
25
+
- Make HTTP GET to https://vstoken.actions.githubusercontent.com/_apis/health or https://myGHES.com/_services/vstoken/_apis/health using dotnet, check response headers contains `x-vss-e2eid`
26
26
---
27
27
- DNS lookup for pipelines.actions.githubusercontent.com using dotnet
28
28
- Ping pipelines.actions.githubusercontent.com using dotnet
29
-
- Make HTTP GET to https://pipelines.actions.githubusercontent.com/_apis/health or https://myGHES.com/_services/pipelines/_apis/health using dotnet, check response headers contains `x-vss-e2eid`
30
-
- Make HTTP POST to https://pipelines.actions.githubusercontent.com/_apis/health or https://myGHES.com/_services/pipelines/_apis/health using dotnet, check response headers contains `x-vss-e2eid`
29
+
- Make HTTP GET to https://pipelines.actions.githubusercontent.com/_apis/health or https://myGHES.com/_services/pipelines/_apis/health using dotnet, check response headers contains `x-vss-e2eid`
30
+
- Make HTTP POST to https://pipelines.actions.githubusercontent.com/_apis/health or https://myGHES.com/_services/pipelines/_apis/health using dotnet, check response headers contains `x-vss-e2eid`
31
31
32
32
## How to fix the issue?
33
33
@@ -42,4 +42,4 @@ Make sure the runner has access to actions service for GitHub.com or GitHub Ente
42
42
43
43
## Still not working?
44
44
45
-
Contact GitHub customer service or log an issue at https://github.com/actions/runner if you think it's a runner issue.
45
+
Contact GitHub customer service or log an issue at https://github.com/actions/runner if you think it's a runner issue.
Copy file name to clipboardexpand all lines: docs/checks/sslcert.md
+4-4
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ As long as your certificate is generated properly, most of the issues should be
12
12
> !!! DO NOT SKIP SSL CERT VALIDATION !!!
13
13
> !!! IT IS A BAD SECURITY PRACTICE !!!
14
14
15
-
### Download SSL certificate chain
15
+
### Download SSL certificate chain
16
16
17
17
Depends on how your SSL server certificate gets configured, you might need to download the whole certificate chain from a machine that has trusted the SSL certificate's CA.
18
18
@@ -28,7 +28,7 @@ The actions runner is a dotnet core application which will follow how dotnet loa
28
28
29
29
You can get full details documentation at [here](https://docs.microsoft.com/en-us/dotnet/standard/security/cross-platform-cryptography#x509store)
30
30
31
-
In short:
31
+
In short:
32
32
- Windows: Load from Windows certificate store.
33
33
- Linux: Load from OpenSSL CA cert bundle.
34
34
- macOS: Load from macOS KeyChain.
@@ -43,13 +43,13 @@ To let the runner trusts your CA certificate, you will need to:
3. Google search: "trust ca certificate on [linux distribution]"
46
-
4. If all approaches failed, set environment variable `SSL_CERT_FILE` to the CA bundle `.pem` file we get.
46
+
4. If all approaches failed, set environment variable `SSL_CERT_FILE` to the CA bundle `.pem` file we get.
47
47
> To verify cert gets installed properly on Linux, you can try use `curl -v https://sitewithsslissue.com` and `pwsh -Command \"Invoke-WebRequest -Uri https://sitewithsslissue.com\"`
48
48
49
49
### Trust CA certificate for Git CLI
50
50
51
51
Git uses various CA bundle file depends on your operation system.
52
-
- Git packaged the CA bundle file within the Git installation on Windows
52
+
- Git packaged the CA bundle file within the Git installation on Windows
53
53
- Git use OpenSSL certificate CA bundle file on Linux and macOS
Copy file name to clipboardexpand all lines: docs/design/auth.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -58,4 +58,4 @@ Authentication in a workflow run to github.com can be accomplished by using the
58
58
59
59
Hosted runner authentication differs from self-hosted authentication in that runners do not undergo a registration process, but instead, the hosted runners get the OAuth token directly by reading the `.credentials` file. The scope of this particular token is limited for a given workflow job execution, and the token is revoked as soon as the job is finished.
60
60
61
-

61
+

0 commit comments