-
Notifications
You must be signed in to change notification settings - Fork 212
Description
It worked on the 4:th of June now I get the following error (the see inner exception isn't possible... or that's the info that follows?!)
/workspace/.csproj : error NU1301: Unable to load the service index for source https://api.nuget.org/v3/index.json. [/workspace/.sln]
/workspace/.csproj : error NU1301: The SSL connection could not be established, see inner exception. [/workspace/.sln]
/workspace/.csproj : error NU1301: The remote certificate is invalid because of errors in the certificate chain: RevocationStatusUnknown, OfflineRevocation [/workspace/.sln]
Here's the setup script
# Update apt index
apt update
# Install the latest patches
apt upgrade -y
# -- Install .NET dependencies (https://learn.microsoft.com/en-gb/dotnet/core/install/linux-ubuntu-decision#dependencies) --
apt install -y liblttng-ust1t64
# -- .NET 8 LTS (latest 8.0.xxx feature band) --
curl -sSL https://dot.net/v1/dotnet-install.sh | bash /dev/stdin --channel 8.0
# -- .NET 9 STS (latest 9.0.xxx feature band) --
curl -sSL https://dot.net/v1/dotnet-install.sh | bash /dev/stdin --channel 9.0
# -- .NET 10 (Preview / LTS November 2025)--
curl -sSL https://dot.net/v1/dotnet-install.sh | bash /dev/stdin --channel 10.0
cat <<'EOF' >> ~/.profile # Append the lines until the lone ‘EOF’ (could be foo or w/e) marker to ~/.profile verbatim—quoted here-doc stops any $VAR expansion
# Pick the folder you want as your personal "dotnet root":
export DOTNET_ROOT="$HOME/.dotnet" # or another path if you prefer
export PATH="$PATH:$DOTNET_ROOT:$DOTNET_ROOT/tools" # temp for this shell
EOF
cat <<'EOF' >> ~/.bashrc # Append the lines until the lone ‘EOF’ (could be foo or w/e) marker to ~/.profile verbatim—quoted here-doc stops any $VAR expansion
# Pick the folder you want as your personal "dotnet root":
export DOTNET_ROOT="$HOME/.dotnet" # or another path if you prefer
export PATH="$PATH:$DOTNET_ROOT:$DOTNET_ROOT/tools" # temp for this shell
EOF
# Reload the profile so the updated path is available
source ~/.profile
# Simple check to see if dotnet is available
dotnet --info
# Run a dotnet restore so we have the NuGet packages (and hope for no added packages during feature work :P maybe allow internet access in the future?)
dotnet restore
UPDATE: Adding apt install -y ca-certificates and update-ca-certificates made no difference.
Interestingly it outputs
ca-certificates is already the newest version (20240203).
Which seems a bit old
log output for ca-certificates operations
+ apt install -y ca-certificates
Reading package lists... 0%
Reading package lists... 0%
Reading package lists... 0%
Reading package lists... 0%
Reading package lists... 0%
Reading package lists... 0%
Reading package lists... 0%
Reading package lists... 5%
Reading package lists... 5%
Reading package lists... 41%
Reading package lists... 62%
Reading package lists... 62%
Reading package lists... 63%
Reading package lists... 63%
Reading package lists... 64%
Reading package lists... 64%
Reading package lists... 69%
Reading package lists... 69%
Reading package lists... 74%
Reading package lists... 74%
Reading package lists... 82%
Reading package lists... 82%
Reading package lists... 82%
Reading package lists... 82%
Reading package lists... 83%
Reading package lists... 83%
Reading package lists... 83%
Reading package lists... 83%
Reading package lists... 87%
Reading package lists... 87%
Reading package lists... 92%
Reading package lists... 92%
Reading package lists... 97%
Reading package lists... 99%
Reading package lists... 99%
Reading package lists... 99%
Reading package lists... 99%
Reading package lists... Done
Building dependency tree... 0%
Building dependency tree... 0%
Building dependency tree... 50%
Building dependency tree... 50%
Building dependency tree... Done
Reading state information... 0%
Reading state information... 0%
Reading state information... Done
ca-certificates is already the newest version (20240203).
ca-certificates set to manually installed.
0 upgraded, 0 newly installed, 0 to remove and 2 not upgraded.
+ update-ca-certificates
Updating certificates in /etc/ssl/certs...
0 added, 0 removed; done.
Running hooks in /etc/ca-certificates/update.d...
done.
I'm guessing the CRL/OCSP endpoint(s) aren't allow listed now but they either were previously or the restrictions were more lax in the past.