Describe the bug
On the windows-2019, not all root CA certificates are installed. Some are missing (for example Quo Vadis). This leads for some tools to the following error: X509: CERTIFICATE SIGNED BY UNKNOWN AUTHORITY when calling a API vis SSL.
Area for Triage:
Servers
Question, Bug, or Feature?:
Bug
Virtual environments affected
Expected behavior
I expect the same default root CAs on windows-2019 then on Windows 10 or Linux. If I run gci Cert:\CurrentUser\AuthRoot on my Windows 10, I get a list of 30 entries (including QuoVadis).
Actual behavior
If I run gci Cert:\CurrentUser\AuthRoot on windows-2019 I only get a list of 19 entries.
Workaraound
As a workaround you can install the certificates in the pipeline using certutil:
certutil -f -addstore root <FILEPATH>.cer
I posted the workaround here.
Hello, @wulfland
Could you please check the list of certificates after import? If this list is good for you we can import it on image.
- name: Import Root CA
run: |
$null = certutil.exe -generateSSTFromWU roots.sst
Import-Certificate -FilePath roots.sst -CertStoreLocation Cert:\LocalMachine\Root
shell: powershell
Hello @al-cheb ,
I tested it and it works 馃憤 . Now that's a big list your are going to import :-D
Hello, @wulfland
We have installed missing certificates on Windows Server 2019 image. Could you please validate your workflow?
Hi @al-cheb
Works perfectly! Thanks for the help!
Most helpful comment
Hi @al-cheb
Works perfectly! Thanks for the help!