Fossil SCM

Removed manual indents in command and file examples in the ssl doc.

wyoung 2024-02-18 15:26 trunk
Commit 1e0c0d0414bbfaa4aeacd78ee9e6db3fb7836031be13ebf88301631e7ea1c854
1 file changed +17 -17
+17 -17
--- www/ssl.wiki
+++ www/ssl.wiki
@@ -82,19 +82,19 @@
8282
8383
Another option is to download the source code to OpenSSL and build
8484
Fossil against that private version of OpenSSL:
8585
8686
<pre>
87
- cd compat # relative to the Fossil source tree root
88
- tar xf /path/to/openssl-*.tar.gz
89
- ln -fs openssl-x.y.z openssl
90
- cd openssl
91
- ./config # or, e.g. ./Configure darwin64-x86_64-cc
92
- make -j11
93
- cd ../..
94
- ./configure --with-openssl=tree
95
- make -j11
87
+cd compat # relative to the Fossil source tree root
88
+tar xf /path/to/openssl-*.tar.gz
89
+ln -fs openssl-x.y.z openssl
90
+cd openssl
91
+./config # or, e.g. ./Configure darwin64-x86_64-cc
92
+make -j11
93
+cd ../..
94
+./configure --with-openssl=tree
95
+make -j11
9696
</pre>
9797
9898
That will get you a Fossil binary statically linked to this in-tree
9999
version of OpenSSL.
100100
@@ -124,21 +124,21 @@
124124
certificate signed by a well-known CA or one of its delegates, Fossil
125125
still has to know which CA roots to trust. When this fails, you get an
126126
error message that looks like this in Fossil 2.11 and newer:
127127
128128
<pre>
129
- Unable to verify SSL cert from fossil-scm.org
130
- subject: CN = sqlite.org
131
- issuer: C = US, O = Let's Encrypt, CN = Let's Encrypt Authority X3
132
- sha256: bf26092dd97df6e4f7bf1926072e7e8d200129e1ffb8ef5276c1e5dd9bc95d52
133
- accept this cert and continue (y/N)?
129
+Unable to verify SSL cert from fossil-scm.org
130
+ subject: CN = sqlite.org
131
+ issuer: C = US, O = Let's Encrypt, CN = Let's Encrypt Authority X3
132
+ sha256: bf26092dd97df6e4f7bf1926072e7e8d200129e1ffb8ef5276c1e5dd9bc95d52
133
+accept this cert and continue (y/N)?
134134
</pre>
135135
136136
In older versions, the message was much longer and began with this line:
137137
138138
<pre>
139
- SSL verification failed: unable to get local issuer certificate
139
+SSL verification failed: unable to get local issuer certificate
140140
</pre>
141141
142142
Fossil relies on the OpenSSL library to have some way to check a trusted
143143
list of CA signing keys. There are two common ways this fails:
144144
@@ -153,11 +153,11 @@
153153
certificates signed by a local private CA, as often happens in large
154154
enterprises. You can solve this sort of problem by getting your local
155155
CA's signing certificate in PEM format and pointing OpenSSL at it:
156156
157157
<pre>
158
- fossil set --global ssl-ca-location /path/to/local-ca.pem
158
+fossil set --global ssl-ca-location /path/to/local-ca.pem
159159
</pre>
160160
161161
The use of <tt>--global</tt> with this option is common, since you may
162162
have multiple repositories served under certificates signed by that same
163163
CA. However, if you have a mix of publicly-signed and locally-signed
@@ -182,11 +182,11 @@
182182
a [https://curl.se/docs/caextract.html | third party source] for the
183183
<tt>cacert.pem</tt> file. I suggest placing the file into your Windows
184184
user home directory so that you can then point Fossil at it like so:
185185
186186
<pre>
187
- fossil set --global ssl-ca-location %userprofile%\cacert.pem
187
+fossil set --global ssl-ca-location %userprofile%\cacert.pem
188188
</pre>
189189
190190
This can also happen if you've linked Fossil to a version of OpenSSL
191191
[#openssl-src|built from source]. That same <tt>cacert.pem</tt> fix can
192192
work in that case, too.
193193
--- www/ssl.wiki
+++ www/ssl.wiki
@@ -82,19 +82,19 @@
82
83 Another option is to download the source code to OpenSSL and build
84 Fossil against that private version of OpenSSL:
85
86 <pre>
87 cd compat # relative to the Fossil source tree root
88 tar xf /path/to/openssl-*.tar.gz
89 ln -fs openssl-x.y.z openssl
90 cd openssl
91 ./config # or, e.g. ./Configure darwin64-x86_64-cc
92 make -j11
93 cd ../..
94 ./configure --with-openssl=tree
95 make -j11
96 </pre>
97
98 That will get you a Fossil binary statically linked to this in-tree
99 version of OpenSSL.
100
@@ -124,21 +124,21 @@
124 certificate signed by a well-known CA or one of its delegates, Fossil
125 still has to know which CA roots to trust. When this fails, you get an
126 error message that looks like this in Fossil 2.11 and newer:
127
128 <pre>
129 Unable to verify SSL cert from fossil-scm.org
130 subject: CN = sqlite.org
131 issuer: C = US, O = Let's Encrypt, CN = Let's Encrypt Authority X3
132 sha256: bf26092dd97df6e4f7bf1926072e7e8d200129e1ffb8ef5276c1e5dd9bc95d52
133 accept this cert and continue (y/N)?
134 </pre>
135
136 In older versions, the message was much longer and began with this line:
137
138 <pre>
139 SSL verification failed: unable to get local issuer certificate
140 </pre>
141
142 Fossil relies on the OpenSSL library to have some way to check a trusted
143 list of CA signing keys. There are two common ways this fails:
144
@@ -153,11 +153,11 @@
153 certificates signed by a local private CA, as often happens in large
154 enterprises. You can solve this sort of problem by getting your local
155 CA's signing certificate in PEM format and pointing OpenSSL at it:
156
157 <pre>
158 fossil set --global ssl-ca-location /path/to/local-ca.pem
159 </pre>
160
161 The use of <tt>--global</tt> with this option is common, since you may
162 have multiple repositories served under certificates signed by that same
163 CA. However, if you have a mix of publicly-signed and locally-signed
@@ -182,11 +182,11 @@
182 a [https://curl.se/docs/caextract.html | third party source] for the
183 <tt>cacert.pem</tt> file. I suggest placing the file into your Windows
184 user home directory so that you can then point Fossil at it like so:
185
186 <pre>
187 fossil set --global ssl-ca-location %userprofile%\cacert.pem
188 </pre>
189
190 This can also happen if you've linked Fossil to a version of OpenSSL
191 [#openssl-src|built from source]. That same <tt>cacert.pem</tt> fix can
192 work in that case, too.
193
--- www/ssl.wiki
+++ www/ssl.wiki
@@ -82,19 +82,19 @@
82
83 Another option is to download the source code to OpenSSL and build
84 Fossil against that private version of OpenSSL:
85
86 <pre>
87 cd compat # relative to the Fossil source tree root
88 tar xf /path/to/openssl-*.tar.gz
89 ln -fs openssl-x.y.z openssl
90 cd openssl
91 ./config # or, e.g. ./Configure darwin64-x86_64-cc
92 make -j11
93 cd ../..
94 ./configure --with-openssl=tree
95 make -j11
96 </pre>
97
98 That will get you a Fossil binary statically linked to this in-tree
99 version of OpenSSL.
100
@@ -124,21 +124,21 @@
124 certificate signed by a well-known CA or one of its delegates, Fossil
125 still has to know which CA roots to trust. When this fails, you get an
126 error message that looks like this in Fossil 2.11 and newer:
127
128 <pre>
129 Unable to verify SSL cert from fossil-scm.org
130 subject: CN = sqlite.org
131 issuer: C = US, O = Let's Encrypt, CN = Let's Encrypt Authority X3
132 sha256: bf26092dd97df6e4f7bf1926072e7e8d200129e1ffb8ef5276c1e5dd9bc95d52
133 accept this cert and continue (y/N)?
134 </pre>
135
136 In older versions, the message was much longer and began with this line:
137
138 <pre>
139 SSL verification failed: unable to get local issuer certificate
140 </pre>
141
142 Fossil relies on the OpenSSL library to have some way to check a trusted
143 list of CA signing keys. There are two common ways this fails:
144
@@ -153,11 +153,11 @@
153 certificates signed by a local private CA, as often happens in large
154 enterprises. You can solve this sort of problem by getting your local
155 CA's signing certificate in PEM format and pointing OpenSSL at it:
156
157 <pre>
158 fossil set --global ssl-ca-location /path/to/local-ca.pem
159 </pre>
160
161 The use of <tt>--global</tt> with this option is common, since you may
162 have multiple repositories served under certificates signed by that same
163 CA. However, if you have a mix of publicly-signed and locally-signed
@@ -182,11 +182,11 @@
182 a [https://curl.se/docs/caextract.html | third party source] for the
183 <tt>cacert.pem</tt> file. I suggest placing the file into your Windows
184 user home directory so that you can then point Fossil at it like so:
185
186 <pre>
187 fossil set --global ssl-ca-location %userprofile%\cacert.pem
188 </pre>
189
190 This can also happen if you've linked Fossil to a version of OpenSSL
191 [#openssl-src|built from source]. That same <tt>cacert.pem</tt> fix can
192 work in that case, too.
193

Keyboard Shortcuts

Open search /
Next entry (timeline) j
Previous entry (timeline) k
Open focused entry Enter
Show this help ?
Toggle theme Top nav button