-
Notifications
You must be signed in to change notification settings - Fork 258
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Bug]: Author primary signing certificate not trusted when installing package through an Azure DevOps feed #12017
Comments
I have the same problem. |
@dtivel @heng-liu Could you please take a look? Is this PR related? NuGet/NuGet.Client#4722 |
Hi @dtivel , fyi, the installed package NServiceBus.Extensions.Hosting 1.1.0 is the same with the one on nuget.org (I checked content hash).
|
@RVink, where |
@dtivel. Sure, see the output below.
|
Thanks. Can you add |
Of course
|
@RVink, thank you for the repro steps. I have reproduced the behavior and will investigate further. In the meantime, you can disable signed package verification during restore operations by setting environment variable Also see dotnet/core#7688 for more information. CC @richlander as FYI. |
This would look something like the following in your Dockerfile: FROM mcr.microsoft.com/dotnet/sdk:6.0 AS build
ENV DOTNET_NUGET_SIGNATURE_VERIFICATION=false That will override this value: |
We may choose to remove this ENV from our Dockerfiles. We want to wait on the result of this investigation before making any decisions. Also, we want to learn why we've only had this one report so far. Perhaps the investigation will answer that. |
@dtivel Cool. Thanks for your help :) @richlander Maybe it is good to know that we had |
We are facing the same issue, with DevExpress nuget packages. Here is one of many similar errors we got when running docker compose in our Azure DevOps pipeline:
The workaround proposed by @dtivel solved our issue for now. Thanks! |
I'd like to confirm that after the fix, the issue is resolved for us. We have re-enabled the signature verification in our Dockerfile, and our builds are completing again without issues. |
Thanks for confirming, @madcboyum! There are 2 separate issues here:
.NET containers were updated to disable NuGet signed package verification by default via dotnet/dotnet-docker#4000. You can either explicitly disable signed package verification during restore operations with your current container by setting environment variable to
...or pull an updated container. With the updated container, you should not be affected by this unless you explicitly opt back in for verification. I will close this issue as a duplicate of #12033. |
Here's the announcement of the rollback in the SDK container images: dotnet/dotnet-docker#4006 |
NuGet Product Used
dotnet.exe
Product Version
6.0.400
Worked before?
6.0.302
Impact
It bothers me. A fix would be nice
Repro Steps & Context
Reproduction steps
mcr.microsoft.com/dotnet/sdk:6.0-alpine
or use the commanddocker run -it --entrypoint /bin/sh mcr.microsoft.com/dotnet/sdk:6.0-alpine
dotnet nuget remove source nuget.org
dotnet new console
NServiceBus.Extensions.Hosting
version 1.1.0 by usingdotnet add package NServiceBus.Extensions.Hosting --version 1.1.0
Result
Installing the package logs the warning
warn : NU3018: Package 'NServiceBus.Extensions.Hosting 1.1.0' from source 'https://pkgs.dev.azure.com/rr-wfm/Platform/_packaging/nuget_test_feed/nuget/v3/index.json': The author primary signature's signing certificate is not trusted by the trust provider.
The logs containing this error message can be found here: Logs installing package using Azure DevOps feed.txt
Expected result
I would not expect this error message form occuring as installing the same package directly from nuget.org does not log this error message. See: Logs installing package using nuget.org.txt.
Also comparing the package from both sources using the nuget package explorer does not reveal any differences.
Verbose Logs
No response
The text was updated successfully, but these errors were encountered: