Last active
September 19, 2024 18:07
-
-
Save ulysses4ever/602014e347df797f2f16a14edc0a9272 to your computer and use it in GitHub Desktop.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
❯ /run/current-system/sw/bin/curl --config - 'https://hackage.haskell.org/package/ale | |
x-meta-0.3.0.14/candidate/docs' --request PUT --data-binary '@/home/artem/tmp/BNFC-me | |
ta/dist-newstyle/alex-meta-0.3.0.14-docs.tar.gz' --write-out '%{http_code}' --user-ag | |
ent 'cabal-install/3.15.0.0 (linux; x86_64)' --silent --show-error --location --heade | |
r 'Accept: text/plain' --header 'Content-Type: application/x-tar' --header 'Content-E | |
ncoding: gzip' -v | |
--anyauth | |
--user ArtemPelenitsyn:<my password> | |
* Host hackage.haskell.org:443 was resolved. | |
* IPv6: (none) | |
* IPv4: 151.101.0.68, 151.101.128.68, 151.101.192.68, 151.101.64.68 | |
* Trying 151.101.0.68:443... | |
* Connected to hackage.haskell.org (151.101.0.68) port 443 | |
* ALPN: curl offers h2,http/1.1 | |
* TLSv1.3 (OUT), TLS handshake, Client hello (1): | |
* TLSv1.3 (IN), TLS handshake, Server hello (2): | |
* TLSv1.2 (IN), TLS handshake, Certificate (11): | |
* TLSv1.2 (IN), TLS handshake, Server key exchange (12): | |
* TLSv1.2 (IN), TLS handshake, Server finished (14): | |
* TLSv1.2 (OUT), TLS handshake, Client key exchange (16): | |
* TLSv1.2 (OUT), TLS change cipher, Change cipher spec (1): | |
* TLSv1.2 (OUT), TLS handshake, Finished (20): | |
* TLSv1.2 (IN), TLS handshake, Finished (20): | |
* SSL connection using TLSv1.2 / ECDHE-RSA-CHACHA20-POLY1305 / X25519 / RSASSA-PSS | |
* ALPN: server accepted http/1.1 | |
* Server certificate: | |
* subject: CN=*.haskell.org | |
* start date: Jun 2 16:50:15 2024 GMT | |
* expire date: Jul 4 16:50:14 2025 GMT | |
* subjectAltName: host "hackage.haskell.org" matched cert's "*.haskell.org" | |
* issuer: C=BE; O=GlobalSign nv-sa; CN=GlobalSign Atlas R3 DV TLS CA 2024 Q2 | |
* SSL certificate verify ok. | |
* Certificate level 0: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption | |
* Certificate level 1: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption | |
* Certificate level 2: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption | |
* using HTTP/1.x | |
> PUT /package/alex-meta-0.3.0.14/candidate/docs HTTP/1.1 | |
> Host: hackage.haskell.org | |
> User-Agent: cabal-install/3.15.0.0 (linux; x86_64) | |
> Accept: text/plain | |
> Content-Type: application/x-tar | |
> Content-Encoding: gzip | |
> Content-Length: 225615 | |
> | |
* upload completely sent off: 225615 bytes | |
< HTTP/1.1 401 Unauthorized | |
< Connection: keep-alive | |
< Server: nginx/1.18.0 (Ubuntu) | |
< Content-Type: text/plain; charset=utf-8 | |
< Set-Cookie: authn="0";Path=/;Version="1" | |
< WWW-Authenticate: Digest realm="Hackage", qop="auth", nonce="3efe7e806363b8f38f4e5d3e4a7a4727", opaque="" | |
< Accept-Ranges: bytes | |
< Date: Thu, 19 Sep 2024 18:03:25 GMT | |
< Via: 1.1 varnish | |
< X-Served-By: cache-chi-klot8100082-CHI | |
< X-Cache: MISS | |
< X-Cache-Hits: 0 | |
< X-Timer: S1726769005.989743,VS0,VE109 | |
< Vary: Accept | |
< transfer-encoding: chunked | |
< | |
* Need to rewind upload for next request | |
* Ignoring the response-body | |
* chunk hex-length char not a hex digit: 0xd | |
* Illegal or missing hexadecimal sequence in chunked-encoding | |
* Closing connection | |
* TLSv1.2 (IN), TLS alert, close notify (256): | |
curl: (56) chunk hex-length char not a hex digit: 0xd | |
401⏎ |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment