Skip to content

Instantly share code, notes, and snippets.

@ulysses4ever
Last active September 19, 2024 18:07
Show Gist options
  • Save ulysses4ever/602014e347df797f2f16a14edc0a9272 to your computer and use it in GitHub Desktop.
Save ulysses4ever/602014e347df797f2f16a14edc0a9272 to your computer and use it in GitHub Desktop.
❯ /run/current-system/sw/bin/curl --config - 'https://hackage.haskell.org/package/ale
x-meta-0.3.0.14/candidate/docs' --request PUT --data-binary '@/home/artem/tmp/BNFC-me
ta/dist-newstyle/alex-meta-0.3.0.14-docs.tar.gz' --write-out '%{http_code}' --user-ag
ent 'cabal-install/3.15.0.0 (linux; x86_64)' --silent --show-error --location --heade
r 'Accept: text/plain' --header 'Content-Type: application/x-tar' --header 'Content-E
ncoding: gzip' -v
--anyauth
--user ArtemPelenitsyn:<my password>
* Host hackage.haskell.org:443 was resolved.
* IPv6: (none)
* IPv4: 151.101.0.68, 151.101.128.68, 151.101.192.68, 151.101.64.68
* Trying 151.101.0.68:443...
* Connected to hackage.haskell.org (151.101.0.68) port 443
* ALPN: curl offers h2,http/1.1
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
* TLSv1.3 (IN), TLS handshake, Server hello (2):
* TLSv1.2 (IN), TLS handshake, Certificate (11):
* TLSv1.2 (IN), TLS handshake, Server key exchange (12):
* TLSv1.2 (IN), TLS handshake, Server finished (14):
* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
* TLSv1.2 (OUT), TLS change cipher, Change cipher spec (1):
* TLSv1.2 (OUT), TLS handshake, Finished (20):
* TLSv1.2 (IN), TLS handshake, Finished (20):
* SSL connection using TLSv1.2 / ECDHE-RSA-CHACHA20-POLY1305 / X25519 / RSASSA-PSS
* ALPN: server accepted http/1.1
* Server certificate:
* subject: CN=*.haskell.org
* start date: Jun 2 16:50:15 2024 GMT
* expire date: Jul 4 16:50:14 2025 GMT
* subjectAltName: host "hackage.haskell.org" matched cert's "*.haskell.org"
* issuer: C=BE; O=GlobalSign nv-sa; CN=GlobalSign Atlas R3 DV TLS CA 2024 Q2
* SSL certificate verify ok.
* Certificate level 0: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption
* Certificate level 1: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption
* Certificate level 2: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption
* using HTTP/1.x
> PUT /package/alex-meta-0.3.0.14/candidate/docs HTTP/1.1
> Host: hackage.haskell.org
> User-Agent: cabal-install/3.15.0.0 (linux; x86_64)
> Accept: text/plain
> Content-Type: application/x-tar
> Content-Encoding: gzip
> Content-Length: 225615
>
* upload completely sent off: 225615 bytes
< HTTP/1.1 401 Unauthorized
< Connection: keep-alive
< Server: nginx/1.18.0 (Ubuntu)
< Content-Type: text/plain; charset=utf-8
< Set-Cookie: authn="0";Path=/;Version="1"
< WWW-Authenticate: Digest realm="Hackage", qop="auth", nonce="3efe7e806363b8f38f4e5d3e4a7a4727", opaque=""
< Accept-Ranges: bytes
< Date: Thu, 19 Sep 2024 18:03:25 GMT
< Via: 1.1 varnish
< X-Served-By: cache-chi-klot8100082-CHI
< X-Cache: MISS
< X-Cache-Hits: 0
< X-Timer: S1726769005.989743,VS0,VE109
< Vary: Accept
< transfer-encoding: chunked
<
* Need to rewind upload for next request
* Ignoring the response-body
* chunk hex-length char not a hex digit: 0xd
* Illegal or missing hexadecimal sequence in chunked-encoding
* Closing connection
* TLSv1.2 (IN), TLS alert, close notify (256):
curl: (56) chunk hex-length char not a hex digit: 0xd
401⏎
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment