distributions: The certificate for deb.nodesource seems to be expired
- Environment: Docker (ubuntu:bionic image)
- Issue: When trying to install Node.js v14.x following these instructions , if fails during apt-get update
:
## Confirming "bionic" is supported...
+ curl -sLf -o /dev/null 'https://deb.nodesource.com/node_14.x/dists/bionic/Release'
## Adding the NodeSource signing key to your keyring...
+ curl -s https://deb.nodesource.com/gpgkey/nodesource.gpg.key | gpg --dearmor | tee /usr/share/keyrings/nodesource.gpg >/dev/null
## Creating apt sources list file for the NodeSource Node.js 14.x repo...
+ echo 'deb [signed-by=/usr/share/keyrings/nodesource.gpg] https://deb.nodesource.com/node_14.x bionic main' > /etc/apt/sources.list.d/nodesource.list
+ echo 'deb-src [signed-by=/usr/share/keyrings/nodesource.gpg] https://deb.nodesource.com/node_14.x bionic main' >> /etc/apt/sources.list.d/nodesource.list
## Running `apt-get update` for you...
+ apt-get update
Ign:1 https://deb.nodesource.com/node_14.x bionic InRelease
Err:2 https://deb.nodesource.com/node_14.x bionic Release
Certificate verification failed: The certificate is NOT trusted. The certificate chain uses expired certificate. Could not handshake: Error in the certificate verification. [IP: 201.0.222.9 443]
Hit:3 http://security.ubuntu.com/ubuntu bionic-security InRelease
Hit:4 http://archive.ubuntu.com/ubuntu bionic InRelease
Hit:5 http://ppa.launchpad.net/brightbox/ruby-ng/ubuntu bionic InRelease
Hit:6 http://archive.ubuntu.com/ubuntu bionic-updates InRelease
Hit:7 http://archive.ubuntu.com/ubuntu bionic-backports InRelease
Hit:8 https://packagecloud.io/github/git-lfs/ubuntu bionic InRelease
Reading package lists...
E: The repository 'https://deb.nodesource.com/node_14.x bionic Release' does not have a Release file.
Error executing command, exiting
The command '/bin/bash -o pipefail -c curl -fsSL https://deb.nodesource.com/setup_14.x | bash - && apt-get install -y --no-install-recommends nodejs && npm i -g xunit-viewer && rm -rf /var/lib/apt/lists/*' returned a non-zero code: 1
About this issue
- Original URL
- State: closed
- Created 3 years ago
- Reactions: 248
- Comments: 154 (3 by maintainers)
Links to this issue
Commits related to this issue
- ENCD-6171-node-upgrade WIld experiment from https://github.com/nodesource/distributions/issues/1266#issuecomment-931705580 — committed to ENCODE-DCC/encoded by forresttanaka 3 years ago
- fix: testing fix for issue https://github.com/nodesource/distributions/issues/1266 — committed to EYBlockchain/nightfall_3 by LijuJoseJJ 3 years ago
- Dockerfile: Generally use the latest ca-certificates This avoid problems like [^1]. [^1]: https://github.com/nodesource/distributions/issues/1266. Signed-off-by: Sebastian Schuberth <sebastian.schu... — committed to oss-review-toolkit/ort by sschuberth 3 years ago
- fix: issue https://github.com/nodesource/distributions/issues/1266 for optimist service — committed to EYBlockchain/nightfall_3 by LijuJoseJJ 3 years ago
- Generally use the latest ca-certificates on Debian This avoids problems like [1]. [1]: https://github.com/nodesource/distributions/issues/1266. Signed-off-by: Sebastian Schuberth <sebastian.schuber... — committed to oss-review-toolkit/ort by sschuberth 3 years ago
- Generally use the latest ca-certificates on Ubuntu This avoids problems like [1]. [1]: https://github.com/nodesource/distributions/issues/1266. Signed-off-by: Sebastian Schuberth <sebastian.schuber... — committed to oss-review-toolkit/ort by sschuberth 3 years ago
- Generally use the latest ca-certificates on Ubuntu This avoids problems like [1]. [1]: https://github.com/nodesource/distributions/issues/1266. Signed-off-by: Sebastian Schuberth <sebastian.schuber... — committed to oss-review-toolkit/ort by sschuberth 3 years ago
- * Fix building base docker image - workaround for https://github.com/nodesource/distributions/issues/1266 * Update supported sbt versions — committed to VirtusLab/community-build3 by deleted user 3 years ago
- Add libgnutls30 to workaround nodesource expired cert This commit installs libgnutls30 package to the docker image to workaround an expired cert (DST Root CA X3) that expired yesterday. For more inf... — committed to texastribune/tt-docker-base by bfreeds 3 years ago
- Fix cert failure during `apt-get update` By installing newer version of `libgnutls30` that contains a root cert update See https://github.com/nodesource/distributions/issues/1266#issuecomment-9314810... — committed to pytorch/tutorials by malfet 3 years ago
- Fix cert failure during `apt-get update` By installing newer version of `libgnutls30` that contains a root cert update See https://github.com/nodesource/distributions/issues/1266#issuecomment-9314810... — committed to pytorch/tutorials by malfet 3 years ago
- Fix cert failure during `apt-get update` (#1700) By installing newer version of `libgnutls30` that contains a root cert update See https://github.com/nodesource/distributions/issues/1266#issuecomme... — committed to pytorch/tutorials by malfet 3 years ago
- OSS CircleCI: Unbreak analyze_pr cert issue Summary: Context: https://github.com/nodesource/distributions/issues/1266#issuecomment-932583579 For now apply some workaround in analyze_pr docker image ... — committed to fkgozali/react-native by fkgozali 3 years ago
- OSS CircleCI: Unbreak analyze_pr cert issue (#32317) Summary: Pull Request resolved: https://github.com/facebook/react-native/pull/32317 Context: https://github.com/nodesource/distributions/issues/1... — committed to fkgozali/react-native by fkgozali 3 years ago
- OSS CircleCI: Unbreak analyze_pr cert issue (#32317) Summary: Pull Request resolved: https://github.com/facebook/react-native/pull/32317 Context: https://github.com/nodesource/distributions/issues/1... — committed to facebook/react-native by fkgozali 3 years ago
- Fix certificate expired error by installing ca-certificates. https://github.com/nodesource/distributions/issues/1266 — committed to rayburgemeestre/starcry by rayburgemeestre 3 years ago
- cmd/roachtest: fix nodesource installation for sequelize/typeorm/nodejs_postgres The certificate for deb.nodesource in the installation of nodesource seems to be expired. This commit provides a work-... — committed to ZhouXing19/cockroach by ZhouXing19 3 years ago
- Merge #71039 71039: cmd/roachtest: fix nodesource installation for sequelize/typeorm/nodejs_postgres r=ZhouXing19 a=ZhouXing19 The certificate for deb.nodesource in the installation of nodesource s... — committed to cockroachdb/cockroach by deleted user 3 years ago
- [ci] Remove required check for `build-py-36` - Till https://github.com/nodesource/distributions/issues/1266 is fixed. After that we can enable it back up again. — committed to cloudera/hue by Harshg999 3 years ago
- fixed certificate error caused by expired root certificate. cf. https://github.com/nodesource/distributions/issues/1266 — committed to takeaship/stack-chan by takeaship 3 years ago
We are aware of the situation and are actively working to fix it, thank you for your patience.
On the client (Ubuntu), doing this prior to install allowed me to pass through the certificate error:
sudo apt install ca-certificates
Edit: might need
apt update
firstFor Debian buster, updating the
libgnutls30
package appears to fix the certificate verification.I saw this from a docker build. I added this as a workaround so
apt update
would work again.curl -fsSLk https://rpm.nodesource.com/setup_12.x | bash -
could be a good short-term solution (-k
disables the client-side SSL verification).This solution worked for us.
In my image build workflow, I was able to workaround it like this:
After reading 100+ comments, that one worked for me . Thanks for https://github.com/nodesource/distributions/issues/1266#issuecomment-931822235
Just FYI: disabling certification verification globally is not a solution and makes you vulnerable to attacks in this area in the future. You basically bypass the reason HTTPS and certificates exist this way.
Unfortunately that did not work in my case since I was already at latest.
As temp solutions works at Ubuntu20
$curl -s http://deb.nodesource.com/gpgkey/nodesource.gpg.key | apt-key add -
$ sudo sh -c “echo deb http://deb.nodesource.com/node_14.x focal main > /etc/apt/sources.list.d/nodesource.list” $ sudo apt-get update $ sudo apt-get install nodejs
I hope it will works for other distros and nodeversions Http not
httpsThis unified solution worked for our case. Thanks to @spkane @rogerd330
We found this AWS support article from today that fixed the issue for us.
https://aws.amazon.com/premiumsupport/knowledge-center/ec2-expired-certificate/
We manually had to update our instances.
Can we please stop recommending falling back to plaintext http? The correct fix here is to ensure that client CA certificates are up to date, and half-baked workarounds usually cause more problems in the long run than they solve. The specific details vary from one distro to another, but usually involve updating the ca-certificates package.
For everything to work smoothly (particularly gnutls-based clients like apt-get), the
ISRG Root X1
(new Let’s Encrypt root) certificate needs to be present in your trust store and theDST Root CA X3
(old Let’s Encrypt root) needs to be removed. If the DST cert is present, GnuTLS tries to validate the cross-signature, fails because the DST cert is expired, and then marks the entire chain as untrusted even though the ISRG cert is itself trusted.Pulling in what others have done, I was able to get it to work like this for debian stretch:
This seems to be happening again: https://deb.nodesource.com/node_16.x/pool/
I’d love to hear a “non-temporary” fix update on this.
This was causing by BitBucket pipelines to fail and the following changes seem to have fixed it:
Original steps: - curl -sL https://deb.nodesource.com/setup_12.x | bash - - apt-get install -y nodejs
New Steps: - apt-get update - apt-get install -y ca-certificates libgnutls30 - echo ‘-k’ > ~/.curlrc - curl -sL https://deb.nodesource.com/setup_12.x | bash - - apt-get install -y nodejs
Same. I got past the SSL issue with
curl -fsSLk http://deb.nodesource.com/setup_12.x | bash
but now I see:The “September 30” syndrome?
Can someone provide an update regarding this issue? The previous one was 4 hours ago. Even if you tell CURL to use HTTP or ignore the cert error, it seems that the setup is claiming numerous platforms are unsupported.
For those wondering why updating
ca-certificates
solves the problem, the old Lets Encrypt root certificate expired, and you need to download a new one.In an up-to-date browser, you should be able to load this page without a problem: https://deb.nodesource.com/setup_12.x But not on a server with out-of-date certificates:
Along with this problem, if I bypass the SSL problem, still I can’t install in Amazon Linux 1 getting an error like:
Whereas it was working 2 hours ago.
This fixed it for me in Debian:
This works for me also. Others don’t.
For debian 9 based docker images the following seems to be a minimal workaround to solve a problem:
apt update && apt install libssl1.0.2 libgnutls30
Following this exact message (removing the bad cert and forcing Ubuntu to update CA certificates) hotfixed the issue and saved the night for us (Xenial): https://community.letsencrypt.org/t/help-thread-for-dst-root-ca-x3-expiration-september-2021/149190/324
There is a workaround.
from
curl -sL https://deb.nodesource.com/setup_14.x | bash -
tocurl -sL https://deb.nodesource.com/setup_14.x | sed ’s|https://|http://|’ | bash -
Any solution for Amazon Linux 2 ? 😃 I still have the certificate issue and when i try to bypass it, i have the following message:
Your distribution, identified as "system-release-2-12.amzn2.x86_64", is not currently supported, please contact NodeSource at https://github.com/nodesource/distributions/issues if you think this is incorrect or would like your distribution to be considered for support
Using Debian as root. This particular comment saved my pipeline:
For those looking for a deeper understanding of why this happened, user schoen (“Former Certbot engineer, 2015-2020”) has a great explanation in this comment:
https://community.letsencrypt.org/t/help-thread-for-dst-root-ca-x3-expiration-september-2021/149190/497
I got our system, on Amazon, working with this workaround (I had experience the cert and unsupported platform errors):
Old commands: curl -sL https://rpm.nodesource.com/setup_8.x | sudo -E bash - sudo yum -y install nodejs
New commands: echo ‘-k’ > ~/.curlrc curl -sL https://rpm.nodesource.com/setup_8.x --output setup.sh sed -i ‘s/https/http/gi’ setup.sh sudo -E bash setup.sh echo ‘sslverify=false’ | sudo tee -a /etc/yum.conf sudo yum -y install nodejs
Hello there. Updating
ca-certificates
on my base Docker image fixed the issue in my pipelines. Hope this helps !While folks don’t sort this out, we disabled Nodesource’s repository and installed it directly from somewhere else:
@gonzaloaune, same here
Problem with Amazon Linux 1
I using Amazon Linux 2018.03 release Added below commands to configs before execute
curl -L https://rpm.nodesource.com/setup_12.x | sudo bash -
work for me.sudo yum update ca-certificates
sudo yum -y install https://cdn.amazonlinux.com/patch/ca-certificates-update-2021-09-30/ca-certificates-2018.2.22-65.1.24.amzn1.noarch.rpm
Reference: https://aws.amazon.com/premiumsupport/knowledge-center/ec2-expired-certificate/
This is what fixed for me.! The certificates were not updated with the install. needed to do a
upgrade
This fixed my CircleCI pipeline that was running on the
ubuntu-2004
image. Thanks @german-e-mas!I can confirm this works.
@Ranarxhag: On Amazon Linux 2, you can’t remove the CA from trust easily, because it’s included in p11-kit, and marked
read-only
(so thesudo trust anchor --remove
command won’t affect it). The easiest way I found was to put the DST root CA X3 cert in the blacklist.DST_Root_CA_X3.pem
(it’s only about 20 lines, but not pasting here for brevity) - on Amazon Linux I couldn’t find an “extracted”/separate version of this file; it seems they only include the built ca-bundles/etc/pki/ca-trust/source/blacklist/DST_Root_CA_X3.pem
sudo update-ca-trust
Don’t try this at home, kids (redhat variants):
EDIT: Please definitely prefer to update your ca-certs package over doing anything like this!
Installing ca-certificates tells me I’m on the newest version. But I can’t apt update the package list to get a newer version to install because node is making me fail the apt update. Any way to break this cycle of doom?
My note about workarounds being at risk of causing more problems than they solve also applies to curl’s
-k
flag, and especially to modifying.curlrc
.Same for RPM:
UPDATE: Fixed with
yum update ca-certificates
Guys, just need to update the ca-certificates from machine. The old certificate got untrusted, when it’s updated, the error get vanished:
If you are using AMI Linux 2:
If you are using Ubuntu:
https://github.com/nodesource/distributions/issues/1270#issuecomment-932130501
is how we solved the ssl cert issue.
apt-get upgrade -y ca-certificates
has worked for me on some of the older python docker based images i.e. Debian “stretch”This solved the problem for me on Amazon AMI Linux 2
@dominics workaround worked very well on Amazon Linux, but there were a few other things that needed to be done if you’re doing this in a debian Docker container and not specifically working on Amazon Linux. After tinkering with it some, I discovered that we can get around the issue by simply forcing ca-certificates to update and running
update-ca-certificates --fresh
For anyone who is in a similar situation, I used the following in my Dockerfile to get around this.
Note the initial
apt-get -y update || echo "This is expected to fail."
I had to add this otherwise my docker container would think it was already on the latest version of ca-certificates.
Furthermore, I had to add these lines in order to get that “expired” certificate to be recognized as valid again.
Hope this helps. If anyone has any clarifications or adjustments to the above, please feel free to suggest them!
UPDATE: As it turns out, the certificate refresh isn’t even needed. Just forcing an update on ca-certificates is enough.
This was the final workaround
Translated from https://github.com/tuna/issues/issues/1342#issuecomment-931412628:
Possible solutions:
openssl
/gnutls
/ca-certificates
:Work with that in my DockerFile
RUN curl -sL https://deb.nodesource.com/setup_12.x | sed ‘s|https://|http😕/|’| bash -
&& apt-get install -y nodejs
I had same problem on making from ubuntu:20.04 image. I was able to solve this my Dockerfile. This is temporary setting, purpose for inspection. (Many “RUN” will makes many image layers, not favorable.)
Hello ! Try all solutions above, but I still have the issue … anyone else ?
can confirm
apt install ca-certificates
fixed it for usI was able to solve this by adding this to my dockerfile RUN apt-get update ; apt-get install ca-certificates
&& apt-get update
&& apt-get install -y
As mentioned in other comments, adding this to a build spec on AWS seems to fix the issues in CodeBuild:
apt-get update
apt-get install ca-certificates
Added those before installing node and it works again. Thanks to Florent Masson for suggesting it.
I didn’t read thru the 150+ comments, but on Ubuntu 20.04 Focal for Node 16.x simply editing the address to be HTTP instead of HTTPS worked. And “worked” here means apt-get can finish - I am not trying to update or install nodejs at this time. Obviously one does not want to update node from an insecure URL. Another option is to remove the ppa until the issue is fixed.
Fix your client CA chains
solution mentioned by @nicolai-petrov-venngage worked for me
I update
.ebextentions
withIt worked and could execute
curl --location https://rpm.nodesource.com/setup_12.x
in my Elastic Beanstalk Amazon Linux.I see, thanks. Your explanation helped me understand. Running
apt-get -y update || apt-get install ca-certificates
worked for me.I’m running it on gitlab-ci where I need to also consider masking command failure.
the ca-certificates upgrade on ubuntu work-around is removing the X3 cert by blacklisting according to the changelog of ubuntu’s ca-certificates. Theoretically manually removing the expired DST Root CA X3 from /etc/ssl/certs then running
update-ca-certificates
should be the same thing.That’s work for me . Thank you so much.
getting buster not supported upon installing any NodeSource repo
Same issue here, I was able to fix a similar problem on my own server with the following command:
sudo certbot certonly --nginx -d [domain] --dry-run --preferred-chain=“ISRG Root X1”
That was from here: https://community.letsencrypt.org/t/help-thread-for-dst-root-ca-x3-expiration-september-2021/149190/283
Closing this, should be fixed now.
setting curl to operate unsequre as mentiond by @rogerd330 “solves” the issue temporarily - might have been mentioned already, if that the case, then I’m sorry 😉
any update on the fix???
Slightly confused, so given that https://deb.nodesource.com/setup_16.x works great in a browser, the certificate seem up to date, so basically the problem lies in dated ca-certificates. For some of us installing the latest version solves the issue, while others have limited success due to varying distributions. So if i get this right ca-certificates needs to be updated - rather than fixed by nodesource. Possibly nodesource could use some other certificate. I’m kindly monitoring the progress here. Keep up the good work!
https://aws.amazon.com/premiumsupport/knowledge-center/ec2-expired-certificate/
This seems to work for me with Amazon Linux 2 (Beanstalk)
I hit this issue today because the app I was working on uses Debian Jessie.
The root CA that
letsencrypt
used expired on the 30th and the new certificate uses an optional extension to present the new root and the old root certificate. Unfortunately the version oflibssl
that comes with jessie has a bug which only validates the first presented CA chain. Since the old root cert has expired, the ssl connection fails with an invalid certificate / expired error.The fix for me was to remove the old root certificate from my CA store and try again:
Credit to https://serverfault.com/questions/1079199/client-on-debian-9-erroneously-reports-expired-certificate-for-letsencrypt-issue for detailing the issue, and the workaround as well.
same issue
solution from danielmoralesp
worked for me on Ubuntu 20.04.3 LTS
A workaround is to use http instead of https but this is not ideal. I hope there is a permanent fix soon 😃
After trying this, I found out for me on debian stretch, updating
libssl1.0.2
was all that was needed:apt-get update && apt-get install libssl1.0.2
Hi, the actual issue (when I looked) was that the server(s) are setup with an incomplete certificate chain - I did try to flag this earlier: https://twitter.com/webprofusion/status/1443745049108303873?s=19
In the web server SSL/TLS configuration you specify a cert and the certs private key, but you should also specify a chain of intermediates (or a ‘full chain’), otherwise clients will guess them, and in the case of Let’s Encrypt that leads to clients trying to use the expired R3 path.
After hours of debugging, we have finally managed to fix this by adding these commands at the proper place in dockerfile
RUN apt update
RUN apt install libgnutls30
RUN apt install ca-certificates
I updated my nodejs install command and it work well (for now) eb amazon linux 1
I’m working through this right now, but you have to set up a .curlrc to set the -k flag on all curl calls because the script that ends up running also ends up making a curl call to the nodesource domain
I know it’s not a safe solution (nor adviced) but we’re arising this issue in several Dockerfiles used only to compile some assets in a CI/CD process so we needed a workaround there…
My solution is to disable the certificate check for both curl and apt (script does an
apk-add
):echo "insecure" > $HOME/.curlrc # Insecure (-k) for all curls
echo "Acquire::https::Verify-Peer false;" >> /etc/apt/apt.conf.d/80ssl-exceptions # Disable apk CA check
echo "Acquire::https::Verify-Host false;" >> /etc/apt/apt.conf.d/80ssl-exceptions # Disable apk CA check
With that,it works. Don’t forget to enable it again after installing node & npm:
rm -f $HOME/.curlrc
rm -f /etc/apt/apt.conf.d/80ssl-exceptions
Again it’s not a safe solution but it works.
We’ve also checked that this CA certificate problem only happens with debian versions lower than 9 🤔
The following worked for me -
Remove the Node source from the apt sources.list (either sources.list itself or sources.list.d), then run apt update, then apt upgrade, then once that is all done, put the node source back into apt again and everything should be good to go.
That’s how I managed to eventually fix it.
Basically follow this comment here: https://github.com/nodesource/distributions/issues/1266#issuecomment-931620638
None of the above workarounds are working for ubuntu 20.04:
Still get:
And no, the problem is not solved by disabling nodesource temporarily in the sources.list … As seen from above update and upgrade are working
@AleksandarFilipov I don’t fully understand it either, but it seems like a browser will locate the new root certificates, but the Linux tools will opt for the recently expired ones? I wish I could explain it better, but this is not my area of expertise.
You can use the
openssl
CLI to verify if a website is still using the old certificates:For everyone with Vagrant you can
vagrant up
until the error appears,vagrant ssh
and thensudo apt install ca-certificates
followed bysudo apt-get updates
. Exit and reload your box with--provision
.If still not working check the issue on the laravel/homestead repo, hope it helps.
@dgarbus not sure how you figured this out but it worked for me 🙏
Just had the same issue when trying to
sudo apt update
Any update on this? - this broke all our deploys on Ubuntu 16, Ubuntu 18, Ubuntu 20 and Raspbian 😦
apt update keeps giving me this same error, tried all solutions, have not been able to fix the issue.
I have Ubuntu 20.04 running on WSL2 and none of the commands above worked for me 🤔🙁
this solved our problem on debian stretch:
If you use AWS EC2 or AWS Elastic Beanstalk, this article is useful for this issue. https://aws.amazon.com/premiumsupport/knowledge-center/ec2-expired-certificate/
This worked for us and is less invasive as other suggestions. Thanks @german-e-mas @igsu Any update on a permanent fix for this? Thanks in advance.
I was using Debian Jessie based image. Our solution was:
The
libgnutls30
is not a guaranteed fix. Still getting intermittent failures about the SSL Cert not being there/valid and NodeJS 14 cannot be installed because of it.Having the same issue here, but none of the fixes (Without going to the extremes) have worked.
If I then do an
apt install libgnutls30
it comes back withIf I do an
apt install ca-certificates
it comes back withI’ve also tried the removal of the bad certificates then forcing a refresh to no avail.
This is on Debian Buster.
@dominics thank you, that was really helpful, finally got ours working again. we are on elastic beanstalk, ruby 2.6 on amazon linux 1 - I used
eb ssh [server]
to get on the server and thensudo touch /etc/pki/ca-trust/source/blacklist/DST_Root_CA_X3.pem
sudo vim /etc/pki/ca-trust/source/blacklist/DST_Root_CA_X3.pem
and then copy and pasted in the pem key, saved and then ran thesudo update-ca-trust
. My deployments are not set to immutable thankfully, so redeploying app code didn’t wipe this and it all worked.I’m assuming if my app runs into a problem and needs to scale or rebuild I’m going to lose this and the site will go down again. Hopefully there is a real fix in the works coming soon! Or someone brilliant will figure out an ebextension for this.
d10sfan has the right server-side fix - also certbot HAS to be newer than 0.12 or a bug may cause the older chain to keep being used.
Clients don’t need to do anything if server admins get a new letsencrypt cert intermediate chain. The full chain should only contain your server cert followed by R3 which says Issuer is X1. X1 should have issuer of X1 (real root), not X3 otherwise that’s old.
Debugging from
openssl s_client -connect deb.nodesource.com:443
- this is wrong:It should look like this:
@Ranarxhag That error is from the script’s attempt to ping NodeSource to see if a file for your system exists. Since it does so over HTTPS, which fails, it interprets that failure as the system being unsupported. Even if you change that check to be HTTP instead you’ll just get a broken repo put into
yum
that can’t download Node anyway AFAIK.