-
Notifications
You must be signed in to change notification settings - Fork 433
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
error sending request for url - error #1086
Comments
jasonkneen
added a commit
to jasonkneen/maverick
that referenced
this issue
Feb 5, 2025
Fixes block#1086 Add logic to handle custom certificates for internal company setup. * **crates/goose/src/providers/openai.rs** - Import `Certificate` from `reqwest` and `fs` module. - Add logic to load custom certificate from a specified path. - Update `Client::builder()` to include custom certificate configuration if specified. - Add `OPENAI_CERT_PATH` to the list of configuration keys. * **ui/desktop/src/config.ts** - Import `Certificate` from `electron` and `fs` module. - Add `loadCustomCertificate` function to load custom certificate from a specified path. --- For more details, open the [Copilot Workspace session](https://copilot-workspace.githubnext.com/block/goose/issues/1086?shareId=XXXX-XXXX-XXXX-XXXX).
jasonkneen
added a commit
to jasonkneen/maverick
that referenced
this issue
Feb 5, 2025
Fixes block#1086 Add support for custom certificates for internal company setup in `OpenAiProvider`. * **`crates/goose/src/providers/openai.rs`** - Add logic to handle custom certificates for internal company setup. - Update `post` method to use custom certificates if provided. - Add `OPENAI_CERT_PATH` configuration key to `OpenAiProvider`. * **`crates/goose/src/providers/utils.rs`** - Add utility function `load_custom_certificates` to load custom certificates from environment variables. --- For more details, open the [Copilot Workspace session](https://copilot-workspace.githubnext.com/block/goose/issues/1086?shareId=XXXX-XXXX-XXXX-XXXX).
Consolidating with #885 - i think we are failing because of the appending /v1/ |
Actually that doesn't make sense, as this works fine internally:
```
curl --request GET \
--url https://ngc-genai-proxy-stage.companyinternal.com/v1/models \
--header 'Authorization: Bearer sk-***'
```
…On Fri, Feb 7, 2025 at 5:54 PM Bradley Axen ***@***.***> wrote:
Closed #1086 <#1086> as completed.
—
Reply to this email directly, view it on GitHub
<#1086 (comment)>, or
unsubscribe
<https://github.com/notifications/unsubscribe-auth/ABVOPLABCXVOJVV7KHPXUV32ORKBRAVCNFSM6AAAAABWRISC66VHI2DSMVQWIX3LMV45UABCJFZXG5LFIV3GK3TUJZXXI2LGNFRWC5DJN5XDWMJWGIZDANRQGQYTQOA>
.
You are receiving this because you authored the thread.Message ID:
***@***.***>
|
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Describe the bug
A clear and concise description of what the bug is.
Using litellm proxy endpoint which should be compatible with custom internal endpoint stored in
.zshrc
export OPENAI_HOST="https://ngc-genai-proxy-stage.company.com"
To Reproduce
Steps to reproduce the behavior:
Expected behavior
A clear and concise description of what you expected to happen.
It working.
Screenshots
If applicable, add screenshots to help explain your problem.
Please provide following information:
Additional context
Add any other context about the problem here.
Could likely be certs issue for internal company setup, but not sure how that would be configured here to use custom cert.
The text was updated successfully, but these errors were encountered: