CLI & Language Issues
Even if you installed the Root CA on your operating system, many developer tools and programming languages ignore the system store and use their own.
Prerequisite:
You must have the trustlab-root.crt file downloaded on your machine first.
Download it here.
If your code or scripts are failing with certificate errors, check the solutions below.
1. cURL & Wget
Standard command-line tools often look for a specific bundle file.
cURL
curl: (60) SSL certificate problem: unable to get local issuer certificate
Solution: Pass the Root CA explicitly:
curl --cacert /path/to/trustlab-root.crt https://your-domain.localWget
Solution:
wget --ca-certificate=/path/to/trustlab-root.crt https://your-domain.local2. Node.js / JavaScript
Node.js does not use the System Root CA by default.
Error: self signed certificate in certificate chain
Solution (Environment Variable): Set this variable before running your application. It works for most Node.js apps (npm, yarn, custom scripts).
export NODE_EXTRA_CA_CERTS="/path/to/trustlab-root.crt"
node server.js3. Python (Requests/Pip)
Python's requests library (and pip) uses its own certificate bundle (certifi), ignoring Windows/macOS/Linux system stores.
SSLError(SSLCertVerificationError(1, '[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed'))
Solution: Point to your Root CA using an environment variable.
export REQUESTS_CA_BUNDLE="/path/to/trustlab-root.crt"
python script.py4. Java Applications
Java uses a proprietary "Keystore" (JKS) and typically ignores the Windows Certificate Store.
sun.security.validator.ValidatorException: PKIX path building failed
Solution: You must import the TrustLab Root CA into the Java Keystore (cacerts).