Importing self-signed cert into Docker's JRE cacert is not recognized by the service

前端 未结 3 735
渐次进展
渐次进展 2020-12-14 02:31
  • A Java Service is running inside the Docker container, which access the external HTTPS url and its self-sign certificate is unavailable to the service/ JRE cacert keys
相关标签:
3条回答
  • 2020-12-14 03:03

    Hence imported the self-signed certificate of HTTPS external URL into Docker container's JRE cacert keystore.

    No: you need to import it into the Docker image from which you run your container.

    Importing it into the container would only create a temporary writable data layer, which will be discarded when you restart your container.

    Something like this answer:

    USER root
    COPY ldap.cer $JAVA_HOME/jre/lib/security
    RUN \
        cd $JAVA_HOME/jre/lib/security \
        && keytool -keystore cacerts -storepass changeit -noprompt -trustcacerts -importcert -alias ldapcert -file ldap.cer
    
    0 讨论(0)
  • 2020-12-14 03:09

    For using already configured java based containers like jenkins, sonarqube or nexus (e. g. if you run your own build server) I find it more convenient to mount a suitable cacerts-file into these containers with a parameter for docker run .

    I use the cacerts file from openjdk as base:

    1. extracting cacerts from openjdk image using a temporary container:
    docker pull openjdk:latest
    docker run --rm --entrypoint cat openjdk:latest /etc/ssl/certs/java/cacerts > cacerts
    
    1. adding certificate to the extracted cacerts using a temporary container started from the same folder which also contains ldap.cer:
    docker run --rm -v `pwd`:/tmp/certs openjdk:latest bash -c 'cd /tmp/certs && keytool -keystore cacerts -storepass changeit -noprompt -trustcacerts -importcert -alias buenting-root -file ldap.cer'
    
    1. run your target docker container(s) mounting the extracted cacerts with a run-parameter, e. g. for sonarqube:
    docker run ... -v /path/to/your/prepared/cacerts:/etc/ssl/certs/java/cacerts:ro ... sonarqube:lts
    

    If there is a new version of openjdk you can update the cacerts-file on the host with commands from 1. and 2.

    For updating the target image (e. g. sonarqube) you do not need to create your own image using Dockerfile and docker build.

    0 讨论(0)
  • 2020-12-14 03:14

    Here is a solution that worked for OpenJDK Java 11 based image.

    A thing to mention before is that you can use either JDK image or JRE. The second option will require ca-certificates-java installed.

    • Dockerfile for JDK based image:
    FROM openjdk:11-jdk-slim
    WORKDIR /opt/workdir/
    
    #.crt file in the same folder as your Dockerfile
    ARG CERT="certificate.crt"
    
    #import cert into java
    COPY $CERT /opt/workdir/
    RUN keytool -importcert -file $CERT -alias $CERT -cacerts -storepass changeit -noprompt
    
    ...
    
    • Dockerfile for JRE based image:
    FROM openjdk:11-jre-slim
    WORKDIR /opt/workdir/
    
    #installing ca-certificates-java to import the certificate
    RUN mkdir -p /usr/share/man/man1 \
        && apt-get update \
        && apt-get install -y ca-certificates-java
    
    #.crt file in the same folder as your Dockerfile
    ARG CERT="certificate.crt"
    
    #import cert into java
    COPY $CERT /opt/workdir/
    RUN keytool -importcert -file $CERT -alias $CERT -cacerts -storepass changeit -noprompt
    
    ...
    

    Also, as you can see from Dockerfiles' instructions above both of them require your certificate.crt file to be in the same folder.

    Hope it helps!

    0 讨论(0)
提交回复
热议问题