OpenSSL Server Verification Fails on .NET Jammy Chiseled containers #5371
-
Hello! We've been pushing for adoption of the chiseled containers, but have run into some difficulties with the profiler we use. We've tracked the issue down to the underlying HTTP library in use here. In particular, we are hitting one of the three error cases starting here based on the error logged by the profiler when it tries to export data. The exact same set up works in the equivalent jammy Dockerfile ( We've tried to copy all of the libraries from a builder stage using the
This leads us to think this is not a library issue (which had been our hunch). We've also tried to (with no success) change ownership of certain .so files thinking that might be the issue. Are there any other significant changes between the jammy image and the chiseled jammy image that could lead to this mismatch in behaviour? Thanks in advance! |
Beta Was this translation helpful? Give feedback.
Replies: 2 comments 13 replies
-
Can you try running the regular jammy image as non-root? That would help rule out some of the permissions issues. Do you need a different OpenSSL than the one we include? |
Beta Was this translation helpful? Give feedback.
-
Thanks for the help @richlander, this was exceptional support and we really appreciate it! |
Beta Was this translation helpful? Give feedback.
We were able to resolve this by copying over raw
/usr/share/ca-certificates/
from the builder. We used to run update-ca-certificates in the builder (jammy) and then copy over everything in '/etc/ssl/certs' which includes theca-certificate.crt
file. For some reason in this case, the underlying SSL implementation of the httplib also wanted the raw .pem files of the root CAs (we still dont know why)tldr;
In the jammy builder:
RUN update-ca-certificates
In the runtime chiseled image:
COPY --from=builder /usr/share/ca-certificates/ /usr/share/ca-certificates/
COPY --from=builder /usr/local/share/ca-certificates/ /usr/local/share/ca-certificates/
COPY --from=builder /etc/ssl/certs /etc/ssl/certs