-
Notifications
You must be signed in to change notification settings - Fork 53
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Chiseled ca-certificates
is incompatible with OpenSSL
#257
Comments
Thank you for reporting this @weiiwang01 . We are aware of this and are tracking it internally. The bottom line is that those certificates are put in the right place by the deb's maintainer scripts, for which we do not yet have the corresponding mutation script in the slice definition. We'll keep this issue open until those mutation scripts are added to the SDF. |
Hi @cjdcordeiro, thank you for following up on this issue. Is it possible to just link the |
@weiiwang01 we have some PRs up, from @zhijie-yang , addressing this. you might want to give them a try and if they fix your problem, feel free to leave a 👍 |
I have tested with the latest |
The chiseled version of
ca-certificates
,ca-certificates_data
, retains only the single file, the CA certificate bundle at/etc/ssl/certs/ca-certificates.crt
. However, this file is not default loaded by OpenSSL and applications that use OpenSSL, such as Python.OpenSSL typically reads CA certificates from two default system locations:
/usr/lib/ssl/cert.pem
. This location can be overridden by setting theSSL_CERT_FILE
environment variable./usr/lib/ssl/certs/
, which contains CA certificates named using the format<hash>.<idx>
(e.g.,9d66eef0.0
,9d66eef0.1
).The file
/usr/lib/ssl/certs/ca-certificates.crt
kept by the chiseledca-certificates_data
does not correspond to these locations. As a result, applications using OpenSSL, including Python’s standard libraries, encounter SSL verification failures.There are two potential solutions to this issue. One option is to create a symbolic link from
/usr/lib/ssl/cert.pem
pointed to/etc/ssl/certs/ca-certificates.crt
. Alternatively, the entire content of the/usr/lib/ssl/certs/
directory could be kept, rather than just theca-certificates.crt
file.Below is an example rockcraft file to demonstrate the issue:
The following command can be used to observe the certificate verification failure:
The text was updated successfully, but these errors were encountered: