-
Notifications
You must be signed in to change notification settings - Fork 2.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add documentation for custom CA certificates for Temurin #2338
Conversation
Oof, I don't love the feature, but I don't think I dislike it strongly enough to block it at the official images level. 😬 (It feels like scope creep IMO, since it's something users would generally want from "any" container, but it's not super reasonable for every container to implement this type of entrypoint behavior, and it certainly isn't likely to be implemented in |
FWIW, it's a feature that has been available in the old |
Not like this, no - the only part that was in |
(ie, there was never an |
Yeah, I've hoped we could avoid introducing the entrypoint script, but with (on a more self-centered note, the entrypoint solves a quite large pain point for us -- with |
Just noting that the implementation has been merged, so this documentation issue can continue. |
@tianon please can we get this merged |
Close/open in attempt to get tests to run. |
I had to copy the test output to see it, but there is an extra whitespace at the end of line that diff ./eclipse-temurin/content.md markdownfmt/./eclipse-temurin/content.md
--- /tmp/markdownfmt1406235651
+++ /tmp/markdownfmt2757242851
@@ -14,13 +14,13 @@
# Can I add my internal CA certificates to the truststore?
-Yes! Add your certificates to `/certificates` inside the container (e.g. by using a volume) and set the environment variable `USE_SYSTEM_CA_CERTS` on the container to any value. With Docker CLI this might look like this:
+Yes! Add your certificates to `/certificates` inside the container (e.g. by using a volume) and set the environment variable `USE_SYSTEM_CA_CERTS` on the container to any value. With Docker CLI this might look like this:
```console
$ docker run -v $(pwd)/certs:/certificates/ -e USE_SYSTEM_CA_CERTS=1 %%IMAGE%%:11
```
-The certificates would get added to the system CA store, which would in turn be converted to Java's truststore. The format of the certificates depends on what the OS of the base image used expects, but PEM format with a `.crt` file extension is a good bet. **Please note**: this feature is currently not available for Windows-based images.
+The certificates would get added to the system CA store, which would in turn be converted to Java's truststore. The format of the certificates depends on what the OS of the base image used expects, but PEM format with a `.crt` file extension is a good bet. **Please note**: this feature is currently not available for Windows-based images. |
Let me take a look at it tomorrow and rebase it while we are it. |
3ada4df
to
8d00355
Compare
Will be available after adoptium/containers#392 is merged.
I've rebased on current |
The upstream entrypoint is `sh` and so loses dotted environment variables, lets prevent that from happening by just skipping it as the `tomcat` images isn't reliant on its functionality (docker-library/docs#2338). Fixes docker-library#302 which is a recurrence of docker-library#77
The upstream entrypoint is `sh` and so loses dotted environment variables, lets prevent that from happening by just skipping it as the `tomcat` images isn't reliant on its functionality (docker-library/docs#2338). Fixes docker-library#302 which is a recurrence of docker-library#77
The upstream entrypoint is `sh` and so loses dotted environment variables, lets prevent that from happening by just skipping it as the `tomcat` images are not reliant on its functionality. See docker-library/docs#2338 and adoptium/containers#392 for info about what it provides. Fixes docker-library#302 which is a recurrence of docker-library#77
Will be available after adoptium/containers#392 is merged.