How to add SSL certificates to Tomcat in Docker container?
You can try importing the certificate into jvm trusted store inside docker.
I've the certs for the remote hosts.
You can use these certificates but in fact you don't need them, you only need the root certificate of the authority that issued the certificates. You can download it from the internet.
Usually they are given in pem
format, but you'll need der
for jvm.
First you need to convert the certificate:
openssl x509 -in ca.pem -inform pem -out ca.der -outform der
Then install it into jvm keystore:
keytool -importcert -alias startssl -keystore \ $JAVA_HOME/lib/security/cacerts -storepass changeit -file ca.der
This command asks if you really want to add the certificate, you shoudl type "yes".
And all together in a Dockerfile
:
FROM tomcat:8.0.47-jre7COPY ca.pem ca.pemRUN openssl x509 -in ca.pem -inform pem -out ca.der -outform derRUN echo yes | keytool -importcert -alias startssl -keystore \ /docker-java-home/jre/lib/security/cacerts -storepass changeit -file ca.der COPY test.war /usr/local/tomcat/webapps/test.warWORKDIR /usr/local/tomcat/webapps
Note: if you already have certificate in der
format you don't need openssl
call, just copy the certificate directly.
To verify that the certificate is really applied you can run the container, ssh into it
$ docker exec -it <CONTAINER-ID> bash
and check the keystore:
$ keytool -keystore "/docker-java-home/jre/lib/security/cacerts" -storepass changeit -list | grep <NAME-OF-YOUR-CERT-AUTHORITY>
For Java apps in RHEL/Centos images, you can use update-ca-trust
, which will update your trust stores for you, from files you place into /etc/pki/ca-trust
. It also accepts .pem
files directly:
FROM ...USER rootCOPY yourcertificate.pem /etc/pki/ca-trust/source/anchors/yourcertificate.pemRUN update-ca-trust
This will update /etc/pki/java/cacerts
for you automatically, so that Java will trust the new certificate.
Or, if your cert is hosted on a web server, then you can use curl
to download it instead of copying the file - for example:
RUN curl -k https://badssl.com/certs/ca-untrusted-root.crt -o /etc/pki/ca-trust/source/anchors/ca-untrusted-root.crt && \ update-ca-trust