Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

TLS handshake errors running docker on the Azure #336

Closed
Kieran260 opened this issue Dec 6, 2024 · 2 comments
Closed

TLS handshake errors running docker on the Azure #336

Kieran260 opened this issue Dec 6, 2024 · 2 comments

Comments

@Kieran260
Copy link

Kieran260 commented Dec 6, 2024

Hi, if this isn't the right place for this question please direct me towards somebody who may be able to help!

We're using Azure container apps to host the container as a proxy, pulling it directly from docker hub and have all of the environment variables configured. The three keys are inside of the container and the container is running. We are running the exact same configuration locally and we're able to communicate via HTTPS, even from another machine on the LAN.

Problem: For the cloud hosted container when trying to access the proxy via https we're getting this error: Client sent an HTTP request to an HTTPS server. We've got the ingress set up to accept HTTPs only to port 443.
image

Is there something we're doing wrong here?
Thanks!

@Kieran260 Kieran260 changed the title TLS handshake errors running docker on the cloud TLS handshake errors running docker on the Azure Dec 7, 2024
@Kieran260 Kieran260 closed this as not planned Won't fix, can't repro, duplicate, stale Dec 7, 2024
@Daeell
Copy link

Daeell commented Dec 12, 2024

Hi, I experienced a similar issue, did you solve it?

@Kieran260
Copy link
Author

Kieran260 commented Dec 19, 2024

Hi, yes I discovered that the cloud service was terminating the requests at the edge into HTTP regardless of ingress settings so the commands proxy won't accept it.

You could add a reverse proxy e.g. NGINX inside a container to forward a new HTTPs connection internally to the command proxy.

There's possibly other easier ways but this is the most cost efficient for my project.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants