[xenial] Image does not support TLS access to repos

Bug #1802515 reported by Scott Hussey
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
cloud-images
Won't Fix
Undecided
Unassigned

Bug Description

The docker image docker.io/ubuntu:16.04 does not come with the apt-transport-https package baked in meaning I have no avenue to add additional packages when using it as a base image in an environment with internal repos that only support TLS. I think the addition of apt-transport-https would be worthwhile even in the minimal image used for the official Docker images.

Tags: docker
Revision history for this message
Dan Watkins (oddbloke) wrote :

Hi Scott,

Thanks for using Ubuntu and for filing this bug! For a number of reasons, apt archives are, in general, secured via GPG signatures rather than via HTTPS (and, in fact, the Ubuntu archives don't support HTTPS at all), which is why apt-transport-https isn't shipped by default.

I just want to double-check I understand the issue you're running in to. When you say "internal repos", do you mean repositories containing your private software? Or is it also the case that the only Ubuntu mirrors available to you are also HTTPS-only?

Thanks,

Dan

Revision history for this message
Scott Hussey (sh8121) wrote :

It is the latter. In our enterprise, we access internal upstream repo snapshots only but they are hosted in a product that currently only supports HTTPS. After making the bug, I learned the dependency chain for apt-transport-https is pretty long, so understood if it is too heavyweight to put in the Core image.

Revision history for this message
Dan Watkins (oddbloke) wrote :

Yes, regrettably, it would substantially increase the size of the image for a use-case that most people won't require, so I think I will mark this as Won't Fix. Thank you for understanding!

(Note, also, that bionic and later have HTTPS support built in to apt, so you shouldn't see this issue once you move forward to 18.04 or later. :)

Changed in cloud-images:
status: New → Won't Fix
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.