ktock / container2wasm

Container to WASM converter

Home Page:https://ktock.github.io/container2wasm-demo/

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Proxy cert issue

Pigrenok opened this issue · comments

I am sorry for so many issues at the same time.

I set up network mode through Fetch (net=browser). But when I try to do curl for a site that I assume allows CORS, I get the following error:

learner@:~$ curl https://raw.githubusercontent.com/Blahah/command_line_bootcamp/master/testfiles/grades.txt
curl: (77) error setting certificate file: /.wasmenv/proxy.crt

I can see that the directory /.wasmenv exist, but I cannot check what is inside as it has effectively zero permission:

0 d---------  1 root    root       0 Jan  1  1970 .wasmenv

Is it me or there is something horribly wrong happened during WASM image creation/conversion?

Thank you very much in advance.

Just to add to this... I get running version on github pages (pigrenok.github.io/command-line-bootcamp) and whereas locally with local server it works (with requests to the same server at least), on github pages I get the same issue with certificate key:

learner@:~$ curl https://pigrenok.github.io/command-line-bootcamp/data/grades.txt
curl: (77) error setting certificate file: /.wasmenv/proxy.crt

Here is what I get in JS Console:

time="2024-01-30T12:21:32Z" level=info msg="PACKET: 74 bytes\n- Layer 1 (14 bytes) = Ethernet\t{Contents=[..14..] Payload=[..60..] SrcMAC=02:50:24:95:ee:68 DstMAC=5a:94:ef:e4:0c:dd EthernetType=IPv4 Length=0}\n- Layer 2 (20 bytes) = IPv4\t{Contents=[..20..] Payload=[..40..] Version=4 IHL=5 TOS=0 Length=60 Id=64008 Flags=DF FragOffset=0 TTL=64 Protocol=TCP Checksum=49250 SrcIP=192.168.127.2 DstIP=192.168.127.253 Options=[] Padding=[]}\n- Layer 3 (40 bytes) = TCP\t{Contents=[..40..] Payload=[] SrcPort=54656 DstPort=80(http) Seq=1865503971 Ack=0 DataOffset=10 FIN=false SYN=true RST=false PSH=false ACK=false URG=false ECE=false CWR=false NS=false Window=64240 Checksum=28245 Urgent=0 Options=[..5..] Padding=[]}\n"

stack-worker.js?net=browser:80 time="2024-01-30T12:21:32Z" level=info msg="PACKET: 74 bytes\n- Layer 1 (14 bytes) = Ethernet\t{Contents=[..14..] Payload=[..60..] SrcMAC=02:50:24:95:ee:68 DstMAC=5a:94:ef:e4:0c:dd EthernetType=IPv4 Length=0}\n- Layer 2 (20 bytes) = IPv4\t{Contents=[..20..] Payload=[..40..] Version=4 IHL=5 TOS=0 Length=60 Id=64009 Flags=DF FragOffset=0 TTL=64 Protocol=TCP Checksum=49249 SrcIP=192.168.127.2 DstIP=192.168.127.253 Options=[] Padding=[]}\n- Layer 3 (40 bytes) = TCP\t{Contents=[..40..] Payload=[] SrcPort=54656 DstPort=80(http) Seq=1865503971 Ack=0 DataOffset=10 FIN=false SYN=true RST=false PSH=false ACK=false URG=false ECE=false CWR=false NS=false Window=64240 Checksum=27184 Urgent=0 Options=[..5..] Padding=[]}\n"

stack-worker.js?net=browser:80 time="2024-01-30T12:21:32Z" level=info msg="PACKET: 74 bytes\n- Layer 1 (14 bytes) = Ethernet\t{Contents=[..14..] Payload=[..60..] SrcMAC=5a:94:ef:e4:0c:dd DstMAC=02:50:24:95:ee:68 EthernetType=IPv4 Length=0}\n- Layer 2 (20 bytes) = IPv4\t{Contents=[..20..] Payload=[..40..] Version=4 IHL=5 TOS=0 Length=60 Id=21116 Flags= FragOffset=0 TTL=64 Protocol=TCP Checksum=42991 SrcIP=192.168.127.253 DstIP=192.168.127.2 Options=[] Padding=[]}\n- Layer 3 (40 bytes) = TCP\t{Contents=[..40..] Payload=[] SrcPort=80(http) DstPort=54656 Seq=3904949587 Ack=1865503972 DataOffset=10 FIN=false SYN=true RST=false PSH=false ACK=true URG=false ECE=false CWR=false NS=false Window=29184 Checksum=3599 Urgent=0 Options=[..6..] Padding=[]}\n"

stack-worker.js?net=browser:80 time="2024-01-30T12:21:33Z" level=info msg="PACKET: 66 bytes\n- Layer 1 (14 bytes) = Ethernet\t{Contents=[..14..] Payload=[..52..] SrcMAC=02:50:24:95:ee:68 DstMAC=5a:94:ef:e4:0c:dd EthernetType=IPv4 Length=0}\n- Layer 2 (20 bytes) = IPv4\t{Contents=[..20..] Payload=[..32..] Version=4 IHL=5 TOS=0 Length=52 Id=64010 Flags=DF FragOffset=0 TTL=64 Protocol=TCP Checksum=49256 SrcIP=192.168.127.2 DstIP=192.168.127.253 Options=[] Padding=[]}\n- Layer 3 (32 bytes) = TCP\t{Contents=[..32..] Payload=[] SrcPort=54656 DstPort=80(http) Seq=1865503972 Ack=3904949588 DataOffset=8 FIN=false SYN=false RST=false PSH=false ACK=true URG=false ECE=false CWR=false NS=false Window=4015 Checksum=38329 Urgent=0 Options=[TCPOption(NOP:), TCPOption(NOP:), TCPOption(Timestamps:3249211725/4042999059 0xc1ab094df0fb4513)] Padding=[]}\n"

stack-worker.js?net=browser:80 time="2024-01-30T12:21:33Z" level=info msg="PACKET: 194 bytes\n- Layer 1 (14 bytes) = Ethernet\t{Contents=[..14..] Payload=[..180..] SrcMAC=02:50:24:95:ee:68 DstMAC=5a:94:ef:e4:0c:dd EthernetType=IPv4 Length=0}\n- Layer 2 (20 bytes) = IPv4\t{Contents=[..20..] Payload=[..160..] Version=4 IHL=5 TOS=0 Length=180 Id=64011 Flags=DF FragOffset=0 TTL=64 Protocol=TCP Checksum=49127 SrcIP=192.168.127.2 DstIP=192.168.127.253 Options=[] Padding=[]}\n- Layer 3 (32 bytes) = TCP\t{Contents=[..32..] Payload=[..128..] SrcPort=54656 DstPort=80(http) Seq=1865503972 Ack=3904949588 DataOffset=8 FIN=false SYN=false RST=false PSH=true ACK=true URG=false ECE=false CWR=false NS=false Window=4015 Checksum=16720 Urgent=0 Options=[TCPOption(NOP:), TCPOption(NOP:), TCPOption(Timestamps:3249211726/4042999059 0xc1ab094ef0fb4513)] Padding=[]}\n- Layer 4 (128 bytes) = Payload\t128 byte(s)\n"

stack-worker.js?net=browser:80 time="2024-01-30T12:21:33Z" level=info msg="PACKET: 74 bytes\n- Layer 1 (14 bytes) = Ethernet\t{Contents=[..14..] Payload=[..60..] SrcMAC=5a:94:ef:e4:0c:dd DstMAC=02:50:24:95:ee:68 EthernetType=IPv4 Length=0}\n- Layer 2 (20 bytes) = IPv4\t{Contents=[..20..] Payload=[..40..] Version=4 IHL=5 TOS=0 Length=60 Id=21117 Flags= FragOffset=0 TTL=64 Protocol=TCP Checksum=42990 SrcIP=192.168.127.253 DstIP=192.168.127.2 Options=[] Padding=[]}\n- Layer 3 (40 bytes) = TCP\t{Contents=[..40..] Payload=[] SrcPort=80(http) DstPort=54656 Seq=3904949587 Ack=1865503972 DataOffset=10 FIN=false SYN=true RST=false PSH=false ACK=true URG=false ECE=false CWR=false NS=false Window=29184 Checksum=3599 Urgent=0 Options=[..6..] Padding=[]}\n"

stack-worker.js?net=browser:80 time="2024-01-30T12:21:33Z" level=info msg="PACKET: 66 bytes\n- Layer 1 (14 bytes) = Ethernet\t{Contents=[..14..] Payload=[..52..] SrcMAC=5a:94:ef:e4:0c:dd DstMAC=02:50:24:95:ee:68 EthernetType=IPv4 Length=0}\n- Layer 2 (20 bytes) = IPv4\t{Contents=[..20..] Payload=[..32..] Version=4 IHL=5 TOS=0 Length=52 Id=21118 Flags= FragOffset=0 TTL=64 Protocol=TCP Checksum=42997 SrcIP=192.168.127.253 DstIP=192.168.127.2 Options=[] Padding=[]}\n- Layer 3 (32 bytes) = TCP\t{Contents=[..32..] Payload=[] SrcPort=80(http) DstPort=54656 Seq=3904949588 Ack=1865504100 DataOffset=8 FIN=false SYN=false RST=false PSH=false ACK=true URG=false ECE=false CWR=false NS=false Window=227 Checksum=40973 Urgent=0 Options=[TCPOption(NOP:), TCPOption(NOP:), TCPOption(Timestamps:4043000074/3249211726 0xf0fb490ac1ab094e)] Padding=[]}\n"

stack-worker.js?net=browser:80 time="2024-01-30T12:21:33Z" level=info msg="PACKET: 150 bytes\n- Layer 1 (14 bytes) = Ethernet\t{Contents=[..14..] Payload=[..136..] SrcMAC=5a:94:ef:e4:0c:dd DstMAC=02:50:24:95:ee:68 EthernetType=IPv4 Length=0}\n- Layer 2 (20 bytes) = IPv4\t{Contents=[..20..] Payload=[..116..] Version=4 IHL=5 TOS=0 Length=136 Id=21119 Flags= FragOffset=0 TTL=64 Protocol=TCP Checksum=42912 SrcIP=192.168.127.253 DstIP=192.168.127.2 Options=[] Padding=[]}\n- Layer 3 (32 bytes) = TCP\t{Contents=[..32..] Payload=[..84..] SrcPort=80(http) DstPort=54656 Seq=3904949588 Ack=1865504100 DataOffset=8 FIN=false SYN=false RST=false PSH=true ACK=true URG=false ECE=false CWR=false NS=false Window=4096 Checksum=58055 Urgent=0 Options=[TCPOption(NOP:), TCPOption(NOP:), TCPOption(Timestamps:4043000116/3249211726 0xf0fb4934c1ab094e)] Padding=[]}\n- Layer 4 (84 bytes) = Payload\t84 byte(s)\n"

stack-worker.js?net=browser:80 2024/01/30 12:21:33 serving server for pigrenok.github.io:443...

stack-worker.js?net=browser:80 time="2024-01-30T12:21:33Z" level=info msg="PACKET: 66 bytes\n- Layer 1 (14 bytes) = Ethernet\t{Contents=[..14..] Payload=[..52..] SrcMAC=02:50:24:95:ee:68 DstMAC=5a:94:ef:e4:0c:dd EthernetType=IPv4 Length=0}\n- Layer 2 (20 bytes) = IPv4\t{Contents=[..20..] Payload=[..32..] Version=4 IHL=5 TOS=0 Length=52 Id=64012 Flags=DF FragOffset=0 TTL=64 Protocol=TCP Checksum=49254 SrcIP=192.168.127.2 DstIP=192.168.127.253 Options=[] Padding=[]}\n- Layer 3 (32 bytes) = TCP\t{Contents=[..32..] Payload=[] SrcPort=54656 DstPort=80(http) Seq=1865504100 Ack=3904949588 DataOffset=8 FIN=false SYN=false RST=false PSH=false ACK=true URG=false ECE=false CWR=false NS=false Window=4015 Checksum=36366 Urgent=0 Options=[TCPOption(NOP:), TCPOption(NOP:), TCPOption(Timestamps:3249213560/4042999059 0xc1ab1078f0fb4513)] Padding=[]}\n"

stack-worker.js?net=browser:80 time="2024-01-30T12:21:34Z" level=info msg="PACKET: 66 bytes\n- Layer 1 (14 bytes) = Ethernet\t{Contents=[..14..] Payload=[..52..] SrcMAC=02:50:24:95:ee:68 DstMAC=5a:94:ef:e4:0c:dd EthernetType=IPv4 Length=0}\n- Layer 2 (20 bytes) = IPv4\t{Contents=[..20..] Payload=[..32..] Version=4 IHL=5 TOS=0 Length=52 Id=64013 Flags=DF FragOffset=0 TTL=64 Protocol=TCP Checksum=49253 SrcIP=192.168.127.2 DstIP=192.168.127.253 Options=[] Padding=[]}\n- Layer 3 (32 bytes) = TCP\t{Contents=[..32..] Payload=[] SrcPort=54656 DstPort=80(http) Seq=1865504100 Ack=3904949672 DataOffset=8 FIN=false SYN=false RST=false PSH=false ACK=true URG=false ECE=false CWR=false NS=false Window=4010 Checksum=35135 Urgent=0 Options=[TCPOption(NOP:), TCPOption(NOP:), TCPOption(Timestamps:3249213655/4043000116 0xc1ab10d7f0fb4934)] Padding=[]}\n"

stack-worker.js?net=browser:80 time="2024-01-30T12:21:34Z" level=info msg="PACKET: 66 bytes\n- Layer 1 (14 bytes) = Ethernet\t{Contents=[..14..] Payload=[..52..] SrcMAC=02:50:24:95:ee:68 DstMAC=5a:94:ef:e4:0c:dd EthernetType=IPv4 Length=0}\n- Layer 2 (20 bytes) = IPv4\t{Contents=[..20..] Payload=[..32..] Version=4 IHL=5 TOS=0 Length=52 Id=64014 Flags=DF FragOffset=0 TTL=64 Protocol=TCP Checksum=49252 SrcIP=192.168.127.2 DstIP=192.168.127.253 Options=[] Padding=[]}\n- Layer 3 (32 bytes) = TCP\t{Contents=[..32..] Payload=[] SrcPort=54656 DstPort=80(http) Seq=1865504100 Ack=3904949672 DataOffset=8 FIN=true SYN=false RST=false PSH=false ACK=true URG=false ECE=false CWR=false NS=false Window=4010 Checksum=34904 Urgent=0 Options=[TCPOption(NOP:), TCPOption(NOP:), TCPOption(Timestamps:3249213885/4043000116 0xc1ab11bdf0fb4934)] Padding=[]}\n"

stack-worker.js?net=browser:80 time="2024-01-30T12:21:34Z" level=info msg="PACKET: 66 bytes\n- Layer 1 (14 bytes) = Ethernet\t{Contents=[..14..] Payload=[..52..] SrcMAC=5a:94:ef:e4:0c:dd DstMAC=02:50:24:95:ee:68 EthernetType=IPv4 Length=0}\n- Layer 2 (20 bytes) = IPv4\t{Contents=[..20..] Payload=[..32..] Version=4 IHL=5 TOS=0 Length=52 Id=21120 Flags= FragOffset=0 TTL=64 Protocol=TCP Checksum=42995 SrcIP=192.168.127.253 DstIP=192.168.127.2 Options=[] Padding=[]}\n- Layer 3 (32 bytes) = TCP\t{Contents=[..32..] Payload=[] SrcPort=80(http) DstPort=54656 Seq=3904949672 Ack=1865504101 DataOffset=8 FIN=false SYN=false RST=false PSH=false ACK=true URG=false ECE=false CWR=false NS=false Window=4095 Checksum=34103 Urgent=0 Options=[TCPOption(NOP:), TCPOption(NOP:), TCPOption(Timestamps:4043001062/3249213655 0xf0fb4ce6c1ab10d7)] Padding=[]}\n"

stack-worker.js?net=browser:80 2024/01/30 12:21:34 http: TLS handshake error from 192.168.127.2:54656: EOF

stack-worker.js?net=browser:80 time="2024-01-30T12:21:34Z" level=info msg="PACKET: 66 bytes\n- Layer 1 (14 bytes) = Ethernet\t{Contents=[..14..] Payload=[..52..] SrcMAC=5a:94:ef:e4:0c:dd DstMAC=02:50:24:95:ee:68 EthernetType=IPv4 Length=0}\n- Layer 2 (20 bytes) = IPv4\t{Contents=[..20..] Payload=[..32..] Version=4 IHL=5 TOS=0 Length=52 Id=21121 Flags= FragOffset=0 TTL=64 Protocol=TCP Checksum=42994 SrcIP=192.168.127.253 DstIP=192.168.127.2 Options=[] Padding=[]}\n- Layer 3 (32 bytes) = TCP\t{Contents=[..32..] Payload=[] SrcPort=80(http) DstPort=54656 Seq=3904949672 Ack=1865504101 DataOffset=8 FIN=true SYN=false RST=false PSH=false ACK=true URG=false ECE=false CWR=false NS=false Window=4096 Checksum=33869 Urgent=0 Options=[TCPOption(NOP:), TCPOption(NOP:), TCPOption(Timestamps:4043001064/3249213885 0xf0fb4ce8c1ab11bd)] Padding=[]}\n"

stack-worker.js?net=browser:80 time="2024-01-30T12:21:36Z" level=info msg="PACKET: 66 bytes\n- Layer 1 (14 bytes) = Ethernet\t{Contents=[..14..] Payload=[..52..] SrcMAC=02:50:24:95:ee:68 DstMAC=5a:94:ef:e4:0c:dd EthernetType=IPv4 Length=0}\n- Layer 2 (20 bytes) = IPv4\t{Contents=[..20..] Payload=[..32..] Version=4 IHL=5 TOS=0 Length=52 Id=0 Flags=DF FragOffset=0 TTL=64 Protocol=TCP Checksum=47731 SrcIP=192.168.127.2 DstIP=192.168.127.253 Options=[] Padding=[]}\n- Layer 3 (32 bytes) = TCP\t{Contents=[..32..] Payload=[] SrcPort=54656 DstPort=80(http) Seq=1865504101 Ack=3904949673 DataOffset=8 FIN=false SYN=false RST=false PSH=false ACK=true URG=false ECE=false CWR=false NS=false Window=4010 Checksum=33940 Urgent=0 Options=[TCPOption(NOP:), TCPOption(NOP:), TCPOption(Timestamps:3249213900/4043001064 0xc1ab11ccf0fb4ce8)] Padding=[]}\n"

I think the key line in this log is this:

stack-worker.js?net=browser:80 2024/01/30 12:21:34 http: TLS handshake error from 192.168.127.2:54656: EOF

but why this is happening, I am not sure.

Do you have any idea what is wrong?

Thank you very much in advance for any help.