Using the docker version of your program.
An error occurred that needs to be reviewed. Here are logs that are immediately available.
unable to verify the first certificate
Error: unable to verify the first certificate at TLSSocket. (_tls_wrap.js:1098:38) at emitNone (events.js:105:13) at TLSSocket.emit (events.js:207:7) at TLSSocket._finishInit (_tls_wrap.js:628:8) at TLSWrap.ssl.onhandshakedone (_tls_wrap.js:458:38)
Since then, IP address does not seems to be updated anymore.
Here are the logs :
[2019-08-20T18:48:38.045] [INFO] default - HTTPS GET https://diagnostic.opendns.com/myip
[2019-08-20T18:48:38.156] [ERROR] default - { Error: unable to verify the first certificate
at TLSSocket.<anonymous> (_tls_wrap.js:1098:38)
at emitNone (events.js:105:13)
at TLSSocket.emit (events.js:207:7)
at TLSSocket._finishInit (_tls_wrap.js:628:8)
at TLSWrap.ssl.onhandshakedone (_tls_wrap.js:458:38) code: 'UNABLE_TO_VERIFY_LEAF_SIGNATURE' }
[2019-08-20T18:48:38.157] [INFO] default - Email notification already sent. Suppressing email notification to avoid spamming admin.
$ curl -v https://diagnostic.opendns.com/myip
* Trying 172.217.18.179...
* TCP_NODELAY set
* Connected to diagnostic.opendns.com (172.217.18.179) port 443 (#0)
* ALPN, offering http/1.1
* successfully set certificate verify locations:
* CAfile: /etc/ssl/certs/ca-certificates.crt
CApath: none
* TLSv1.2 (OUT), TLS handshake, Client hello (1):
* TLSv1.2 (IN), TLS handshake, Server hello (2):
* TLSv1.2 (IN), TLS handshake, Certificate (11):
* TLSv1.2 (OUT), TLS alert, unknown CA (560):
* SSL certificate problem: unable to get local issuer certificate
* Closing connection 0
curl: (60) SSL certificate problem: unable to get local issuer certificate
More details here: https://curl.haxx.se/docs/sslcerts.html
curl failed to verify the legitimacy of the server and therefore could not
establish a secure connection to it. To learn more about this situation and
how to fix it, please visit the web page mentioned above.
No clue why this error is popping just now, but it seems that the intermediate CA certificate (DigiCert SHA2 Secure Server CA) is neither present in the ca-certificates Alpine package, nor in the CA certificate chain sent back from diagnostics.opendns.com/myip. Confirmed by https://www.ssllabs.com/ssltest/analyze.html?d=diagnostic.opendns.com&s=172.217.6.83
Does not seem to be directly related to your code. Consider using an other ip check endpoint ? or add the intermediate CA to the container ?