I feel like I have about 90% of this all working, but am failing one final(?) step.
I have a local CA jailed and running, all good. short-lived certs, automatic renewal.
I have poudriere jailed and running, works great.
I have nginx running in the poudriere jail, forcing 80=>443 redirects, serving up both the poudriere web interface and serving out packages.
With the CA's cert loaded into firefox's cert mgmt, the browser works as expected from my laptop.
With the CA's cert copied to `/etc/ssl/certs` and hashed via
returns
without symlinking the hash, that command errors out with
so I think I'm on the right track.
BUT, long story short (too late!), `pkg` is not happy when pointed to the repo.
(note that it /does/ work when I turn off the forced TLS redirect and just use http)
/usr/local/etc/pkg/repos/local.conf looks like:
Is there somewhere else I need to feed the CA cert for pkg?
I have a local CA jailed and running, all good. short-lived certs, automatic renewal.
I have poudriere jailed and running, works great.
I have nginx running in the poudriere jail, forcing 80=>443 redirects, serving up both the poudriere web interface and serving out packages.
With the CA's cert loaded into firefox's cert mgmt, the browser works as expected from my laptop.
With the CA's cert copied to `/etc/ssl/certs` and hashed via
ln -s $CACERT "$(openssl x509 -noout -hash -in $CACERT)".0
, openssl says I'm good: openssl s_client -connect <pkg.host>:443 | grep -i -e verif
returns
Code:
<snip>
Verification: OK
Verify return code: 0 (ok)
Code:
Verification error: unable to get local issuer certificate
BUT, long story short (too late!), `pkg` is not happy when pointed to the repo.
(note that it /does/ work when I turn off the forced TLS redirect and just use http)
/usr/local/etc/pkg/repos/local.conf looks like:
Code:
local: {
url: "https://<local pkg host>/packages/${ABI}-latest-laptop",
enabled: yes
}