We run Azure DevOps (ADO) server and JFrog enterprise on-premises. The certificates used by these applications are all self-signed by our internal CA.
We are currently adding JFrog to our ADO server and configuring JFrogNuGet for a pipeline. The pipeline fails due to certificate errors:
##[error]Unhandled: self signed certificate in certificate chain
##[error]Error: self signed certificate in certificate chain
A pem and crt certificate chain files have been created and tried in the following locations:
- $(Agent.ToolsDirectory/_jf/security
- $(Agent.ToolsDirectory/_jf/security/certs
- $(Agent.ToolsDirectory/jf/security
- $(Agent.ToolsDirectory/jf/security/certs
- The build agent’s home folder:
- .jfrog/security
- .jfrog/security/certs
The pipeline failed using any of these locations.
The documentation from JFrog isn’t very clear on what to do here. On the extension document page, there is a very clear section titled, “Not Using a Public CA (Certificate Authority)?”. This section doesn’t indicate where things should go.
The section ends with, Read more about this in the JFrog CLI which contains zero data on setting up the CLI for self-signed certificates.
I am hoping there is enough detail here to assist on how to set things up.