-
Notifications
You must be signed in to change notification settings - Fork 277
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Override for the fingerprints directory [jail bootstrapping] #2265
Comments
I encountered this too. You can work around this for now by copying the fingerprints directory into the jail like this: Also keep in mind that |
Theoretically it should be possible to bootstrap a jail with a command like this:
However, this fails if you are validating signatures/fingerprints of packages:
It's looking for the trusted fingerprints inside the provided root path which are missing, so it gives up. If you copy the
/usr/share/keys/pkg
into the jail it will work. I can manage this as a personal workaround but it will definitely confuse others trying to achieve the same ends.The end goal is to use pkg to generate a jail which will be more lightweight than my current method of extracting
base.txz
into the jail. Anything pkg can do to support generating a valid jail structure including copying in repo configs and public keys/fingerprints would be greatly appreciated.The text was updated successfully, but these errors were encountered: