Closed egourlao closed 6 years ago
Good approach, follow ttn
convention
you can self-trust the discovery certificate by copying discovery/server.cert
to /usr/share/ca-certificates
(make sure it ends with .crt
) on the gateway, and then doing the following:
/etc/ca-certificates.conf
and add the filename of your cert to the end of the listupdate-ca-certificates
sudo dpkg-reconfigure ca-certificates
- scroll to the end of the list and select your certificateThe discovery server certificate should now be trusted by the OS, and the X.509 warning should disappear.
When the packet forwarder connects to the discovery server, the discovery server declares his identity using a certificate, that can be self-generated in the case of a private network. But if it's self-generated, the packet forwarder cannot verify it, and the connection fails:
There are two options to fix this problem:
For that, we can draw inspiration from the
ttn
repo, that uses a flag to indicate a directory where to find the trusted certificates, to use in gRPC.