Closed maddhatter closed 6 years ago
Hey @maddhatter I can totally see how that can benefit images in your org and seems generic enough. However, I really intend this repo to serve as an example for others and I want to keep them as simple as possible. In cases like yours, its probably best to customize the templates in your own repo.
Hope that makes sense!
My employer terminates SSL traffic on a security appliance to inspect it, then re-signs the traffic using an internal PKI certificate that all domain-joined PCs have in their Root CA cert store. However, the VM spun up by Packer throws SSL errors while trying to install Chef (or anything else that uses https:) since it doesn't trust our internal PKI:
To work around this issue on the Windows 2016 virtual box template, I made the following changes:
(You can view the file here, here's a summary)
ca-certs
This installs any certificate dropped into the
ca-certs
folder into the VM's "Trusted Root Certification Authorities" store. For me, dropping our root PKI cert into the folder lets the VM trust the intercepted/resigned SSL connections our network generates, and allowed the build to complete.I was wondering if this is something worth adding to the repo? I wanted to get a :thumbsup: before taking the time to copy/pasta the workaround to each template and open a PR.