Perform the following steps to enable TLS in JFrog Pipelines:
Copy the
ca.crtfile from your Artifactory server, available at$JFROG_HOME/artifactory/var/etc/access/keys.Run the following command to recursively create relevant directories for Pipelines:
mkdir -p /opt/jfrog/pipelines/var/etc/security/keys/trusted.Paste the
root.crtfile to$JFROG_HOME/opt/jfrog/pipelines/var/etc/security/keys/trusted.Paste the
ca.crtfile to the pipelines trusted folder,$JFROG_HOME/pipelines/var/etc/security/keys/trusted,copied from$JFROG_HOME/artifactory/var/etc/access/keys.Install Pipelines and ensure that
httpsis used for all the URLs:sudo pipelines install \ --base-url-ui https://<jfrog-url> \ --base-url https://<jfrog-url> \ --artifactory-joinkey <join-key> \ --installer-ip <new-instance-ip> \ --api-url https://<external-ip>:8082/pipelines/api \ --www-url https://<external-ip>:30001 \ --rabbitmq-url amqp://<external-ip>:30200Note
For information about installing Pipelines, see Installing Pipelines.
Note
Repeat the above steps on all the nodes where Pipelines is installed.
After all additional nodes have been installed with an identical version of Pipelines, the load balancer must be configured to distribute requests made through a common base URI.
The load balancer can also be set up with custom certificates. In this case, those certificates in the crt format should be loaded to $JFROG_HOME/pipelines/var/etc/security/keys/trusted.
In addition, www-url must be behind the load balancer to ensure that the web-sockets work.