Overview
This is a nginx
jail that can be deployed via nomad
.
You need to pass in the IP addresses and bucket name for s3 objectstore, and nginx
will serve the files.
For more details about nomad
images, see about potluck.
Since the service is expected to be published via consul
and a web proxy like traefik
, plus frontend haproxy
no HTTPS configuration is specified in nginx
as it is expected that this is happening in the web proxy. HTTPS is merely enabled.
Installation
Prepare Minio
A minio bucket needs to exist with the website content before running this image.
This image will automatically load-balance between multiple minio servers for this specific bucket.
# set minio variables
env MINIO_ACCESS_KEY="ACCESSKEY"
env MINIO_SECRET_KEY="PASSWORD"
# set alias
minio-client alias set minio1 https://x.x.x.x:9000 ACCESSKEY PASSWORD --api S3v4 --insecure --config-dir /root/.minio-client/
# create default bucket
minio-client --insecure mb --config-dir /root/.minio-client/ --with-lock minio1/default
# create website bucket
minio-client --insecure mb --config-dir /root/.minio-client/ minio1/website-bucket
# set anonymous download policy
minio-client --insecure policy set download minio1/website-bucket
# recursively copy website files to bucket
minio-client --insecure cp -r /path/to/website minio1/website-bucket/
Secure front end
This image runs on port 80, and connects to minio with SSL, even if self-signed certificate. It is expected to be run behind a secure proxy.
To enable https on the frontend, make sure to use a solution like haproxy
with acme.sh
for the public domain name, and proxy through to this image.
Options
You can pass in parameters to the image to set variables.
SERVERONE is the first minio server. SERVERTWO is the second. SERVERTHREE is the third. You can set one or all of these with options -a
, -b
, and -c
, for each server.
BUCKET is the name of the bucket to access, and can be set with -x
and the bucket name.
SELFSIGNED enables obtaining the self-signed CA certicate into the local store. Enable with -s
and any value.
Nomad Job File Samples
Two Minio servers
The following example job uses 2 minio servers and a self-signed host.
job "example" {
datacenters = ["datacenter"]
type = "service"
group "group1" {
count = 1
network {
port "http" {
static = 28000
}
}
task "www1" {
driver = "pot"
service {
tags = ["nginx", "www"]
name = "nginx-s3-service"
port = "http"
check {
type = "tcp"
name = "tcp"
interval = "60s"
timeout = "30s"
}
}
config {
image = "https://potluck.honeyguide.net/nginx-s3-nomad"
pot = "nginx-s3-nomad-amd64-13_2"
tag = "0.12.1"
command = "/usr/local/bin/cook"
args = ["-a","10.0.0.2","-b","10.0.0.3","-x","bucketname","-s","yes"]
port_map = {
http = "80"
}
}
resources {
cpu = 200
memory = 64
}
}
}
}
Three Minio Servers
The following example job uses a maximum of 3 minio servers and a self-signed host.
job "example" {
datacenters = ["datacenter"]
type = "service"
group "group1" {
count = 1
network {
port "http" {
static = 28000
}
}
task "www1" {
driver = "pot"
service {
tags = ["nginx", "www"]
name = "nginx-s3-service"
port = "http"
check {
type = "tcp"
name = "tcp"
interval = "60s"
timeout = "30s"
}
}
config {
image = "https://potluck.honeyguide.net/nginx-s3-nomad"
pot = "nginx-s3-nomad-amd64-13_2"
tag = "0.12.1"
command = "/usr/local/bin/cook"
args = ["-a","10.0.0.2","-b","10.0.0.3","-c","10.0.0.4","-x","bucketname","-s","yes"]
port_map = {
http = "80"
}
}
resources {
cpu = 200
memory = 64
}
}
}
}
Getting Started
- Image Readme
- How To Use The Ready-Made Image
- Alternatively: Create a Jail With This Flavour Yourself
- Version History
- Manual Image Download Links
- Jenkins Pot Creation Logs
How To Use The Ready-Made Image
FreeBSD 13.2:
pot import -p nginx-s3-nomad-amd64-13_2 -t 0.12.1 -U https://potluck.honeyguide.net/nginx-s3-nomad
With Signify Verification:
fetch https://potluck.honeyguide.net/potluck.pub; pot import -p nginx-s3-nomad-amd64-13_2 -t 0.12.1 -C potluck.pub -U https://potluck.honeyguide.net/nginx-s3-nomad
If you don’t want to use the default pot
bridged network configuration but instead need an individual network setup (e.g. assign a host IP address), after importing it you can simply clone the jail like that (em0 is the host network adapter in this example):
pot clone -P nginx-s3-nomad-amd64-13_2 -p my-cloned-jail -N alias -i "em0|10.10.10.10"
Note: Some images might require specific network configuration, double check the Overview-chapter at the top.
Alternatively: Create a Jail With This Flavour Yourself
1. Create Flavour Files
Save all files and directories from https://github.com/hny-gd/potluck/tree/master/nginx-s3-nomad to /usr/local/etc/pot/flavours/
2. Create Jail From Flavour
Run
pot create -b <FreeBSD Version> -p <jailname> -t single -N public-bridge -f fbsd-update
with your FreeBSD version (e.g. 13.2) and the name your jail should get.
Note: Some images might require specific network configuration, double check the Overview-chapter at the top.
Version History
0.12
- Version bump for new base image
0.11
- Version bump for new base image
0.10
- Version bump for new base image
0.9
- Version bump for new base image
0.8
- Version bump for new base image
0.7
- Version bump for new base image
0.6
- Version bump for new base image
- Signified
0.5
- Version bump for new base image
0.4
- Version bump for new base image
0.3
- Version bump for new base image
- Fix missing ca_root_nss dependancy
0.2
- Update documentation with bucket creation details
0.1
- First release nginx-s3-nomad flavour
- Set port 9000 on configure-selfsigned.sh
- Add error page details to nginx.conf samples
- Adjust nginx config for error page and proxypass link
- Match nginx config to minio howto settings
- Add trailing slash after bucket name
- Fix nginx rewrite to set index.html for subfolders
0.0
- Initial commit
These images were built on Sat Nov 11 04:56:42 UTC 2023
Manual Image Download Links
nginx-s3-nomad-amd64-13_2_0.12.1.xz (
)
nginx-s3-nomad-amd64-13_2_0.12.1.xz.skein (
)
nginx-s3-nomad-amd64-13_2_0.12.1.xz.skein.sig (
)
nginx-s3-nomad-amd64-13_2_0.12.1.xz.meta (
)
Jenkins Pot Creation Logs
nginx-s3-nomad-amd64-13_2_0.12.1:
nginx-s3-nomad/nginx-s3-nomad:
set-attribute -A persistent -V OFF
set-attribute -A no-rc-script -V ON
copy-in -s /usr/local/etc/pot/flavours/nginx-s3-nomad.d/local -d /root/.pot_local
nginx-s3-nomad/nginx-s3-nomad.sh:
#!/bin/sh
# Based on POTLUCK TEMPLATE v3.0
# Altered by Michael Gmelin
#
# EDIT THE FOLLOWING FOR NEW FLAVOUR:
# 1. RUNS_IN_NOMAD - true or false
# 2. If RUNS_IN_NOMAD is false, can delete the <flavour>+4 file, else
# make sure pot create command doesn't include it
# 3. Create a matching <flavour> file with this <flavour>.sh file that
# contains the copy-in commands for the config files from <flavour>.d/
# Remember that the package directories don't exist yet, so likely copy
# to /root
# 4. Adjust package installation between BEGIN & END PACKAGE SETUP
# 5. Adjust jail configuration script generation between BEGIN & END COOK
# Configure the config files that have been copied in where necessary
# Set this to true if this jail flavour is to be created as a nomad
# (i.e. blocking) jail.
# You can then query it in the cook script generation below and the script
# is installed appropriately at the end of this script
RUNS_IN_NOMAD=true
# set the cook log path/filename
COOKLOG=/var/log/cook.log
# check if cooklog exists, create it if not
if [ ! -e $COOKLOG ]
then
echo "Creating $COOKLOG" | tee -a $COOKLOG
else
echo "WARNING $COOKLOG already exists" | tee -a $COOKLOG
fi
date >> $COOKLOG
# -------------------- COMMON ---------------
STEPCOUNT=0
step() {
STEPCOUNT=$(("$STEPCOUNT" + 1))
STEP="$*"
echo "Step $STEPCOUNT: $STEP" | tee -a $COOKLOG
}
exit_ok() {
trap - EXIT
exit 0
}
FAILED=" failed"
exit_error() {
STEP="$*"
FAILED=""
exit 1
}
set -e
trap 'echo ERROR: $STEP$FAILED | (>&2 tee -a $COOKLOG)' EXIT
# -------------- BEGIN PACKAGE SETUP -------------
step "Bootstrap package repo"
mkdir -p /usr/local/etc/pkg/repos
# shellcheck disable=SC2016
echo 'FreeBSD: { url: "pkg+http://pkg.FreeBSD.org/${ABI}/latest" }' \
>/usr/local/etc/pkg/repos/FreeBSD.conf
# remove above and add back below for quarterlies
# only modify repo if not already done in base image
#test -e /usr/local/etc/pkg/repos/FreeBSD.conf || \
# echo 'FreeBSD: { url: "pkg+http://pkg.FreeBSD.org/${ABI}/quarterly" }' \
# >/usr/local/etc/pkg/repos/FreeBSD.conf
ASSUME_ALWAYS_YES=yes pkg bootstrap
step "Touch /etc/rc.conf"
touch /etc/rc.conf
# this is important, otherwise running /etc/rc from cook will
# overwrite the IP address set in tinirc
step "Remove ifconfig_epair0b from config"
# shellcheck disable=SC2015
sysrc -cq ifconfig_epair0b && sysrc -x ifconfig_epair0b || true
step "Disable sendmail"
service sendmail onedisable || true
step "Create /usr/local/etc/rc.d"
mkdir -p /usr/local/etc/rc.d
step "Install package openssl"
pkg install -y openssl
# necessary if installing curl now
step "Install package ca_root_nss"
pkg install -y ca_root_nss
step "Install package curl"
pkg install -y curl
step "Install package jo"
pkg install -y jo
step "Install package bash"
pkg install -y bash
step "Install package rsync"
pkg install -y rsync
step "Install package nginx"
pkg install -y nginx
step "Install package jq"
pkg install -y jq
step "Install package nano"
pkg install -y nano
step "Install package sudo"
pkg install -y sudo
step "Clean package installation"
pkg clean -y
step "Enable nginx"
service nginx enable
# -------------- END PACKAGE SETUP -------------
#
# Now generate the run command script "cook"
# It configures the system on the first run by creating the config file(s)
# On subsequent runs, it only starts sleeps (if nomad-jail) or simply exits
#
# this runs when image boots
# ----------------- BEGIN COOK ------------------
step "Clean cook artifacts"
rm -rf /usr/local/bin/cook /usr/local/share/cook
step "Install pot local"
tar -C /root/.pot_local -cf - . | tar -C /usr/local -xf -
rm -rf /root/.pot_local
step "Set file ownership on cook scripts"
chown -R root:wheel /usr/local/bin/cook /usr/local/share/cook
chmod 755 /usr/local/share/cook/bin/*
# ----------------- END COOK ------------------
# ---------- NO NEED TO EDIT BELOW ------------
step "Make cook script executable"
if [ -e /usr/local/bin/cook ]
then
echo "setting executable bit on /usr/local/bin/cook" | tee -a $COOKLOG
chmod u+x /usr/local/bin/cook
else
exit_error "there is no /usr/local/bin/cook to make executable"
fi
#
# There are two ways of running a pot jail: "Normal", non-blocking mode and
# "Nomad", i.e. blocking mode (the pot start command does not return until
# the jail is stopped).
# For the normal mode, we create a /usr/local/etc/rc.d script that starts
# the "cook" script generated above each time, for the "Nomad" mode, the cook
# script is started by pot (configuration through flavour file), therefore
# we do not need to do anything here.
#
# Create rc.d script for "normal" mode:
step "Create rc.d script to start cook"
echo "creating rc.d script to start cook" | tee -a $COOKLOG
# shellcheck disable=SC2016
echo '#!/bin/sh
#
# PROVIDE: cook
# REQUIRE: LOGIN
# KEYWORD: shutdown
#
. /etc/rc.subr
name="cook"
rcvar="cook_enable"
load_rc_config $name
: ${cook_enable:="NO"}
: ${cook_env:=""}
command="/usr/local/bin/cook"
command_args=""
run_rc_command "$1"
' > /usr/local/etc/rc.d/cook
step "Make rc.d script to start cook executable"
if [ -e /usr/local/etc/rc.d/cook ]
then
echo "Setting executable bit on cook rc file" | tee -a $COOKLOG
chmod u+x /usr/local/etc/rc.d/cook
else
exit_error "/usr/local/etc/rc.d/cook does not exist"
fi
if [ "$RUNS_IN_NOMAD" != "true" ]
then
step "Enable cook service"
# This is a non-nomad (non-blocking) jail, so we need to make sure the script
# gets started when the jail is started:
# Otherwise, /usr/local/bin/cook will be set as start script by the pot
# flavour
echo "enabling cook" | tee -a $COOKLOG
service cook enable
fi
# -------------------- DONE ---------------
exit_ok
nginx-s3-nomad/nginx-s3-nomad+1:
nginx-s3-nomad/nginx-s3-nomad+1.sh:
nginx-s3-nomad/nginx-s3-nomad+2:
nginx-s3-nomad/nginx-s3-nomad+2.sh:
nginx-s3-nomad/nginx-s3-nomad+3:
nginx-s3-nomad/nginx-s3-nomad+3.sh:
nginx-s3-nomad/nginx-s3-nomad+4:
set-cmd -c "/usr/local/bin/cook"
nginx-s3-nomad/nginx-s3-nomad+4.sh:
=====> Create conf dir (/mnt/srv/pot/jails/nginx-s3-nomad-amd64-13_2/conf)
=====> Cloning freebsd-potluck-amd64-13_2_0_0_20 with snap
=====> clone zroot/srv/pot/jails/freebsd-potluck-amd64-13_2_0_0_20/m@1699635260 into zroot/srv/pot/jails/nginx-s3-nomad-amd64-13_2/m
=====> Flavour: fbsd-update
=====> Starting nginx-s3-nomad-amd64-13_2 pot for the initial bootstrap
=====> mount /mnt/srv/pot/jails/nginx-s3-nomad-amd64-13_2/m/tmp
defaultrouter: 10.192.0.1 -> 10.192.0.1
===> Starting the pot nginx-s3-nomad-amd64-13_2
ELF ldconfig path: /lib /usr/lib /usr/lib/compat /usr/local/lib /usr/local/lib/compat/pkg /usr/local/lib/compat/pkg
32-bit compatibility ldconfig path: /usr/lib32
Starting Network: lo0 epair0b.
lo0: flags=8049<UP,LOOPBACK,RUNNING,MULTICAST> metric 0 mtu 16384
options=680003<RXCSUM,TXCSUM,LINKSTATE,RXCSUM_IPV6,TXCSUM_IPV6>
inet6 ::1 prefixlen 128
inet6 fe80::1%lo0 prefixlen 64 scopeid 0x1
inet 127.0.0.1 netmask 0xff000000
groups: lo
nd6 options=21<PERFORMNUD,AUTO_LINKLOCAL>
epair0b: flags=8863<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> metric 0 mtu 1500
options=8<VLAN_MTU>
ether 02:06:8a:ca:db:0b
inet 10.192.0.3 netmask 0xffc00000 broadcast 10.255.255.255
groups: epair
media: Ethernet 10Gbase-T (10Gbase-T <full-duplex>)
status: active
nd6 options=29<PERFORMNUD,IFDISABLED,AUTO_LINKLOCAL>
add host 127.0.0.1: gateway lo0 fib 0: route already in table
add net default: gateway 10.192.0.1
add host ::1: gateway lo0 fib 0: route already in table
add net fe80::: gateway ::1
add net ff02::: gateway ::1
add net ::ffff:0.0.0.0: gateway ::1
add net ::0.0.0.0: gateway ::1
Clearing /tmp (X related).
Updating motd:.
Updating /var/run/os-release done.
Creating and/or trimming log files.
Starting syslogd.
Starting cron.
Starting sendmail_outbound.
Sat Nov 11 04:55:19 UTC 2023
/usr/local/etc/pot/flavours/fbsd-update.sh -> /mnt/srv/pot/jails/nginx-s3-nomad-amd64-13_2/m/tmp/fbsd-update.sh
=====> Executing fbsd-update script on nginx-s3-nomad-amd64-13_2
src component not installed, skipped
Looking up update.FreeBSD.org mirrors... 3 mirrors found.
Fetching metadata signature for 13.2-RELEASE from update1.freebsd.org... done.
Fetching metadata index... done.
Inspecting system... done.
Preparing to download files... done.
No updates needed to update system to 13.2-RELEASE-p5.
No updates are available to install.
=====> Stop the pot nginx-s3-nomad-amd64-13_2
=====> Remove p4654f09321fb8 epair network interfaces
=====> unmount /mnt/srv/pot/jails/nginx-s3-nomad-amd64-13_2/m/tmp
=====> unmount /mnt/srv/pot/jails/nginx-s3-nomad-amd64-13_2/m/dev
=====> Flavour: nginx-s3-nomad
=====> Executing nginx-s3-nomad pot commands on nginx-s3-nomad-amd64-13_2
=====> mount /mnt/srv/pot/jails/nginx-s3-nomad-amd64-13_2/m/tmp
=====> Source /usr/local/etc/pot/flavours/nginx-s3-nomad.d/local copied in the pot nginx-s3-nomad-amd64-13_2
=====> unmount /mnt/srv/pot/jails/nginx-s3-nomad-amd64-13_2/m/tmp
=====> /mnt/srv/pot/jails/nginx-s3-nomad-amd64-13_2/m/dev is already unmounted
=====> Starting nginx-s3-nomad-amd64-13_2 pot for the initial bootstrap
=====> Setting pot nginx-s3-nomad-amd64-13_2 temporarily to persistent
=====> mount /mnt/srv/pot/jails/nginx-s3-nomad-amd64-13_2/m/tmp
===> Starting the pot nginx-s3-nomad-amd64-13_2
add net default: gateway 10.192.0.1
ELF ldconfig path: /lib /usr/lib /usr/lib/compat /usr/local/lib /usr/local/lib/compat/pkg /usr/local/lib/compat/pkg
32-bit compatibility ldconfig path: /usr/lib32
Starting Network: lo0 epair0b.
lo0: flags=8049<UP,LOOPBACK,RUNNING,MULTICAST> metric 0 mtu 16384
options=680003<RXCSUM,TXCSUM,LINKSTATE,RXCSUM_IPV6,TXCSUM_IPV6>
inet6 ::1 prefixlen 128
inet6 fe80::1%lo0 prefixlen 64 scopeid 0x1
inet 127.0.0.1 netmask 0xff000000
groups: lo
nd6 options=21<PERFORMNUD,AUTO_LINKLOCAL>
epair0b: flags=8863<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> metric 0 mtu 1500
options=8<VLAN_MTU>
ether 02:96:b4:25:83:0b
inet 10.192.0.3 netmask 0xffc00000 broadcast 10.255.255.255
groups: epair
media: Ethernet 10Gbase-T (10Gbase-T <full-duplex>)
status: active
nd6 options=29<PERFORMNUD,IFDISABLED,AUTO_LINKLOCAL>
add host 127.0.0.1: gateway lo0 fib 0: route already in table
add net default: gateway 10.192.0.1
add host ::1: gateway lo0 fib 0: route already in table
add net fe80::: gateway ::1
add net ff02::: gateway ::1
add net ::ffff:0.0.0.0: gateway ::1
add net ::0.0.0.0: gateway ::1
Clearing /tmp (X related).
Updating motd:.
Updating /var/run/os-release done.
Creating and/or trimming log files.
Starting syslogd.
Starting cron.
Starting sendmail_outbound.
Sat Nov 11 04:55:42 UTC 2023
/usr/local/etc/pot/flavours/nginx-s3-nomad.sh -> /mnt/srv/pot/jails/nginx-s3-nomad-amd64-13_2/m/tmp/nginx-s3-nomad.sh
=====> Executing nginx-s3-nomad script on nginx-s3-nomad-amd64-13_2
WARNING /var/log/cook.log already exists
Step 1: Bootstrap package repo
pkg already bootstrapped at /usr/local/sbin/pkg
Step 2: Touch /etc/rc.conf
Step 3: Remove ifconfig_epair0b from config
Step 4: Disable sendmail
sendmail disabled in /etc/rc.conf
sendmail_outbound disabled in /etc/rc.conf
sendmail_msp_queue disabled in /etc/rc.conf
Step 5: Create /usr/local/etc/rc.d
Step 6: Install package openssl
Updating FreeBSD repository catalogue...
pkg: Repository FreeBSD has a wrong packagesite, need to re-create database
[nginx-s3-nomad-amd64-13_2.vsf00001.cpt.za.honeyguide.net] Fetching meta.conf: . done
[nginx-s3-nomad-amd64-13_2.vsf00001.cpt.za.honeyguide.net] Fetching packagesite.pkg: .......... done
Processing entries: .......... done
FreeBSD repository update completed. 34255 packages processed.
All repositories are up to date.
The following 1 package(s) will be affected (of 0 checked):
Installed packages to be UPGRADED:
openssl: 1.1.1w,1 -> 3.0.12,1
Number of packages to be upgraded: 1
The process will require 8 MiB more space.
6 MiB to be downloaded.
[nginx-s3-nomad-amd64-13_2.vsf00001.cpt.za.honeyguide.net] [1/1] Fetching openssl-3.0.12,1.pkg: .......... done
Checking integrity... done (0 conflicting)
[nginx-s3-nomad-amd64-13_2.vsf00001.cpt.za.honeyguide.net] [1/1] Upgrading openssl from 1.1.1w,1 to 3.0.12,1...
[nginx-s3-nomad-amd64-13_2.vsf00001.cpt.za.honeyguide.net] [1/1] Extracting openssl-3.0.12,1: .......... done
Step 7: Install package ca_root_nss
Updating FreeBSD repository catalogue...
FreeBSD repository is up to date.
All repositories are up to date.
The following 1 package(s) will be affected (of 0 checked):
Installed packages to be UPGRADED:
ca_root_nss: 3.93 -> 3.93_2
Number of packages to be upgraded: 1
272 KiB to be downloaded.
[nginx-s3-nomad-amd64-13_2.vsf00001.cpt.za.honeyguide.net] [1/1] Fetching ca_root_nss-3.93_2.pkg: .......... done
Checking integrity... done (0 conflicting)
[nginx-s3-nomad-amd64-13_2.vsf00001.cpt.za.honeyguide.net] [1/1] Upgrading ca_root_nss from 3.93 to 3.93_2...
[nginx-s3-nomad-amd64-13_2.vsf00001.cpt.za.honeyguide.net] [1/1] Extracting ca_root_nss-3.93_2: ....... done
Scanning /usr/share/certs/blacklisted for certificates...
Scanning /usr/share/certs/trusted for certificates...
Scanning /usr/local/share/certs for certificates...
Step 8: Install package curl
Updating FreeBSD repository catalogue...
FreeBSD repository is up to date.
All repositories are up to date.
Checking integrity... done (0 conflicting)
The most recent versions of packages are already installed
Step 9: Install package jo
Updating FreeBSD repository catalogue...
FreeBSD repository is up to date.
All repositories are up to date.
Checking integrity... done (0 conflicting)
The most recent versions of packages are already installed
Step 10: Install package bash
Updating FreeBSD repository catalogue...
FreeBSD repository is up to date.
All repositories are up to date.
Checking integrity... done (0 conflicting)
The most recent versions of packages are already installed
Step 11: Install package rsync
Updating FreeBSD repository catalogue...
FreeBSD repository is up to date.
All repositories are up to date.
Checking integrity... done (0 conflicting)
The most recent versions of packages are already installed
Step 12: Install package nginx
Updating FreeBSD repository catalogue...
FreeBSD repository is up to date.
All repositories are up to date.
The following 2 package(s) will be affected (of 0 checked):
New packages to be INSTALLED:
nginx: 1.24.0_12,3
pcre2: 10.42
Number of packages to be installed: 2
The process will require 8 MiB more space.
2 MiB to be downloaded.
[nginx-s3-nomad-amd64-13_2.vsf00001.cpt.za.honeyguide.net] [1/2] Fetching nginx-1.24.0_12,3.pkg: .......... done
[nginx-s3-nomad-amd64-13_2.vsf00001.cpt.za.honeyguide.net] [2/2] Fetching pcre2-10.42.pkg: .......... done
Checking integrity... done (0 conflicting)
[nginx-s3-nomad-amd64-13_2.vsf00001.cpt.za.honeyguide.net] [1/2] Installing pcre2-10.42...
[nginx-s3-nomad-amd64-13_2.vsf00001.cpt.za.honeyguide.net] [1/2] Extracting pcre2-10.42: .......... done
[nginx-s3-nomad-amd64-13_2.vsf00001.cpt.za.honeyguide.net] [2/2] Installing nginx-1.24.0_12,3...
===> Creating groups.
Using existing group 'www'.
===> Creating users
Using existing user 'www'.
[nginx-s3-nomad-amd64-13_2.vsf00001.cpt.za.honeyguide.net] [2/2] Extracting nginx-1.24.0_12,3: .......... done
=====
Message from nginx-1.24.0_12,3:
--
Recent version of the NGINX introduces dynamic modules support. In
FreeBSD ports tree this feature was enabled by default with the DSO
knob. Several vendor's and third-party modules have been converted
to dynamic modules. Unset the DSO knob builds an NGINX without
dynamic modules support.
To load a module at runtime, include the new `load_module'
directive in the main context, specifying the path to the shared
object file for the module, enclosed in quotation marks. When you
reload the configuration or restart NGINX, the module is loaded in.
It is possible to specify a path relative to the source directory,
or a full path, please see
https://www.nginx.com/blog/dynamic-modules-nginx-1-9-11/ and
http://nginx.org/en/docs/ngx_core_module.html#load_module for
details.
Default path for the NGINX dynamic modules is
/usr/local/libexec/nginx.
Step 13: Install package jq
Updating FreeBSD repository catalogue...
FreeBSD repository is up to date.
All repositories are up to date.
Checking integrity... done (0 conflicting)
The most recent versions of packages are already installed
Step 14: Install package nano
Updating FreeBSD repository catalogue...
FreeBSD repository is up to date.
All repositories are up to date.
Checking integrity... done (0 conflicting)
The most recent versions of packages are already installed
Step 15: Install package sudo
Updating FreeBSD repository catalogue...
FreeBSD repository is up to date.
All repositories are up to date.
Checking integrity... done (0 conflicting)
The most recent versions of packages are already installed
Step 16: Clean package installation
The following package files will be deleted:
/var/cache/pkg/libunistring-1.1~fb3e6bc730.pkg
/var/cache/pkg/indexinfo-0.3.1~e92f15179b.pkg
/var/cache/pkg/libpsl-0.21.2_3~05842c11f4.pkg
/var/cache/pkg/indexinfo-0.3.1.pkg
/var/cache/pkg/nano-7.2.pkg
/var/cache/pkg/jq-1.7_1~1eefbc3a10.pkg
/var/cache/pkg/sudo-1.9.15.pkg
/var/cache/pkg/libnghttp2-1.57.0~2b26a4703b.pkg
/var/cache/pkg/jo-1.6.pkg
/var/cache/pkg/zstd-1.5.5.pkg
/var/cache/pkg/oniguruma-6.9.8_1.pkg
/var/cache/pkg/libidn2-2.3.4~ed7d56c726.pkg
/var/cache/pkg/rsync-3.2.7.pkg
/var/cache/pkg/rsync-3.2.7~9b90ed0ad5.pkg
/var/cache/pkg/openssl-1.1.1w,1~eff40dfe51.pkg
/var/cache/pkg/xxhash-0.8.2.pkg
/var/cache/pkg/bash-5.2.15.pkg
/var/cache/pkg/bash-5.2.15~2843906e9e.pkg
/var/cache/pkg/sudo-1.9.15~6b92d16551.pkg
/var/cache/pkg/libiconv-1.17.pkg
/var/cache/pkg/openssl-1.1.1w,1.pkg
/var/cache/pkg/liblz4-1.9.4,1.pkg
/var/cache/pkg/zstd-1.5.5~667cf4dac2.pkg
/var/cache/pkg/ca_root_nss-3.93~6bb9c7b3d8.pkg
/var/cache/pkg/readline-8.2.1.pkg
/var/cache/pkg/curl-8.4.0.pkg
/var/cache/pkg/libiconv-1.17~03570d230d.pkg
/var/cache/pkg/jq-1.7_1.pkg
/var/cache/pkg/ca_root_nss-3.93.pkg
/var/cache/pkg/readline-8.2.1~c3fe9df38a.pkg
/var/cache/pkg/gettext-runtime-0.22_1.pkg
/var/cache/pkg/libssh2-1.11.0,3~85eea9abe0.pkg
/var/cache/pkg/nano-7.2~a9950d0dda.pkg
/var/cache/pkg/libnghttp2-1.57.0.pkg
/var/cache/pkg/libunistring-1.1.pkg
/var/cache/pkg/curl-8.4.0~07bb4d52cf.pkg
/var/cache/pkg/oniguruma-6.9.8_1~c1ce519660.pkg
/var/cache/pkg/xxhash-0.8.2~9104117b92.pkg
/var/cache/pkg/jo-1.6~72fbf830c1.pkg
/var/cache/pkg/gettext-runtime-0.22_1~15d353e0c1.pkg
/var/cache/pkg/libpsl-0.21.2_3.pkg
/var/cache/pkg/libssh2-1.11.0,3.pkg
/var/cache/pkg/libidn2-2.3.4.pkg
/var/cache/pkg/liblz4-1.9.4,1~e4fc608ab5.pkg
The cleanup will free 13 MiB
Deleting files: .......... done
All done
Step 17: Enable nginx
nginx enabled in /etc/rc.conf
Step 18: Clean cook artifacts
Step 19: Install pot local
Step 20: Set file ownership on cook scripts
Step 21: Make cook script executable
setting executable bit on /usr/local/bin/cook
Step 22: Create rc.d script to start cook
creating rc.d script to start cook
Step 23: Make rc.d script to start cook executable
Setting executable bit on cook rc file
=====> Stop the pot nginx-s3-nomad-amd64-13_2
=====> Remove p4654f094b1fb8 epair network interfaces
=====> unmount /mnt/srv/pot/jails/nginx-s3-nomad-amd64-13_2/m/tmp
=====> unmount /mnt/srv/pot/jails/nginx-s3-nomad-amd64-13_2/m/dev
=====> Reverting pot nginx-s3-nomad-amd64-13_2 to non-persistent
=====> Flavour: nginx-s3-nomad+1
=====> Executing nginx-s3-nomad+1 pot commands on nginx-s3-nomad-amd64-13_2
=====> No shell script available for the flavour nginx-s3-nomad+1
=====> Flavour: nginx-s3-nomad+2
=====> Executing nginx-s3-nomad+2 pot commands on nginx-s3-nomad-amd64-13_2
=====> No shell script available for the flavour nginx-s3-nomad+2
=====> Flavour: nginx-s3-nomad+3
=====> Executing nginx-s3-nomad+3 pot commands on nginx-s3-nomad-amd64-13_2
=====> No shell script available for the flavour nginx-s3-nomad+3
=====> Flavour: nginx-s3-nomad+4
=====> Executing nginx-s3-nomad+4 pot commands on nginx-s3-nomad-amd64-13_2
=====> No shell script available for the flavour nginx-s3-nomad+4
===> exporting nginx-s3-nomad-amd64-13_2 @ 1699678573 to /tmp/nginx-s3-nomad-amd64-13_2_0.12.1.xz
xz: Reduced the number of threads from 4 to 3 to not exceed the memory usage limit of 503 MiB