ssl-certificate

Let's Encrypt Certificate Issuance

你。 提交于 2021-02-07 20:44:18
问题 I am trying to get a certificate issued from Let's Encrypt, and it has been 3 and a half hours. I accidentally originally set my secretName as "echo-tls" before switching it to the correct "pandaist-tls" that I want to use instead. I currently have this: kubectl get CertificateRequest -o wide NAME READY ISSUER STATUS AGE pandaist-tls-1926992011 False letsencrypt-prod Waiting on certificate issuance from order default/pandaist-tls-1926992011-2163900139: "pending" 3h26m When I describe the

Imported SSL Cert not listed for ALB Listener

人走茶凉 提交于 2021-02-07 20:01:25
问题 I have created an SSL cert via DigiCert and imported to ACM. (I require the same SSL to be applied to both ALB and the Application, and since there's no way to import ACM certs, I had to follow this way) I have successfully imported the SSL and can see it in the console. However, I cannot apply it to ALB 443 Listener. I provided the Cert ARN to the CloudFormation template and it fails stating certificate don't exist. I have tried to manually update the 443 Listener, but the cert is not listed

Python AWS Lambda Certificates

允我心安 提交于 2021-02-07 19:49:43
问题 How do I add an additional CA (certificate authority) to the trust store used by my Python3 AWS Lambda function? 回答1: If you only need a single CA, then get your crt file and encode it into a pem using the following command in linux: openssl x509 -text -in "{your CA}.crt" > cacert.pem If you need to add CA's to the default CA bundle, then copy python3.8/site-packages/certifi/cacert.pem to your lambda folder. Then run this command for each crt: openssl x509 -text -in "{your CA}.crt" >> cacert

Python AWS Lambda Certificates

五迷三道 提交于 2021-02-07 19:48:20
问题 How do I add an additional CA (certificate authority) to the trust store used by my Python3 AWS Lambda function? 回答1: If you only need a single CA, then get your crt file and encode it into a pem using the following command in linux: openssl x509 -text -in "{your CA}.crt" > cacert.pem If you need to add CA's to the default CA bundle, then copy python3.8/site-packages/certifi/cacert.pem to your lambda folder. Then run this command for each crt: openssl x509 -text -in "{your CA}.crt" >> cacert

Python AWS Lambda Certificates

丶灬走出姿态 提交于 2021-02-07 19:48:17
问题 How do I add an additional CA (certificate authority) to the trust store used by my Python3 AWS Lambda function? 回答1: If you only need a single CA, then get your crt file and encode it into a pem using the following command in linux: openssl x509 -text -in "{your CA}.crt" > cacert.pem If you need to add CA's to the default CA bundle, then copy python3.8/site-packages/certifi/cacert.pem to your lambda folder. Then run this command for each crt: openssl x509 -text -in "{your CA}.crt" >> cacert

keytool error: java.lang.Exception: Public keys in reply and keystore don't match

て烟熏妆下的殇ゞ 提交于 2021-02-07 10:30:38
问题 I have this problem when I import a certification file into keystore: keytool error: java.lang.Exception: Public keys in reply and keystore don't match I do this this operation: 1) create my keystore on the server : keytool -genkey -keystore C:\keystore\keystore -alias jboss -keyalg RSA 2) I have domain.pfx and convert it whit this command: openssl pkcs12 -in domain.pfx -clcerts -nokeys -out domain.cer openssl pkcs12 -in domain.pfx -nocerts -nodes -out domain_encrypted.key openssl rsa -in

keytool error: java.lang.Exception: Public keys in reply and keystore don't match

戏子无情 提交于 2021-02-07 10:30:01
问题 I have this problem when I import a certification file into keystore: keytool error: java.lang.Exception: Public keys in reply and keystore don't match I do this this operation: 1) create my keystore on the server : keytool -genkey -keystore C:\keystore\keystore -alias jboss -keyalg RSA 2) I have domain.pfx and convert it whit this command: openssl pkcs12 -in domain.pfx -clcerts -nokeys -out domain.cer openssl pkcs12 -in domain.pfx -nocerts -nodes -out domain_encrypted.key openssl rsa -in

What is the equivalent of Unix c_rehash command/script on Linux?

元气小坏坏 提交于 2021-02-07 07:43:44
问题 I am following the instructions on how to import a certificate with its whole chain into a keystore. The problem I face is that I do not have c_rehash on my system: user@hostanme$ c_rehash ./certs -bash: c_rehash: command not found I have found the -subject_hash option of openssl x509, but I am not sure how to use it to replicate whatever c_rehash does. How can I hash the certificate directory without the c_rehash command/script? 回答1: c_rehash needs "perl" for execution. If you can not run c

What is the equivalent of Unix c_rehash command/script on Linux?

假装没事ソ 提交于 2021-02-07 07:43:13
问题 I am following the instructions on how to import a certificate with its whole chain into a keystore. The problem I face is that I do not have c_rehash on my system: user@hostanme$ c_rehash ./certs -bash: c_rehash: command not found I have found the -subject_hash option of openssl x509, but I am not sure how to use it to replicate whatever c_rehash does. How can I hash the certificate directory without the c_rehash command/script? 回答1: c_rehash needs "perl" for execution. If you can not run c

What is the equivalent of Unix c_rehash command/script on Linux?

烂漫一生 提交于 2021-02-07 07:43:06
问题 I am following the instructions on how to import a certificate with its whole chain into a keystore. The problem I face is that I do not have c_rehash on my system: user@hostanme$ c_rehash ./certs -bash: c_rehash: command not found I have found the -subject_hash option of openssl x509, but I am not sure how to use it to replicate whatever c_rehash does. How can I hash the certificate directory without the c_rehash command/script? 回答1: c_rehash needs "perl" for execution. If you can not run c