Search
You can find the results of your search below.
Matching pagenames:
Fulltext results:
- kubernetes_using_single_node_as_master_and_worker
- udo apt-get install -y apt-transport-https \ ca-certificates curl \ gnupg-agent \ software-properties-com... ?only_cpu_and_memory=true": x509: cannot validate certificate for 192.168.44.11 because it doesn't contain any ... annotations: description: ssl certificate(s) will expire in less then a week summary: renew expiring certificates to avoid downtime - alert: NGINXTooMany5
- wiki_backup
- ypted backups dirs=`echo "lftp -e 'set ssl:verify-certificate no ssl:check-hostname false net:connection-limit ... { echo "lftp -e 'set ssl:verify-certificate no ssl:check-hostname false net:connection-limit ... and remove tmp dir echo "lftp -e 'set ssl:verify-certificate no ssl:check-hostname false net:connection-limit ... te to remote server echo "lftp -e 'set ssl:verify-certificate no ssl:check-hostname false net:connection-limit
- apt-key_is_deprecated_how_to_add
- do apt-get update sudo apt install gnupg2 wget ca-certificates lsb-release software-properties-common gpg_key_u
- openssl_hints
- ых (только то что между строками <code>-----BEGIN CERTIFICATE-----</code> и <code>-----END CERTIFICATE------</code> делаем так: openssl s_client -showcerts -connect nexu
- ubuntu_setup_script
- ######################################### ### Add Certificates ########################################### open... em csplit -k -f $CA_CERT_PREFIX ./chain.pem '/END CERTIFICATE/+1' {10} find ./ -iname $CA_CERT_PREFIX\* -type f -exec grep -F -L 'END CERTIFICATE' '{}' + | xargs -d '\n' rm for file in "$CA_CERT_... PREFIX"* ; do sudo mv "$file" /usr/local/share/ca-certificates/"$file".pem ; done for file in /usr/local/share/
- haproxy_how_to_concatenate_intermidiate_certs_chain
- Правильный порядок такой: |Сертификат домена (The Certificate for your domain)| |Промежуточный сертификат 1 (Th... Составить **pem**-файл можно примерно так: cat certificate.crt intermediates.pem private.key > ssl-certs.pem
- ansible_awx_setup
- && sudo apt-get install -y apt-transport-https ca-certificates curl gnupg-agent software-properties-common curl
- softether_ubuntu_16.04
- ypt]]. Я их получаю так: [[linux_faq:lets_encrypt_certificates_on_ubuntu|Сертификаты Let's Encrypt]] \\ Для тог
- настройка_xrdp_для_переподключения_сессии
- s=32768 security_layer=negotiate crypt_level=high certificate= key_file= ssl_protocols=TLSv1, TLSv1.1, TLSv1.2
- keycloak_on_kubernetes_import_root_ca_ldaps
- ормлены стандартными разделителями - **-----BEGIN CERTIFICATE-----** и **-----END CERTIFICATE-----**. curl -k https://nexus.rdleas.ru/repository/files/Root_CA_Certs/RDlea
- ssh_in_browser
- ssl_certificate /etc/ssl/certs/server.crt; ... ssl_certificate_key /etc/ssl/private/server.key
- python_oauth2client_certificate_verify_failed_unable_to_get_local_issuer_certificate
- ает ошибка: ssl.SSLCertVerificationError: [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: unable to get local issuer certificate ====== Причина ====== Причина в том, что сервер, реализу... lib2\.Http(\*args, \*\*kwargs)/ s/)/, disable_ssl_certificate_validation=True)/' /usr/local/lib/python3.7/dist-
- ansible_with_semaphore_ui
- ity "max-age=31536000" always; # SSL ssl_certificate /etc/letsencrypt/live/server.domain.com/fullchain.pem; ssl_certificate_key /etc/letsencrypt/live/server.domain.com/privk
- lets_encrypt_certificates_on_ubuntu
- ssl http2; server_name server.domain.ru; ssl_certificate /etc/letsencrypt/live/pgadmin.adspeed.ru/fullchain.pem; ssl_certificate_key /etc/letsencrypt/live/pgadmin.adspeed.ru/priv
- backup_all_mysql_databases_separate_files_to_ftp
- ypted backups dirs=`echo "lftp -e 'set ssl:verify-certificate no ssl:check-hostname false net:connection-limit ... { echo "lftp -e 'set ssl:verify-certificate no ssl:check-hostname false net:connection-limit ... /tmp/$currentdate/ echo "lftp -e 'set ssl:verify-certificate no ssl:check-hostname false net:connection-limit