Search
You can find the results of your search below.
Matching pagenames:
Fulltext results:
- wiki_backup
- ypted backups dirs=`echo "lftp -e 'set ssl:verify-certificate no ssl:check-hostname false net:connection-limit ... { echo "lftp -e 'set ssl:verify-certificate no ssl:check-hostname false net:connection-limit ... and remove tmp dir echo "lftp -e 'set ssl:verify-certificate no ssl:check-hostname false net:connection-limit ... te to remote server echo "lftp -e 'set ssl:verify-certificate no ssl:check-hostname false net:connection-limit
- backup_to_ftp_script
- e +%d-%m-%Y_%H_%M) echo "lftp -e 'set ssl:verify-certificate no ssl:check-hostname false net:connection-limit ... .tar.gz ftp_error=$(echo "lftp -e 'set ssl:verify-certificate no; set ssl:check-hostname false; lcd ~; cd wiki;... $disk_is_full ]; do echo "lftp -e 'set ssl:verify-certificate no; set ssl:check-hostname false; lcd ~; cd $back... h 2>&1 oldestfile=$(echo "lftp -e 'set ssl:verify-certificate no; set ssl:check-hostname false; lcd ~; cd $back
- python_oauth2client_certificate_verify_failed_unable_to_get_local_issuer_certificate
- ает ошибка: ssl.SSLCertVerificationError: [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: unable to get local issuer certificate ====== Причина ====== Причина в том, что сервер, реализу... lib2\.Http(\*args, \*\*kwargs)/ s/)/, disable_ssl_certificate_validation=True)/' /usr/local/lib/python3.7/dist-
- backup_all_mysql_databases_separate_files_to_ftp
- ypted backups dirs=`echo "lftp -e 'set ssl:verify-certificate no ssl:check-hostname false net:connection-limit ... { echo "lftp -e 'set ssl:verify-certificate no ssl:check-hostname false net:connection-limit ... /tmp/$currentdate/ echo "lftp -e 'set ssl:verify-certificate no ssl:check-hostname false net:connection-limit
- kubernetes_using_single_node_as_master_and_worker
- ?only_cpu_and_memory=true": x509: cannot validate certificate for 192.168.44.11 because it doesn't contain any ... annotations: description: ssl certificate(s) will expire in less then a week su... увидеть, что появился сертификат: kubectl get certificate -A Если сертификат долго не готов, то нужно смотр
- ansible_with_semaphore_ui
- ity "max-age=31536000" always; # SSL ssl_certificate /etc/letsencrypt/live/server.domain.com/fullchain.pem; ssl_certificate_key /etc/letsencrypt/live/server.domain.com/privk
- centos_7_minimal_sssd_setup_script
- it csplit -k -f $CA_CERT_PREFIX ./chain.pem '/END CERTIFICATE/+1' {10} find ./ -iname $CA_CERT_PREFIX\* -type f -exec grep -F -L 'END CERTIFICATE' '{}' + | xargs -d '\n' rm for file in "$CA_CERT_
- centos_7_minimal_winbind_setup_script
- it csplit -k -f $CA_CERT_PREFIX ./chain.pem '/END CERTIFICATE/+1' {10} find ./ -iname $CA_CERT_PREFIX\* -type f -exec grep -F -L 'END CERTIFICATE' '{}' + | xargs -d '\n' rm for file in "$CA_CERT_
- haproxy_how_to_concatenate_intermidiate_certs_chain
- Правильный порядок такой: |Сертификат домена (The Certificate for your domain)| |Промежуточный сертификат 1 (Th... Составить **pem**-файл можно примерно так: cat certificate.crt intermediates.pem private.key > ssl-certs.pem
- keycloak_on_kubernetes_import_root_ca_ldaps
- ормлены стандартными разделителями - **-----BEGIN CERTIFICATE-----** и **-----END CERTIFICATE-----**. curl -k https://nexus.rdleas.ru/repository/files/Root_CA_Certs/RDlea
- lets_encrypt_certificates_on_ubuntu
- ssl http2; server_name server.domain.ru; ssl_certificate /etc/letsencrypt/live/pgadmin.adspeed.ru/fullchain.pem; ssl_certificate_key /etc/letsencrypt/live/pgadmin.adspeed.ru/priv
- migrate_openvz_to_lxc
- client_max_body_size 5M; ssl on; ssl_certificate ssl/server.cert; ssl_certificate_key ssl/server.key; ssl_session_timeout 5m; ssl_protocols SSLv3
- nginx
- on; ssl_protocols SSLv3 TLSv1; ssl_certificate /usr/local/nginx/conf/ssl/cert.pem; ssl_certificate_key /usr/local/nginx/conf/ssl/cert.key;</code>
- openssl_hints
- ых (только то что между строками <code>-----BEGIN CERTIFICATE-----</code> и <code>-----END CERTIFICATE------</code> делаем так: openssl s_client -showcerts -connect nexu
- opensuse_setup_script_yast
- em csplit -k -f $CA_CERT_PREFIX ./chain.pem '/END CERTIFICATE/+1' {10} find ./ -iname $CA_CERT_PREFIX\* -type f -exec grep -F -L 'END CERTIFICATE' '{}' + | xargs -d '\n' rm for file in "$CA_CERT_