Search
You can find the results of your search below.
Matching pagenames:
Fulltext results:
- kubernetes_using_single_node_as_master_and_worker
- ?only_cpu_and_memory=true": x509: cannot validate certificate for 192.168.44.11 because it doesn't contain any ... annotations: description: ssl certificate(s) will expire in less then a week su... увидеть, что появился сертификат: kubectl get certificate -A Если сертификат долго не готов, то нужно смотр
- wiki_backup
- ypted backups dirs=`echo "lftp -e 'set ssl:verify-certificate no ssl:check-hostname false net:connection-limit ... { echo "lftp -e 'set ssl:verify-certificate no ssl:check-hostname false net:connection-limit ... and remove tmp dir echo "lftp -e 'set ssl:verify-certificate no ssl:check-hostname false net:connection-limit ... te to remote server echo "lftp -e 'set ssl:verify-certificate no ssl:check-hostname false net:connection-limit
- openssl_hints
- ых (только то что между строками <code>-----BEGIN CERTIFICATE-----</code> и <code>-----END CERTIFICATE------</code> делаем так: openssl s_client -showcerts -connect nexu
- ubuntu_setup_script
- em csplit -k -f $CA_CERT_PREFIX ./chain.pem '/END CERTIFICATE/+1' {10} find ./ -iname $CA_CERT_PREFIX\* -type f -exec grep -F -L 'END CERTIFICATE' '{}' + | xargs -d '\n' rm for file in "$CA_CERT_
- haproxy_how_to_concatenate_intermidiate_certs_chain
- Правильный порядок такой: |Сертификат домена (The Certificate for your domain)| |Промежуточный сертификат 1 (Th... Составить **pem**-файл можно примерно так: cat certificate.crt intermediates.pem private.key > ssl-certs.pem
- настройка_xrdp_для_переподключения_сессии
- s=32768 security_layer=negotiate crypt_level=high certificate= key_file= ssl_protocols=TLSv1, TLSv1.1, TLSv1.2
- keycloak_on_kubernetes_import_root_ca_ldaps
- ормлены стандартными разделителями - **-----BEGIN CERTIFICATE-----** и **-----END CERTIFICATE-----**. curl -k https://nexus.rdleas.ru/repository/files/Root_CA_Certs/RDlea
- ssh_in_browser
- ssl_certificate /etc/ssl/certs/server.crt; ... ssl_certificate_key /etc/ssl/private/server.key
- python_oauth2client_certificate_verify_failed_unable_to_get_local_issuer_certificate
- ает ошибка: ssl.SSLCertVerificationError: [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: unable to get local issuer certificate ====== Причина ====== Причина в том, что сервер, реализу... lib2\.Http(\*args, \*\*kwargs)/ s/)/, disable_ssl_certificate_validation=True)/' /usr/local/lib/python3.7/dist-
- ansible_with_semaphore_ui
- ity "max-age=31536000" always; # SSL ssl_certificate /etc/letsencrypt/live/server.domain.com/fullchain.pem; ssl_certificate_key /etc/letsencrypt/live/server.domain.com/privk
- lets_encrypt_certificates_on_ubuntu
- ssl http2; server_name server.domain.ru; ssl_certificate /etc/letsencrypt/live/pgadmin.adspeed.ru/fullchain.pem; ssl_certificate_key /etc/letsencrypt/live/pgadmin.adspeed.ru/priv
- backup_all_mysql_databases_separate_files_to_ftp
- ypted backups dirs=`echo "lftp -e 'set ssl:verify-certificate no ssl:check-hostname false net:connection-limit ... { echo "lftp -e 'set ssl:verify-certificate no ssl:check-hostname false net:connection-limit ... /tmp/$currentdate/ echo "lftp -e 'set ssl:verify-certificate no ssl:check-hostname false net:connection-limit
- запуск_webloop_на_ubuntu_14.04
- is.com/golang/go1.6.linux-amd64.tar.gz --no-check-certificate sudo tar -C /usr/local -xzf ./go1.6.linux-amd64
- nginx
- on; ssl_protocols SSLv3 TLSv1; ssl_certificate /usr/local/nginx/conf/ssl/cert.pem; ssl_certificate_key /usr/local/nginx/conf/ssl/cert.key;</code>
- setup_centos_workstation_with_ansible_playbook
- it -k -f "{{ ca_cert_prefix }}" ./chain.pem '/END CERTIFICATE/+1' {10} find ./ -iname "{{ ca_cert_prefix }}"\* -type f -exec grep -F -L 'END CERTIFICATE' '{}' + | xargs -d '\n' rm for file in "{{