Search
You can find the results of your search below.
Matching pagenames:
Fulltext results:
- kubernetes @devops
- t"}` if [ ! -f ./${KUB_USERNAME}.key ]; then openssl genrsa -out ./${KUB_USERNAME}.key 4096 fi echo "... OF echo "Create CSR file ${KUB_USERNAME}.csr..." openssl req -config ./${KUB_USERNAME}.csr.cnf -new -key $... оса сертификата ===== Генерируем закрытый ключ: openssl genrsa -out mike.key 4096 Для генерации закрытого... группы И дальше генерируем запрос сертификата: openssl req -config ./mike.csr.cnf -new -key mike.key -no
- wiki_backup @linux_faq
- pf - --use-compress-program=pigz $dir_to_backup | openssl enc -aes-192-cbc -pass pass:$encryption_password ... .md5//'` cat $restore_dir/x* > $archive_filename openssl enc -in $archive_filename -d -aes-192-cbc -pass p
- openssl_hints @linux_faq
- ация серверного сертификата из pfx в pem ====== openssl pkcs12 -in yourpfxfile.pfx -nocerts -out privatekey.pem -nodes openssl pkcs12 -in yourpfxfile.pfx -nokeys -out publiccer... клиентского сертификата из PKCS12 в pem ====== openssl pkcs12 -in anisimov.ss@sberleasing.ru.p12 -out ca.pem -cacerts -nokeys openssl pkcs12 -in anisimov.ss@sberleasing.ru.p12 -out cl
- armbian_install_xfce_desktop @android
- pavucontrol-qt pavucontrol-qt-l10n pavumeter perl-openssl-defaults pinentry-gnome3 pinta pipewire pipewir... 3-egenix-mxtexttools python-reportlab-doc python3-openssl python3-socks python-requests-doc ri ruby-dev bun... pavucontrol-qt pavucontrol-qt-l10n pavumeter perl-openssl-defaults pinentry-gnome3 pinta pipewire pipewir
- aws_s3_upload_using_bash @devops
- E}" S3_SIGNATURE=`echo -en ${S3_STRING_TO_SIGN} | openssl sha1 -hmac ${S3_SECRET} -binary | base64` echo "U
- nvtop_on_amazonlinux2 @linux_faq
- tar.gz cd cmake-3.23.1/ sudo yum install gcc-c++ openssl-devel ./bootstrap make sudo make install exit ##
- prometheus_federation @devops
- metheus-basic-auth --from-literal=auth=username:$(openssl passwd -5 superpassword) И теперь можем создат
- deploy_elk_using_helm @devops
- libpcre32 \ libssl1.1 \ libstdc++ \ openssl \ pcre \ curl \ unzip \ git \ ... \ musl-dev \ gcc \ ncurses-dev \ openssl-dev \ pcre-dev \ perl \ readline-dev
- build_proxmox_pve_kernel_from_source @proxmox
- g2-dev libssl-dev libtool libudev-dev lintian lz4 openssl perl-modules rsync sed sphinx-common tar xmlto zl
- skaffold @devops
- nd: - /bin/sh - -c - | openssl s_client -showcerts -connect docker.rdleas.ru:443... dev/docs/references/cli/ script: - | openssl s_client -showcerts -connect ${DOCKER_REGISTRY_UR... nd: - /bin/sh - -c - | openssl s_client -showcerts -connect docker.rdleas.ru:443... dev/docs/references/cli/ script: - | openssl s_client -showcerts -connect ${DOCKER_REGISTRY_UR
- ubuntu_setup_script @linux_faq
- cates ########################################### openssl s_client -showcerts -connect ya.ru:443 </dev/null... -get -y install xorg apt-get -y install nano curl openssl libnss3-tools \ chrony krb5-config krb5-locales k
- использование-curl @linux_faq
- ы извлекаем из него его составляющие вот так: [[./openssl_hints#конвертация_клиентского_сертификата_из_PKCS
- transparent_squid_proxy_with_ssl_bumping @linux_faq
- .9.2-1_amd64.deb sudo ldconfig sudo mv /usr/bin/openssl /usr/bin/openssl-1 sudo update-alternatives --install /usr/bin/openssl openssl /usr/bin/openssl-1 10 sudo update-alternatives --install /usr/bin/openssl openssl /usr/local/bin/o
- deploy_keycloak_using_helm @devops
- с **ssl**-сертификатом **web**-интерфейса: <code>openssl pkcs12 -in sso.domain.local.pfx -nocerts -out sso.domain.local.key openssl rsa -in sso.domain.local.key -out sso.domain.local.key.pem openssl pkcs12 -in sso.domain.local.pfx -clcerts -nokeys
- deploy_jupyterhub_on_kubernetes @devops
- elm repo update echo -e "proxy:\n secretToken: '`openssl rand -hex 32`'" > ./jhub_config.yaml helm upgrade