Attention: this is the key used to sign the certificate requests, anyone holding this can sign certificates on your behalf. So keep it in a safe place!
openssl genrsa -des3 -out rootCA.key 4096
Located in alphabetical order (not prefer)
C
ab
), also designed as a more modern replacement, written in C
golang
)golang
)#! /usr/bin/env bash | |
# Install any build dependencies needed for curl | |
sudo apt-get build-dep curl | |
# Get latest (as of Feb 25, 2016) libcurl | |
mkdir ~/curl | |
cd ~/curl | |
wget http://curl.haxx.se/download/curl-7.50.2.tar.bz2 | |
tar -xvjf curl-7.50.2.tar.bz2 |
# All certs in pem format | |
openssl verify -partial_chain -verbose -CAfile root.crt server.crt |
textutil -convert txt *.rtf |
/etc/pki/ca-trust/source/anchors
on your CentOS machineupdate-ca-trust extract
wget https://thewebsite.org
Most large enterprises run their own PKI infrastructure and it’s common to issue internal CA signed certificate to services - The Root CA certificate is pushed to domain-joined workstations with group policy etc.
For non-domain joined services (like linux hosts etc.) it’s common to manually trust root CA cert.
Docker deamon automatically picks up the trusted root CA list from the host and use it as it's trusted CA list... Following commands can be used to add a custom CA certficate as trusted CA in Ubuntu
.crt
extensionFROM keshavab/systemd | |
RUN yum -y install httpd; yum clean all | |
RUN systemctl enable httpd.service | |
# RUN systemctl restart httpd.service | |
EXPOSE 80 | |
ENTRYPOINT ["/usr/sbin/init"] | |
CMD systemctl restart httpd.service |
go test -cover | |
go test -coverprofile=coverage.out | |
go tool cover -html=coverage.out | |
-- run a specific testcase | |
go test -v -cover -run TestSubscriberStop | |
-- run a specific file | |
go test -v -cover context_messaging.go |