Merge pull request #3735 from hashicorp/docs-tls-demo
Add demo TLS certificates and configs
This commit is contained in:
commit
97bae65b7f
|
@ -0,0 +1,56 @@
|
||||||
|
SHELL = bash
|
||||||
|
|
||||||
|
.PHONY: all
|
||||||
|
all: \
|
||||||
|
ca.pem ca-key.pem ca.csr \
|
||||||
|
client.pem client-key.pem client.csr \
|
||||||
|
dev.pem dev-key.pem dev.csr \
|
||||||
|
server.pem server-key.pem server.csr \
|
||||||
|
user.pem user-key.pem user.csr user.pfx
|
||||||
|
|
||||||
|
.PHONY: bootstrap
|
||||||
|
bootstrap: ## Install dependencies
|
||||||
|
@echo "==> Updating cfssl..."
|
||||||
|
go get -u github.com/cloudflare/cfssl/cmd/...
|
||||||
|
|
||||||
|
clean: ## Remove generated files
|
||||||
|
@echo "==> Removing generated files..."
|
||||||
|
rm -f \
|
||||||
|
ca.pem ca-key.pem ca.csr \
|
||||||
|
client.pem client-key.pem client.csr \
|
||||||
|
dev.pem dev-key.pem dev.csr \
|
||||||
|
server.pem server-key.pem server.csr \
|
||||||
|
user.pem user-key.pem user.csr user.pfx
|
||||||
|
|
||||||
|
# Generate Nomad certificate authority
|
||||||
|
ca.pem ca-key.pem ca.csr:
|
||||||
|
@echo "==> Removing generated files..."
|
||||||
|
cfssl gencert -initca ca-csr.json | cfssljson -bare ca
|
||||||
|
|
||||||
|
# Generate Nomad server certificate
|
||||||
|
server.pem server-key.pem server.csr:
|
||||||
|
@echo "==> Generating Nomad server certificate..."
|
||||||
|
cfssl gencert -ca=ca.pem -ca-key=ca-key.pem -config=cfssl.json \
|
||||||
|
-hostname="server.global.nomad,localhost,127.0.0.1" csr.json \
|
||||||
|
| cfssljson -bare server
|
||||||
|
|
||||||
|
# Generate Nomad client node certificate
|
||||||
|
client.pem client-key.pem client.csr:
|
||||||
|
@echo "==> Generating Nomad client node certificate..."
|
||||||
|
cfssl gencert -ca=ca.pem -ca-key=ca-key.pem -config=cfssl.json \
|
||||||
|
-hostname="client.global.nomad,localhost,127.0.0.1" csr.json \
|
||||||
|
| cfssljson -bare client
|
||||||
|
|
||||||
|
# Generate Nomad combined server and client node certificate
|
||||||
|
dev.pem dev-key.pem dev.csr:
|
||||||
|
@echo "==> Generating Nomad server and client node certificate..."
|
||||||
|
cfssl gencert -ca=ca.pem -ca-key=ca-key.pem -config=cfssl.json \
|
||||||
|
-hostname="server.global.nomad,client.global.nomad,localhost,127.0.0.1" csr.json \
|
||||||
|
| cfssljson -bare dev
|
||||||
|
|
||||||
|
# Generate certificates for users (CLI and browsers)
|
||||||
|
user.pem user-key.pem user.csr user.pfx:
|
||||||
|
@echo "==> Generating Nomad user certificates..."
|
||||||
|
cfssl gencert -ca=ca.pem -ca-key=ca-key.pem -config=cfssl-user.json \
|
||||||
|
csr.json | cfssljson -bare user
|
||||||
|
openssl pkcs12 -export -inkey user-key.pem -in user.pem -out user.pfx -password pass:
|
|
@ -0,0 +1,57 @@
|
||||||
|
Demo TLS Configuration
|
||||||
|
======================
|
||||||
|
|
||||||
|
**Do _NOT_ use in production. For testing purposes only.**
|
||||||
|
|
||||||
|
See [Securing Nomad](https://www.nomadproject.io/guides/securing-nomad.html)
|
||||||
|
for a full guide.
|
||||||
|
|
||||||
|
This directory contains sample TLS certificates and configuration to ease
|
||||||
|
testing of TLS related features. There is a makefile to generate certificates,
|
||||||
|
and pre-generated are available for use.
|
||||||
|
|
||||||
|
## Files
|
||||||
|
|
||||||
|
| Generated? | File | Description |
|
||||||
|
| - | ------------- | ---|
|
||||||
|
| ◻️ | `GNUmakefile` | Makefile to generate certificates |
|
||||||
|
| ◻️ | `tls-*.hcl` | Nomad TLS configurations |
|
||||||
|
| ◻️ | `cfssl*.json` | cfssl configuration files |
|
||||||
|
| ◻️ | `csr*.json` | cfssl certificate generation configurations |
|
||||||
|
| ☑️ | `ca*.pem` | Certificate Authority certificate and key |
|
||||||
|
| ☑️ | `client*.pem` | Nomad client node certificate and key |
|
||||||
|
| ☑️ | `dev*.pem` | Nomad certificate and key for dev agents |
|
||||||
|
| ☑️ | `server*.pem` | Nomad server certificate and key |
|
||||||
|
| ☑️ | `user*.pem` | Nomad user (CLI) certificate and key |
|
||||||
|
| ☑️ | `user.pfx` | Nomad browser PKCS #12 certificate and key *(blank password)* |
|
||||||
|
|
||||||
|
## Usage
|
||||||
|
|
||||||
|
### Agent
|
||||||
|
|
||||||
|
To run a TLS-enabled Nomad agent include the `tls.hcl` configuration file with
|
||||||
|
either the `-dev` flag or your own configuration file. If you're not running
|
||||||
|
the `nomad agent` command from *this* directory you will have to edit the paths
|
||||||
|
in `tls.hcl`.
|
||||||
|
|
||||||
|
```sh
|
||||||
|
# Run the dev agent with TLS enabled
|
||||||
|
nomad agent -dev -config=tls-dev.hcl
|
||||||
|
|
||||||
|
# Run a *server* agent with your configuration and TLS enabled
|
||||||
|
nomad agent -config=path/to/custom.hcl -config=tls-server.hcl
|
||||||
|
|
||||||
|
# Run a *client* agent with your configuration and TLS enabled
|
||||||
|
nomad agent -config=path/to/custom.hcl -config=tls-client.hcl
|
||||||
|
```
|
||||||
|
|
||||||
|
### Browser
|
||||||
|
|
||||||
|
To access the Nomad Web UI when TLS is enabled you will need to import two
|
||||||
|
certificate files into your browser:
|
||||||
|
|
||||||
|
- `ca.pem` must be imported as a Certificate Authority
|
||||||
|
- `user.pfx` must be imported as a Client certificate. The password is blank.
|
||||||
|
|
||||||
|
When you access the UI via https://localhost:4646/ you will be prompted to
|
||||||
|
select the user certificate you imported.
|
|
@ -0,0 +1,19 @@
|
||||||
|
{
|
||||||
|
"CN": "example.nomad",
|
||||||
|
"hosts": [
|
||||||
|
"example.nomad"
|
||||||
|
],
|
||||||
|
"key": {
|
||||||
|
"algo": "ecdsa",
|
||||||
|
"size": 256
|
||||||
|
},
|
||||||
|
"names": [
|
||||||
|
{
|
||||||
|
"C": "US",
|
||||||
|
"ST": "CA",
|
||||||
|
"L": "San Francisco",
|
||||||
|
"OU": "Nomad Demo"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
|
|
@ -0,0 +1,5 @@
|
||||||
|
-----BEGIN EC PRIVATE KEY-----
|
||||||
|
MHcCAQEEIKsrq20VeBrZ0VOqMJSvvU6E+w7RAbUR7D5RkZSgNKJQoAoGCCqGSM49
|
||||||
|
AwEHoUQDQgAEn/hg7ktoFRazpDTMTkN1mEJoCo/wJOlI7XD98WE1wr6U/4q0Wh9F
|
||||||
|
YuNyfCb2rK2nSrLKra/1R+z3Q+trXJt2cQ==
|
||||||
|
-----END EC PRIVATE KEY-----
|
|
@ -0,0 +1,9 @@
|
||||||
|
-----BEGIN CERTIFICATE REQUEST-----
|
||||||
|
MIIBRjCB7AIBADBfMQswCQYDVQQGEwJVUzELMAkGA1UECBMCQ0ExFjAUBgNVBAcT
|
||||||
|
DVNhbiBGcmFuY2lzY28xEzARBgNVBAsTCk5vbWFkIERlbW8xFjAUBgNVBAMTDWV4
|
||||||
|
YW1wbGUubm9tYWQwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAASf+GDuS2gVFrOk
|
||||||
|
NMxOQ3WYQmgKj/Ak6UjtcP3xYTXCvpT/irRaH0Vi43J8JvasradKssqtr/VH7PdD
|
||||||
|
62tcm3ZxoCswKQYJKoZIhvcNAQkOMRwwGjAYBgNVHREEETAPgg1leGFtcGxlLm5v
|
||||||
|
bWFkMAoGCCqGSM49BAMCA0kAMEYCIQDP+rv/peK1JGFzXOzdLmfjjEg2vOFWGccz
|
||||||
|
iAy63lDurgIhAIF//KajKrghaC1JXmsrqnVHuP40KZLOcAv54Q4PgH1h
|
||||||
|
-----END CERTIFICATE REQUEST-----
|
|
@ -0,0 +1,13 @@
|
||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIICAzCCAaigAwIBAgIUN0nEio761fu7oRc04wRmlxxY3gowCgYIKoZIzj0EAwIw
|
||||||
|
XzELMAkGA1UEBhMCVVMxCzAJBgNVBAgTAkNBMRYwFAYDVQQHEw1TYW4gRnJhbmNp
|
||||||
|
c2NvMRMwEQYDVQQLEwpOb21hZCBEZW1vMRYwFAYDVQQDEw1leGFtcGxlLm5vbWFk
|
||||||
|
MB4XDTE4MDEwOTE4MDgwMFoXDTIzMDEwODE4MDgwMFowXzELMAkGA1UEBhMCVVMx
|
||||||
|
CzAJBgNVBAgTAkNBMRYwFAYDVQQHEw1TYW4gRnJhbmNpc2NvMRMwEQYDVQQLEwpO
|
||||||
|
b21hZCBEZW1vMRYwFAYDVQQDEw1leGFtcGxlLm5vbWFkMFkwEwYHKoZIzj0CAQYI
|
||||||
|
KoZIzj0DAQcDQgAEn/hg7ktoFRazpDTMTkN1mEJoCo/wJOlI7XD98WE1wr6U/4q0
|
||||||
|
Wh9FYuNyfCb2rK2nSrLKra/1R+z3Q+trXJt2caNCMEAwDgYDVR0PAQH/BAQDAgEG
|
||||||
|
MA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFKaOK4q82ysmZ7dYMhjbZyphHxx3
|
||||||
|
MAoGCCqGSM49BAMCA0kAMEYCIQCLoeQKyg1PsyMzETrw3pBA3H3wXU81peHT1t74
|
||||||
|
R63a2gIhALIeUT188aOaLtUMgPaWd7wE14BDhSpLp602jVGCNFkH
|
||||||
|
-----END CERTIFICATE-----
|
|
@ -0,0 +1,12 @@
|
||||||
|
{
|
||||||
|
"signing": {
|
||||||
|
"default": {
|
||||||
|
"expiry": "87600h",
|
||||||
|
"usages": [
|
||||||
|
"signing",
|
||||||
|
"key encipherment",
|
||||||
|
"client auth"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
|
@ -0,0 +1,13 @@
|
||||||
|
{
|
||||||
|
"signing": {
|
||||||
|
"default": {
|
||||||
|
"expiry": "87600h",
|
||||||
|
"usages": [
|
||||||
|
"signing",
|
||||||
|
"key encipherment",
|
||||||
|
"server auth",
|
||||||
|
"client auth"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
|
@ -0,0 +1,5 @@
|
||||||
|
-----BEGIN EC PRIVATE KEY-----
|
||||||
|
MHcCAQEEIGCce4MNcD+MHx1hQWOARCLQWCPJVhWzrAiI1QV7ftYKoAoGCCqGSM49
|
||||||
|
AwEHoUQDQgAEDotF3nv9Stt9Zp5sBv3BNk4936BFBH6eyGAIULRlqSJQUrbc97cf
|
||||||
|
hcdwrVU0hDJcM98Bpd0R3OhqU7j86rc0FQ==
|
||||||
|
-----END EC PRIVATE KEY-----
|
|
@ -0,0 +1,9 @@
|
||||||
|
-----BEGIN CERTIFICATE REQUEST-----
|
||||||
|
MIIBRDCB6wIBADBHMQswCQYDVQQGEwJVUzELMAkGA1UECBMCQ0ExFjAUBgNVBAcT
|
||||||
|
DVNhbiBGcmFuY2lzY28xEzARBgNVBAsTCk5vbWFkIERlbW8wWTATBgcqhkjOPQIB
|
||||||
|
BggqhkjOPQMBBwNCAAQOi0Xee/1K231mnmwG/cE2Tj3foEUEfp7IYAhQtGWpIlBS
|
||||||
|
ttz3tx+Fx3CtVTSEMlwz3wGl3RHc6GpTuPzqtzQVoEIwQAYJKoZIhvcNAQkOMTMw
|
||||||
|
MTAvBgNVHREEKDAmghNjbGllbnQuZ2xvYmFsLm5vbWFkgglsb2NhbGhvc3SHBH8A
|
||||||
|
AAEwCgYIKoZIzj0EAwIDSAAwRQIgRr+uu2A1NPkhso3QFWuq9IFf8eCkU6yzkmJI
|
||||||
|
9R7JZRQCIQDTj2mN3OqJAl1LsMRc2rmD1J7Fp+GvnGmSDT4fcdQ9zA==
|
||||||
|
-----END CERTIFICATE REQUEST-----
|
|
@ -0,0 +1,15 @@
|
||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIICWjCCAgCgAwIBAgIUDYX/mI1EZQPtc/6kc7Kv2epWDwQwCgYIKoZIzj0EAwIw
|
||||||
|
XzELMAkGA1UEBhMCVVMxCzAJBgNVBAgTAkNBMRYwFAYDVQQHEw1TYW4gRnJhbmNp
|
||||||
|
c2NvMRMwEQYDVQQLEwpOb21hZCBEZW1vMRYwFAYDVQQDEw1leGFtcGxlLm5vbWFk
|
||||||
|
MB4XDTE4MDEwOTE4MDgwMFoXDTI4MDEwNzE4MDgwMFowRzELMAkGA1UEBhMCVVMx
|
||||||
|
CzAJBgNVBAgTAkNBMRYwFAYDVQQHEw1TYW4gRnJhbmNpc2NvMRMwEQYDVQQLEwpO
|
||||||
|
b21hZCBEZW1vMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDotF3nv9Stt9Zp5s
|
||||||
|
Bv3BNk4936BFBH6eyGAIULRlqSJQUrbc97cfhcdwrVU0hDJcM98Bpd0R3OhqU7j8
|
||||||
|
6rc0FaOBsTCBrjAOBgNVHQ8BAf8EBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEG
|
||||||
|
CCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFO2ys/83g7JgjwZf5KY4
|
||||||
|
nOQojbV1MB8GA1UdIwQYMBaAFKaOK4q82ysmZ7dYMhjbZyphHxx3MC8GA1UdEQQo
|
||||||
|
MCaCE2NsaWVudC5nbG9iYWwubm9tYWSCCWxvY2FsaG9zdIcEfwAAATAKBggqhkjO
|
||||||
|
PQQDAgNIADBFAiEAu+R+nZv0QXbo5c+vEA+b8wryMWqK9TSkMZmh/BwMriwCIHIJ
|
||||||
|
o/vUarVvgFLy+9ZITDYgtQxMWGLjm8brPyDiXNEA
|
||||||
|
-----END CERTIFICATE-----
|
|
@ -0,0 +1,10 @@
|
||||||
|
{
|
||||||
|
"names": [
|
||||||
|
{
|
||||||
|
"C": "US",
|
||||||
|
"ST": "CA",
|
||||||
|
"L": "San Francisco",
|
||||||
|
"OU": "Nomad Demo"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
|
@ -0,0 +1,5 @@
|
||||||
|
-----BEGIN EC PRIVATE KEY-----
|
||||||
|
MHcCAQEEIJ/MkDicoe6ohduiDoGOwqGXlk2V13fZBwKRB8Ns+2hkoAoGCCqGSM49
|
||||||
|
AwEHoUQDQgAEmjMddkSmrwZ5qamlGgn0NpbV09qvhAFmaBtawpGXa3LlPzvauHfm
|
||||||
|
lRcSEzHzkS1M6NT5eAKjJG8yojGHR78cXQ==
|
||||||
|
-----END EC PRIVATE KEY-----
|
|
@ -0,0 +1,10 @@
|
||||||
|
-----BEGIN CERTIFICATE REQUEST-----
|
||||||
|
MIIBWTCCAQACAQAwRzELMAkGA1UEBhMCVVMxCzAJBgNVBAgTAkNBMRYwFAYDVQQH
|
||||||
|
Ew1TYW4gRnJhbmNpc2NvMRMwEQYDVQQLEwpOb21hZCBEZW1vMFkwEwYHKoZIzj0C
|
||||||
|
AQYIKoZIzj0DAQcDQgAEmjMddkSmrwZ5qamlGgn0NpbV09qvhAFmaBtawpGXa3Ll
|
||||||
|
PzvauHfmlRcSEzHzkS1M6NT5eAKjJG8yojGHR78cXaBXMFUGCSqGSIb3DQEJDjFI
|
||||||
|
MEYwRAYDVR0RBD0wO4ITc2VydmVyLmdsb2JhbC5ub21hZIITY2xpZW50Lmdsb2Jh
|
||||||
|
bC5ub21hZIIJbG9jYWxob3N0hwR/AAABMAoGCCqGSM49BAMCA0cAMEQCIEPHMv5p
|
||||||
|
xoNybtEQVprQrq5ymLX3rm1ZMkjH0EiJjk/AAiAsM2DTQtK8LnL0YKVbbmBNBX5g
|
||||||
|
1JQeTRt/kW7yKq0OeA==
|
||||||
|
-----END CERTIFICATE REQUEST-----
|
|
@ -0,0 +1,16 @@
|
||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIICbjCCAhWgAwIBAgIUc5S8QB/Kai23mJkU23YD4hoO7zkwCgYIKoZIzj0EAwIw
|
||||||
|
XzELMAkGA1UEBhMCVVMxCzAJBgNVBAgTAkNBMRYwFAYDVQQHEw1TYW4gRnJhbmNp
|
||||||
|
c2NvMRMwEQYDVQQLEwpOb21hZCBEZW1vMRYwFAYDVQQDEw1leGFtcGxlLm5vbWFk
|
||||||
|
MB4XDTE4MDEwOTE4MDgwMFoXDTI4MDEwNzE4MDgwMFowRzELMAkGA1UEBhMCVVMx
|
||||||
|
CzAJBgNVBAgTAkNBMRYwFAYDVQQHEw1TYW4gRnJhbmNpc2NvMRMwEQYDVQQLEwpO
|
||||||
|
b21hZCBEZW1vMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEmjMddkSmrwZ5qaml
|
||||||
|
Ggn0NpbV09qvhAFmaBtawpGXa3LlPzvauHfmlRcSEzHzkS1M6NT5eAKjJG8yojGH
|
||||||
|
R78cXaOBxjCBwzAOBgNVHQ8BAf8EBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEG
|
||||||
|
CCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFBng/OMDB+a/pXc07ZYb
|
||||||
|
I6OODU5ZMB8GA1UdIwQYMBaAFKaOK4q82ysmZ7dYMhjbZyphHxx3MEQGA1UdEQQ9
|
||||||
|
MDuCE3NlcnZlci5nbG9iYWwubm9tYWSCE2NsaWVudC5nbG9iYWwubm9tYWSCCWxv
|
||||||
|
Y2FsaG9zdIcEfwAAATAKBggqhkjOPQQDAgNHADBEAiAKiyqdAvtQewpuEXLU2VuP
|
||||||
|
Ifdn+7XK82AoTjOW/BbB0gIgNLusqAft2j7mqDT/LNpUTsl6E7O068METh4I9JlT
|
||||||
|
nEQ=
|
||||||
|
-----END CERTIFICATE-----
|
|
@ -0,0 +1,5 @@
|
||||||
|
-----BEGIN EC PRIVATE KEY-----
|
||||||
|
MHcCAQEEIP5t9f7rjG4tWmGaDkfIul+OiMEcCOp4aK9oOGQPFcv3oAoGCCqGSM49
|
||||||
|
AwEHoUQDQgAErP0oL1Eo7dnxsUbaM0O1zTa2XLQTQrt8sfYQKuSxq5f1w3GxgUYJ
|
||||||
|
wHEpQRK34cNfvZZ1piAde/wBK8rAKCzhoQ==
|
||||||
|
-----END EC PRIVATE KEY-----
|
|
@ -0,0 +1,9 @@
|
||||||
|
-----BEGIN CERTIFICATE REQUEST-----
|
||||||
|
MIIBRTCB6wIBADBHMQswCQYDVQQGEwJVUzELMAkGA1UECBMCQ0ExFjAUBgNVBAcT
|
||||||
|
DVNhbiBGcmFuY2lzY28xEzARBgNVBAsTCk5vbWFkIERlbW8wWTATBgcqhkjOPQIB
|
||||||
|
BggqhkjOPQMBBwNCAASs/SgvUSjt2fGxRtozQ7XNNrZctBNCu3yx9hAq5LGrl/XD
|
||||||
|
cbGBRgnAcSlBErfhw1+9lnWmIB17/AErysAoLOGhoEIwQAYJKoZIhvcNAQkOMTMw
|
||||||
|
MTAvBgNVHREEKDAmghNzZXJ2ZXIuZ2xvYmFsLm5vbWFkgglsb2NhbGhvc3SHBH8A
|
||||||
|
AAEwCgYIKoZIzj0EAwIDSQAwRgIhAMpGeIRtFaCxn2Yp8EqRgRT3OnECUv6Mi4+d
|
||||||
|
Hwn42L2UAiEAzISsF4+Dkemn6KRrOXTv7Anam8fTeoAdqokWV3j4ELQ=
|
||||||
|
-----END CERTIFICATE REQUEST-----
|
|
@ -0,0 +1,15 @@
|
||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIICWjCCAgCgAwIBAgIUJSWExbHzjFPPc/1Eiod55vk+11IwCgYIKoZIzj0EAwIw
|
||||||
|
XzELMAkGA1UEBhMCVVMxCzAJBgNVBAgTAkNBMRYwFAYDVQQHEw1TYW4gRnJhbmNp
|
||||||
|
c2NvMRMwEQYDVQQLEwpOb21hZCBEZW1vMRYwFAYDVQQDEw1leGFtcGxlLm5vbWFk
|
||||||
|
MB4XDTE4MDEwOTE4MDgwMFoXDTI4MDEwNzE4MDgwMFowRzELMAkGA1UEBhMCVVMx
|
||||||
|
CzAJBgNVBAgTAkNBMRYwFAYDVQQHEw1TYW4gRnJhbmNpc2NvMRMwEQYDVQQLEwpO
|
||||||
|
b21hZCBEZW1vMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAErP0oL1Eo7dnxsUba
|
||||||
|
M0O1zTa2XLQTQrt8sfYQKuSxq5f1w3GxgUYJwHEpQRK34cNfvZZ1piAde/wBK8rA
|
||||||
|
KCzhoaOBsTCBrjAOBgNVHQ8BAf8EBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEG
|
||||||
|
CCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFLK3byFY7RGvoyYtJ9sM
|
||||||
|
DUKbriNRMB8GA1UdIwQYMBaAFKaOK4q82ysmZ7dYMhjbZyphHxx3MC8GA1UdEQQo
|
||||||
|
MCaCE3NlcnZlci5nbG9iYWwubm9tYWSCCWxvY2FsaG9zdIcEfwAAATAKBggqhkjO
|
||||||
|
PQQDAgNIADBFAiB7aohsv0AOs7dnL9zrUNoeU6/B90+BntrRtk8+NHTpnQIhAL7W
|
||||||
|
EpQ9vbAxQ/FouOPC5lLd94yYkMbbUmoke3H2vKkd
|
||||||
|
-----END CERTIFICATE-----
|
|
@ -0,0 +1,11 @@
|
||||||
|
tls {
|
||||||
|
http = true
|
||||||
|
rpc = true
|
||||||
|
|
||||||
|
ca_file = "ca.pem"
|
||||||
|
cert_file = "client.pem"
|
||||||
|
key_file = "client-key.pem"
|
||||||
|
|
||||||
|
verify_server_hostname = true
|
||||||
|
verify_https_client = true
|
||||||
|
}
|
|
@ -0,0 +1,11 @@
|
||||||
|
tls {
|
||||||
|
http = true
|
||||||
|
rpc = true
|
||||||
|
|
||||||
|
ca_file = "ca.pem"
|
||||||
|
cert_file = "dev.pem"
|
||||||
|
key_file = "dev-key.pem"
|
||||||
|
|
||||||
|
verify_server_hostname = true
|
||||||
|
verify_https_client = true
|
||||||
|
}
|
|
@ -0,0 +1,11 @@
|
||||||
|
tls {
|
||||||
|
http = true
|
||||||
|
rpc = true
|
||||||
|
|
||||||
|
ca_file = "ca.pem"
|
||||||
|
cert_file = "server.pem"
|
||||||
|
key_file = "server-key.pem"
|
||||||
|
|
||||||
|
verify_server_hostname = true
|
||||||
|
verify_https_client = true
|
||||||
|
}
|
|
@ -0,0 +1,5 @@
|
||||||
|
-----BEGIN EC PRIVATE KEY-----
|
||||||
|
MHcCAQEEILshv6hNINiqJk7iPOBr1rL519YdPah78vK/uTrJm+eYoAoGCCqGSM49
|
||||||
|
AwEHoUQDQgAES0uuEUedpQxKop5YTUgtywlx7vWJ5dN5PTa2MRoccEhKTVTg1IxW
|
||||||
|
S8OJxffyTIYXxAtTiDA4JVStchBf1rl2LQ==
|
||||||
|
-----END EC PRIVATE KEY-----
|
|
@ -0,0 +1,8 @@
|
||||||
|
-----BEGIN CERTIFICATE REQUEST-----
|
||||||
|
MIIBATCBqQIBADBHMQswCQYDVQQGEwJVUzELMAkGA1UECBMCQ0ExFjAUBgNVBAcT
|
||||||
|
DVNhbiBGcmFuY2lzY28xEzARBgNVBAsTCk5vbWFkIERlbW8wWTATBgcqhkjOPQIB
|
||||||
|
BggqhkjOPQMBBwNCAARLS64RR52lDEqinlhNSC3LCXHu9Ynl03k9NrYxGhxwSEpN
|
||||||
|
VODUjFZLw4nF9/JMhhfEC1OIMDglVK1yEF/WuXYtoAAwCgYIKoZIzj0EAwIDRwAw
|
||||||
|
RAIgL01k8EVmO9UBLTa5VDTzPmmOBJuB2GAL7KIUc20BVnQCIFNUx7+KblsI6E5Q
|
||||||
|
qOIZN1QUMPCGedKufHQvZJ9iX5S3
|
||||||
|
-----END CERTIFICATE REQUEST-----
|
|
@ -0,0 +1,14 @@
|
||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIICHjCCAcOgAwIBAgIUeB9kcy9/5oLhHCm0PmBiBe6pybwwCgYIKoZIzj0EAwIw
|
||||||
|
XzELMAkGA1UEBhMCVVMxCzAJBgNVBAgTAkNBMRYwFAYDVQQHEw1TYW4gRnJhbmNp
|
||||||
|
c2NvMRMwEQYDVQQLEwpOb21hZCBEZW1vMRYwFAYDVQQDEw1leGFtcGxlLm5vbWFk
|
||||||
|
MB4XDTE4MDEwOTE4MDgwMFoXDTI4MDEwNzE4MDgwMFowRzELMAkGA1UEBhMCVVMx
|
||||||
|
CzAJBgNVBAgTAkNBMRYwFAYDVQQHEw1TYW4gRnJhbmNpc2NvMRMwEQYDVQQLEwpO
|
||||||
|
b21hZCBEZW1vMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAES0uuEUedpQxKop5Y
|
||||||
|
TUgtywlx7vWJ5dN5PTa2MRoccEhKTVTg1IxWS8OJxffyTIYXxAtTiDA4JVStchBf
|
||||||
|
1rl2LaN1MHMwDgYDVR0PAQH/BAQDAgWgMBMGA1UdJQQMMAoGCCsGAQUFBwMCMAwG
|
||||||
|
A1UdEwEB/wQCMAAwHQYDVR0OBBYEFIjrKUYag+vlAh5h1eJwhsdekvgGMB8GA1Ud
|
||||||
|
IwQYMBaAFKaOK4q82ysmZ7dYMhjbZyphHxx3MAoGCCqGSM49BAMCA0kAMEYCIQC6
|
||||||
|
AZ/eZTHXKOU1sxLTRsK3FHn88DKBqXhHJG/2rbMWEwIhALCC5fi/lTP1lB/EDm1E
|
||||||
|
j4gRnSu3V03XWZhK6QcdQhr1
|
||||||
|
-----END CERTIFICATE-----
|
Binary file not shown.
Loading…
Reference in New Issue