Difference between revisions of "Certificate Authority Custom"
Jump to navigation
Jump to search
| Line 59: | Line 59: | ||
$rootCa = Get-ChildItem -Path cert:\LocalMachine\My | Where-Object {$_.Subject -eq "CN=My Awesome Root CA"} | $rootCa = Get-ChildItem -Path cert:\LocalMachine\My | Where-Object {$_.Subject -eq "CN=My Awesome Root CA"} | ||
``` | ``` | ||
| + | |||
| + | |||
| + | |||
| + | # more | ||
| + | |||
| + | You could update entire entire trusted CA by doing something like | ||
| + | ``` | ||
| + | internalRootCAs="-----BEGIN CERTIFICATE----- | ||
| + | MIIEYzCCA0ugA ... | ||
| + | -----END CERTIFICATE----- | ||
| + | all my root certs ... | ||
| + | ``` | ||
| + | |||
| + | ``` | ||
| + | mkdir -p myhost-files | ||
| + | curl https://ccadb.my.salesforce-sites.com/mozilla/IncludedRootsPEMTxt?TrustBitsInclude=Websites -o myhost-files/ca-certificates.crt | ||
| + | echo "$internalRootCAs" >> myhost-files/ca-certificates.crt | ||
| + | kubectl create configmap myhost-files --from-file=myhost-files --save-config --dry-run=client -o yaml | kubectl apply -f - | ||
| + | ``` | ||
| + | |||
| + | |||
| + | Update helm chart values.yaml | ||
| + | ``` | ||
| + | extraVolumeMounts: | ||
| + | - mountPath: /etc/ssl/certs/ca-certificates.crt | ||
| + | subPath: ca-certificates.crt | ||
| + | name: myhost-files | ||
| + | # extraVolumes: [] | ||
| + | extraVolumes: | ||
| + | - name: myhost-files | ||
| + | configMap: | ||
| + | name: host-files | ||
| + | ``` | ||
| + | |||
| + | Note that fedora based is in this folder | ||
| + | /etc/pki/ca-trust | ||
Revision as of 23:42, 5 December 2023
Debian
Wipe your existing
curl https://ccadb.my.salesforce-sites.com/mozilla/IncludedRootsPEMTxt?TrustBitsInclude=Websites -o /etc/ssl/certs/ca-certificates.crt
Kubernetes Container & Helm
Get Trusted Store pem
mkdir -p myhost-files curl https://ccadb.my.salesforce-sites.com/mozilla/IncludedRootsPEMTxt?TrustBitsInclude=Websites -o myhost-files/ca-certificates.crt kubectl create configmap myhost-files --from-file=myhost-files --save-config --dry-run=client -o yaml | kubectl apply -f -
Update helm values.yaml
extraVolumeMounts:
- mountPath: /etc/ssl/certs/ca-certificates.crt
subPath: ca-certificates.crt
name: myhost-files
# extraVolumes: []
extraVolumes:
- name: myhost-files
configMap:
name: host-files
Notes
curl https://ccadb.my.salesforce-sites.com/mozilla/IncludedRootsPEMTxt?TrustBitsInclude=Websites -o /etc/ssl/certs/ca-certificates.crt
Then mount the volume to
/etc/ssl/certs/ca-certificates.crt
extraVolumeMounts: [] extraVolumes: []
/etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem
Windows
cd c:\certs\ certutil.exe -generateSSTFromWU roots.sst $sst = ( Get-ChildItem -Path C:\certs\roots.sst ) $sst = ( Get-ChildItem roots.sst ) $sst| Import-Certificate -CertStoreLocation Cert:\LocalMachine\Root
$rootCa = Get-ChildItem -Path cert:\LocalMachine\My | Where-Object {$_.Subject -eq "CN=My Awesome Root CA"}
more
You could update entire entire trusted CA by doing something like
internalRootCAs="-----BEGIN CERTIFICATE----- MIIEYzCCA0ugA ... -----END CERTIFICATE----- all my root certs ...
mkdir -p myhost-files curl https://ccadb.my.salesforce-sites.com/mozilla/IncludedRootsPEMTxt?TrustBitsInclude=Websites -o myhost-files/ca-certificates.crt echo "$internalRootCAs" >> myhost-files/ca-certificates.crt kubectl create configmap myhost-files --from-file=myhost-files --save-config --dry-run=client -o yaml | kubectl apply -f -
Update helm chart values.yaml
extraVolumeMounts:
- mountPath: /etc/ssl/certs/ca-certificates.crt
subPath: ca-certificates.crt
name: myhost-files
# extraVolumes: []
extraVolumes:
- name: myhost-files
configMap:
name: host-files
Note that fedora based is in this folder /etc/pki/ca-trust