1. 程式人生 > >linux系統導入證書

linux系統導入證書

rms http col version dom serve like color control

https://blog.csdn.net/fy573060627/article/details/52872740

1.linux 訪問 https 證書問題

[root@kube-node2 ~]# curl https://192.168.0.200:8443
curl: (60) Peers Certificate issuer is not recognized.
More details here: http://curl.haxx.se/docs/sslcerts.html

curl performs SSL certificate verification by default, using a "bundle
" of Certificate Authority (CA) public keys (CA certs). If the default bundle file isnt adequate, you can specify an alternate file using the --cacert option. If this HTTPS server uses a certificate signed by a CA represented in the bundle, the certificate verification probably failed due to a problem with the certificate (it might be expired, or the name might not match the domain name
in the URL). If youd like to turn off curls verification of the certificate, use the -k (or --insecure) option. 2.現有 證書twca.cer 需要添加到 linux 證書信任列表 轉換格式 .cer 到 .pem openssl x509 -inform der -in twca.cer -out twca.pem #追加到信任列表 cat twca.pem >> /etc/pki/tls/certs/ca-bundle.crt [root@kube-node2 k8s]# cd /etc/kubernetes/cert/ [root@kube
-node2 cert]# ls ca-config.json kube-controller-manager-key.pem kubelet-client-current.pem kubernetes-key.pem metrics-server.pem ca-key.pem kube-controller-manager.pem kubelet.crt kubernetes.pem ca.pem kubelet-client-2018-09-11-11-01-24.pem kubelet.key metrics-server-key.pem [root@kube-node2 cert]# cat ca.pem >> /etc/pki/tls/certs/ca-bundle.crt [root@kube-node2 cert]# cat ca-key.pem >> /etc/pki/tls/certs/ca-bundle.crt 3.添加後訪問就不會出現上面錯誤, [root@kube-node2 cert]# curl https://192.168.0.200:8443 { "kind": "Status", "apiVersion": "v1", "metadata": { }, "status": "Failure", "message": "Unauthorized", "reason": "Unauthorized", "code": 401 }[root@kube-node2 cert]#

linux系統導入證書