linux系統導入證書


https://blog.csdn.net/fy573060627/article/details/52872740

1.linux 訪問 https 證書問題

[root@kube-node2 ~]# curl https://192.168.0.200:8443
curl: (60) Peer's Certificate issuer is not recognized.
More details here: http://curl.haxx.se/docs/sslcerts.html

curl performs SSL certificate verification by default, using a "bundle"
 of Certificate Authority (CA) public keys (CA certs). If the default
 bundle file isn't adequate, you can specify an alternate file
 using the --cacert option.
If this HTTPS server uses a certificate signed by a CA represented in
 the bundle, the certificate verification probably failed due to a
 problem with the certificate (it might be expired, or the name might
 not match the domain name in the URL).
If you'd like to turn off curl's verification of the certificate, use
 the -k (or --insecure) option.




2.現有 證書twca.cer 需要添加到 linux 證書信任列表

轉換格式 .cer 到 .pem
openssl x509 -inform der -in twca.cer  -out twca.pem
 
#追加到信任列表
cat twca.pem >> /etc/pki/tls/certs/ca-bundle.crt

[root@kube-node2 k8s]# cd /etc/kubernetes/cert/
[root@kube-node2 cert]# ls
ca-config.json  kube-controller-manager-key.pem         kubelet-client-current.pem  kubernetes-key.pem      metrics-server.pem
ca-key.pem      kube-controller-manager.pem             kubelet.crt                 kubernetes.pem
ca.pem          kubelet-client-2018-09-11-11-01-24.pem  kubelet.key                 metrics-server-key.pem
[root@kube-node2 cert]# cat ca.pem >> /etc/pki/tls/certs/ca-bundle.crt
[root@kube-node2 cert]# cat ca-key.pem >> /etc/pki/tls/certs/ca-bundle.crt




3.添加后訪問就不會出現上面錯誤,


[root@kube-node2 cert]# curl https://192.168.0.200:8443
{
  "kind": "Status",
  "apiVersion": "v1",
  "metadata": {
    
  },
  "status": "Failure",
  "message": "Unauthorized",
  "reason": "Unauthorized",
  "code": 401
}[root@kube-node2 cert]# 

 


免責聲明!

本站轉載的文章為個人學習借鑒使用,本站對版權不負任何法律責任。如果侵犯了您的隱私權益,請聯系本站郵箱yoyou2525@163.com刪除。



 
粵ICP備18138465號   © 2018-2025 CODEPRJ.COM