No rule to make target 'certs/rhel.pem', needed by 'certs/x509_certificate_list',需要置空内核配置文件中的CONFIG_SYSTEM_TRUSTED_KEYS选项:CONFIG_SYSTEM_TRUSTED_KEYS=""即修改linux内核文件的.config文件,查找CONFIG_SYSTEM_TRUSTED_KEYS,然后置空
Generate a new certificate + key, with the server DNS as argument: ./easyvpn request private.vpn.jenkins.io The generated key is in ./cert/pki/private/private.vpn.jenkins.io.key must remain secret! Sign the request as a "server" request: cd ./certs # Running the signing command from ...
Every authority in the PKI is using separate signing keys to sign CRLs Web sites (french only ... sorry) Public web : http://www.gip-cps.fr/ developper web : https://editeurs.gip-cps.fr/ list of root certificate + CRL signers : https://editeurs.gip-cps.fr/index.php?page=x509_...
Generate a new certificate + key, with the server DNS as argument: ./easyvpn request private.vpn.jenkins.io The generated key is in ./cert/pki/private/private.vpn.jenkins.io.key must remain secret! Sign the request as a "server" request: cd ./certs # Running the signing command from ...