mirror of
https://github.com/taigrr/nats.docs
synced 2025-01-18 04:03:23 -08:00
move mkcert -CAROOT into it's own section
Explain mkcert -CAROOT separately add link to mkcert doc call out node.js trust store Signed-off-by: Matthias Hanel <mh@synadia.com>
This commit is contained in:
parent
787cf70132
commit
343f9bcb7f
@ -8,7 +8,6 @@ The server can require TLS certificates from a client. When needed, you can use
|
|||||||
> Note: To simplify the common scenario of maintainers looking at the monitoring endpoint, `verify` and `verify_and_map` do not apply to the monitoring port.
|
> Note: To simplify the common scenario of maintainers looking at the monitoring endpoint, `verify` and `verify_and_map` do not apply to the monitoring port.
|
||||||
|
|
||||||
The examples in the following sections make use of the certificates you [generated](../tls.md#Self-Signed-Certificates-for-Testing) locally.
|
The examples in the following sections make use of the certificates you [generated](../tls.md#Self-Signed-Certificates-for-Testing) locally.
|
||||||
For simplicity it is assumed that you copied `rootCA.pem` into the same folder where the certificates are generated in and you start `nats-server`.
|
|
||||||
|
|
||||||
## Validating a Client Certificate
|
## Validating a Client Certificate
|
||||||
|
|
||||||
|
@ -88,7 +88,7 @@ While this works for server and libraries from the NATS eco system, you will exp
|
|||||||
Another option is to configure your system's trust store to include self signed certificate(s).
|
Another option is to configure your system's trust store to include self signed certificate(s).
|
||||||
Which trust store needs to be configured depends on what you are testing.
|
Which trust store needs to be configured depends on what you are testing.
|
||||||
* This may be your OS for server and certain clients.
|
* This may be your OS for server and certain clients.
|
||||||
* The runtime environment for other clients like Java or Python.
|
* The runtime environment for other clients like Java, Python or Node.js.
|
||||||
* Your browser for monitoring endpoints and websockets.
|
* Your browser for monitoring endpoints and websockets.
|
||||||
|
|
||||||
Please check your system's documentation on how to trust a particular self signed certificate.
|
Please check your system's documentation on how to trust a particular self signed certificate.
|
||||||
@ -103,15 +103,14 @@ Meaning, if a client/browser/server connect via tls to `127.0.0.1`, the server n
|
|||||||
|
|
||||||
The simplest way to generate a CA as well as client and server certificates is [mkcert](https://github.com/FiloSottile/mkcert).
|
The simplest way to generate a CA as well as client and server certificates is [mkcert](https://github.com/FiloSottile/mkcert).
|
||||||
This zero config tool generates and installs the CA into your **local** system trust store(s) and makes providing SAN straight forward.
|
This zero config tool generates and installs the CA into your **local** system trust store(s) and makes providing SAN straight forward.
|
||||||
Here is an example:
|
Check it's [documentation](https://github.com/FiloSottile/mkcert/blob/master/README.md) for installation and your system's trust store.
|
||||||
|
Here is a simple example:
|
||||||
|
|
||||||
Generate a CA and output the location of the root CA cert file `rootCA.pem`.
|
Generate a CA as well as a certificate, valid for use by `localhost` and the IP `::1`(`-cert-file` and `-key-file` overwrite default file names).
|
||||||
Next generate a certificate, valid for use by `localhost` and the IP `::1`(`-cert-file` and `-key-file` overwrite default file names).
|
|
||||||
Then start a nats server using the generated certificate.
|
Then start a nats server using the generated certificate.
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
mkcert -install
|
mkcert -install
|
||||||
mkcert -CAROOT
|
|
||||||
mkcert -cert-file server-cert.pem -key-file server-key.pem localhost ::1
|
mkcert -cert-file server-cert.pem -key-file server-key.pem localhost ::1
|
||||||
nats-server --tls --tlscert=server-cert.pem --tlskey=server-key.pem -ms 8222
|
nats-server --tls --tlscert=server-cert.pem --tlskey=server-key.pem -ms 8222
|
||||||
```
|
```
|
||||||
@ -130,6 +129,14 @@ Also add a SAN email for usage as user name in `verify_and_map`.
|
|||||||
mkcert -client -cert-file client-cert.pem -key-file client-key.pem localhost ::1 email@localhost
|
mkcert -client -cert-file client-cert.pem -key-file client-key.pem localhost ::1 email@localhost
|
||||||
```
|
```
|
||||||
|
|
||||||
|
Examples in this document make use of the certificates generated so far.
|
||||||
|
To simplify examples using the CA certificate, copy `rootCA.pem` into the same folder where the certificates were generated.
|
||||||
|
To obtain the CA certificate's location use this command:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
mkcert -CAROOT
|
||||||
|
```
|
||||||
|
|
||||||
Once you are done testing, remove the CA from your **local** system trust store(s).
|
Once you are done testing, remove the CA from your **local** system trust store(s).
|
||||||
|
|
||||||
```
|
```
|
||||||
|
Loading…
x
Reference in New Issue
Block a user