mirror of
https://github.com/taigrr/nats.docs
synced 2025-01-18 04:03:23 -08:00
move mkcert -CAROOT into it's own section
Explain mkcert -CAROOT separately add link to mkcert doc call out node.js trust store Signed-off-by: Matthias Hanel <mh@synadia.com>
This commit is contained in:
parent
787cf70132
commit
343f9bcb7f
@ -8,7 +8,6 @@ The server can require TLS certificates from a client. When needed, you can use
|
||||
> Note: To simplify the common scenario of maintainers looking at the monitoring endpoint, `verify` and `verify_and_map` do not apply to the monitoring port.
|
||||
|
||||
The examples in the following sections make use of the certificates you [generated](../tls.md#Self-Signed-Certificates-for-Testing) locally.
|
||||
For simplicity it is assumed that you copied `rootCA.pem` into the same folder where the certificates are generated in and you start `nats-server`.
|
||||
|
||||
## Validating a Client Certificate
|
||||
|
||||
|
@ -88,7 +88,7 @@ While this works for server and libraries from the NATS eco system, you will exp
|
||||
Another option is to configure your system's trust store to include self signed certificate(s).
|
||||
Which trust store needs to be configured depends on what you are testing.
|
||||
* This may be your OS for server and certain clients.
|
||||
* The runtime environment for other clients like Java or Python.
|
||||
* The runtime environment for other clients like Java, Python or Node.js.
|
||||
* Your browser for monitoring endpoints and websockets.
|
||||
|
||||
Please check your system's documentation on how to trust a particular self signed certificate.
|
||||
@ -103,15 +103,14 @@ Meaning, if a client/browser/server connect via tls to `127.0.0.1`, the server n
|
||||
|
||||
The simplest way to generate a CA as well as client and server certificates is [mkcert](https://github.com/FiloSottile/mkcert).
|
||||
This zero config tool generates and installs the CA into your **local** system trust store(s) and makes providing SAN straight forward.
|
||||
Here is an example:
|
||||
Check it's [documentation](https://github.com/FiloSottile/mkcert/blob/master/README.md) for installation and your system's trust store.
|
||||
Here is a simple example:
|
||||
|
||||
Generate a CA and output the location of the root CA cert file `rootCA.pem`.
|
||||
Next generate a certificate, valid for use by `localhost` and the IP `::1`(`-cert-file` and `-key-file` overwrite default file names).
|
||||
Generate a CA as well as a certificate, valid for use by `localhost` and the IP `::1`(`-cert-file` and `-key-file` overwrite default file names).
|
||||
Then start a nats server using the generated certificate.
|
||||
|
||||
```bash
|
||||
mkcert -install
|
||||
mkcert -CAROOT
|
||||
mkcert -cert-file server-cert.pem -key-file server-key.pem localhost ::1
|
||||
nats-server --tls --tlscert=server-cert.pem --tlskey=server-key.pem -ms 8222
|
||||
```
|
||||
@ -130,6 +129,14 @@ Also add a SAN email for usage as user name in `verify_and_map`.
|
||||
mkcert -client -cert-file client-cert.pem -key-file client-key.pem localhost ::1 email@localhost
|
||||
```
|
||||
|
||||
Examples in this document make use of the certificates generated so far.
|
||||
To simplify examples using the CA certificate, copy `rootCA.pem` into the same folder where the certificates were generated.
|
||||
To obtain the CA certificate's location use this command:
|
||||
|
||||
```bash
|
||||
mkcert -CAROOT
|
||||
```
|
||||
|
||||
Once you are done testing, remove the CA from your **local** system trust store(s).
|
||||
|
||||
```
|
||||
|
Loading…
x
Reference in New Issue
Block a user