Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/rurumimic/no-check-certificate
When your SSL/TLS is blocked
https://github.com/rurumimic/no-check-certificate
centos certificates damn snap ssl tls ubuntu vagrant
Last synced: 6 days ago
JSON representation
When your SSL/TLS is blocked
- Host: GitHub
- URL: https://github.com/rurumimic/no-check-certificate
- Owner: rurumimic
- Created: 2021-02-04T04:18:09.000Z (almost 4 years ago)
- Default Branch: main
- Last Pushed: 2024-02-23T11:55:10.000Z (9 months ago)
- Last Synced: 2024-04-23T13:56:13.900Z (7 months ago)
- Topics: centos, certificates, damn, snap, ssl, tls, ubuntu, vagrant
- Language: Shell
- Homepage:
- Size: 21.5 KB
- Stars: 1
- Watchers: 3
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# no-check-certificate
How to trust **SELF SIGNED certificates**
- [Before You Begin](#before-you-begin)
- [Usage](#usage): Ubuntu, CentOS
- [Configurations](#configurations): Change a directory
- [Test](#test)
- curl
- snap
- [Manual](#manual)
- Ubuntu 20.04
- CentOS 7
- Other
- [Linux Documentations Link](docs/README.md)
- [File format](docs/fileformat.md)---
## Before You Begin
1. Create a directory named `certs`.
1. Append: [.gitignore](ubuntu/focal64/certs/.gitignore)
1. Save your certificates files in `certs`.---
## Usage
1. Add lines to `Vagrantfile`
1. Run vagrant: `vagrant up`### Ubuntu 20.04
```ruby
config.vm.provision "shell" do |s|
s.path = "https://raw.githubusercontent.com/rurumimic/no-check-certificate/main/ubuntu/focal64/update-certs.sh"
end
```### CentOS 7
```ruby
config.vm.provision "shell" do |s|
s.path = "https://raw.githubusercontent.com/rurumimic/no-check-certificate/main/centos/7/update-certs.sh"
end
```---
## Configurations
`args`: `/vagrant/certs` in guest is default.
### Ubuntu 20.04
```ruby
config.vm.provision "shell" do |s|
s.path = "https://raw.githubusercontent.com/rurumimic/no-check-certificate/main/ubuntu/focal64/update-certs.sh"
s.args = ["/custom/cert/path"]
endconfig.vm.provision "shell" do |s|
s.path = "update-certs.sh"
endconfig.vm.provision "shell" do |s|
s.path = "update-certs.sh"
s.args = ["/custom/cert/path"]
end
```### CentOS 7
```ruby
config.vm.provision "shell" do |s|
s.path = "https://raw.githubusercontent.com/rurumimic/no-check-certificate/main/centos/7/update-certs.sh"
s.args = ["/custom/cert/path"]
endconfig.vm.provision "shell" do |s|
s.path = "update-certs.sh"
endconfig.vm.provision "shell" do |s|
s.path = "update-certs.sh"
s.args = ["/custom/cert/path"]
end
```---
## Test
### CURL
```bash
curl -I https://example.comHTTP/1.1 200 OK
```### Ubuntu Snap
```bash
sudo snap install hello-world
hello-worldHello World!
```---
## Manual
Location of your `.crt` files:
```bash
SOURCE_DIR=/path/to/dir
# In this project:
# SOURCE_DIR=/vagrant/certs
```### Ubuntu 20.04
Update CA certificates:
```bash
sudo mkdir /usr/local/share/ca-certificates/my-certs
sudo cp ${SOURCE_DIR}/*.crt /usr/local/share/ca-certificates/my-certs
sudo update-ca-certificates
```Output:
```bash
Updating certificates in /etc/ssl/certs...
1 added, 0 removed; done.
Running hooks in /etc/ca-certificates/update.d...
done.
```Verify:
```bash
diff --unchanged-group-format='@@ %dn,%df
%<' --old-group-format='' --new-group-format='' --changed-group-format='' \
/etc/ssl/certs/ca-certificates.crt ${SOURCE_DIR}/*.crt
```Output:
```bash
@@ 21,3503
-----BEGIN CERTIFICATE-----
# ...
-----END CERTIFICATE-----
```#### Snap
Store certificates in Snapd’s trusted certificates pool:
```bash
sudo snap set system store-certs.cert0="$(sed -e 's/\r//g' ${SOURCE_DIR}/YOUR_CERT_1.crt)"
sudo snap set system store-certs.cert1="$(sed -e 's/\r//g' ${SOURCE_DIR}/YOUR_CERT_2.crt)"
```### CentOS 7
Update CA certificates:
```bash
sudo cp ${SOURCE_DIR}/*.crt /usr/share/pki/ca-trust-source/anchors
sudo update-ca-trust
```Verify:
```bash
trust list | tail -7
```Output:
```bash
pkcs11:id=%aa%94%60%f8%11%e1%bb;type=cert
type: certificate
label: COMPANY
trust: anchor
category: authority
```