Hello,
I am using a private CA that provides an ACME interface. I found that I can register and create certs from the CLI using
with a custom URL and setting the HTTPS_CA_FILE environment variable to my root-cert.
However that is not working when requesting the certificate from the UI (and I guess also when auto-renewing)
So far I have tried:
- putting my root-ca into /etc/ssl/certs and running c_rehash - curl works fine with that
- setting the env variable HTTPS_CA_FILE in /etc/profile.d/ca-env.sh (rebooted)
Where can I set environment variables that are honored by the pvedaemon or another way to make him trust my private ca?
Thanks
Peter
I am using a private CA that provides an ACME interface. I found that I can register and create certs from the CLI using
Code:
pvenode acme account register default xx@xx.com
pvenode config set --acme domains=mox.int
pvenode acme cert order --force
with a custom URL and setting the HTTPS_CA_FILE environment variable to my root-cert.
However that is not working when requesting the certificate from the UI (and I guess also when auto-renewing)
Code:
Can't connect to myca.int (certificate verify failed) SSL connect attempt failed error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed at /usr/share/perl5/LWP/Protocol/http.pm line 50
So far I have tried:
- putting my root-ca into /etc/ssl/certs and running c_rehash - curl works fine with that
- setting the env variable HTTPS_CA_FILE in /etc/profile.d/ca-env.sh (rebooted)
Where can I set environment variables that are honored by the pvedaemon or another way to make him trust my private ca?
Thanks
Peter