|
@@ -27,7 +27,7 @@
|
|
|
# openssl genrsa -des3 -out kea-client.key 4096
|
|
|
# openssl req -new -key kea-client.key -out kea-client.csr
|
|
|
# openssl x509 -req -days 365 -in kea-client.csr -CA ca.crt \
|
|
|
-# -CAkey ca.key -set_serial 01 -out kea-client.crt
|
|
|
+# -CAkey ca.key -set_serial 10 -out kea-client.crt
|
|
|
#
|
|
|
# Note that the 'common name' value used when generating the client
|
|
|
# and the server certificates must differ from the value used
|
|
@@ -39,9 +39,20 @@
|
|
|
#
|
|
|
# curl -k --key kea-client.key --cert kea-client.crt -X POST \
|
|
|
# -H Content-Type:application/json -d '{ "command": "list-commands" }' \
|
|
|
-# https://kea.example.org/kea
|
|
|
+# https://kea.example.org
|
|
|
#
|
|
|
+# On some curl running on macOS the crypto library requires a PKCS#12
|
|
|
+# bundle with the private key and the certificate as the cert argument.
|
|
|
+# The PKCS#12 file can be generated by:
|
|
|
#
|
|
|
+# openssl pkcs12 -export -in kea-client.crt -inkey kea-client.key \
|
|
|
+# -out kea-client.p12
|
|
|
+#
|
|
|
+# If the password is kea, curl command becomes:
|
|
|
+#
|
|
|
+# curl -k --cert kea-client.p12:kea -X POST \
|
|
|
+# -H Content-Type:application/json -d '{ "command": "list-commands" }' \
|
|
|
+# https://kea.example.org
|
|
|
#
|
|
|
# nginx configuration starts here.
|
|
|
|
|
@@ -66,10 +77,12 @@ http {
|
|
|
# Enable verification of the client certificate.
|
|
|
ssl_verify_client on;
|
|
|
|
|
|
- # For URLs such as https://kea.example.org/kea, forward the
|
|
|
- # requests to http://127.0.0.1:8080.
|
|
|
- location /kea {
|
|
|
- proxy_pass http://127.0.0.1:8080;
|
|
|
+ # For the URL https://kea.example.org forward the
|
|
|
+ # requests to http://127.0.0.1:8000.
|
|
|
+ # Since kea-shell doesn't currently support URLs with paths we
|
|
|
+ # use location /
|
|
|
+ location / {
|
|
|
+ proxy_pass http://127.0.0.1:8000;
|
|
|
}
|
|
|
}
|
|
|
}
|