-
Would be great to have support at the S3-Sink connector level to use additional truststore, so that private CA and self-sgined certificates can be trusted.
For instance, using the property `store.u…
-
### Actual Behavior
RD should spin up Lima VM and connect to it after K3s is setup allowing nerdctl to spin up containers on the VM
### Steps to Reproduce
Now install lima using `brew install lima`…
-
Paragraph 6.2.6 of the BRGs allows that Private Keys for CAs are generated by an Issuing CA and then transported to the Subordinate CA:
> If the Issuing CA generated the Private Key on behalf of th…
-
I get this error:
```sh
curl -L --proto '=https' --tlsv1.2 -sSf https://raw.githubusercontent.com/cargo-bins/cargo-binstall/main/install-from-binstall-release.sh | bash …
-
**Describe the bug**
If check has an issue with URL **and** CA bundle on host doing the check contains an expired root certificate, error checking outputs OK.
**To Reproduce**
example: check aga…
-
Hi
```
./cert_tree.py -p /etc/ssl/certs/ca-certificates.crt
File "./cert_tree.py", line 158
postfix = f'[{root.position}]' if position and not root.missing else ''
…
-
```
I'm trying to sign Gitblit's with my own homebrew Root CA, in order to setup a
proper trust chain. I've successfully added the custom-signed CA in Gitblit and
everything seem to work OK, except …
-
Crash seen when running the following CoreCLR test on the mono runtime from the dotnet\runtime repo.
Repro : Command to run individual tests : From the dotnet\runtime repo src\mono\netcore run this c…
-
in https://bugzilla.mozilla.org/show_bug.cgi?id=1539296 @sleevi stated:
Ensuring that the Root CA is a responsible party for the scoping of audit engagements seems like it would be a significant po…
-
### Bug Description
I am using Istio (v1.13.*) in my setup. Also I using [Istio-CSR][1] for assigning self signed certs in my setup using ISTIO.
But while [validating certs][2] in setup I am not…