Petals Cockpit 0.22.0-SNAPSHOT

compared with
Key
This line was removed.
This word was removed. This word was added.
This line was added.

Changes (5)

View Page History
If you want to handle SSL in cockpit, here's the configuration to add (from [Dropwizard documentation|https://www.dropwizard.io/en/latest/manual/core.html#ssl])
{quote}
SSL support is built into Dropwizard. You will need to provide your own java keystore, which is outside the scope of this document (keytool is the command you need, and [Jetty’s documentation|http://www.eclipse.org/jetty/documentation/current/configuring-ssl.html] can get you started). There is a test keystore you can use in the [Dropwizard example project|https://github.com/dropwizard/dropwizard/tree/master/dropwizard-example].
{quote}

Configure a new keystore with an SSL certificate with keytool :

# Use the following syntax to create the new keystore with a self-signed certificate:
{code}keytool -genkey -alias <alias> -keyalg RSA -keystore <keystore_filename>{code}
# Create a certificate signing request using the following syntax, and then send the certificate request to the Certificate Authority you are using.
{code}keytool -certreq -alias <alias> -keyalg RSA -file <csr_output_file> -keystore <keystore_filename>{code}
Procedure may then vary depending to your Certificate Authority, follow their instructions.
# Depending on the CA you are using you may need to import an intermediate certificate and/or root certificate into your keystore. If you are importing both certificates the alias specified for each certificate should be unique. You need to first import the root certificate, and then run the keytool command again to import the intermediate certificate. Use the following syntax to import one or both of these certificates:
{code}keytool -import -alias <alias> -keystore <keystore_filename> -trustcacerts -file <certificate_filename>{code}
The alias specified must be the same value specified in step 2 when you generated the keystore. The imported certificate will replace the default self-signed certificate created in the keystore.
# You can then check the certificate was successfully added using this command:
{code}keytool -list -v -keystore <keystore_filename>{code}
# Copy the keystore file where Cockpit will be able to access it.
# Add this configuration to cockpit configuration file:
{code}
server:
- type: https
port: 8443
keyStorePath: example.keystore /path/to/your.keystore
keyStorePassword: examplePassword
validateCerts: false
{code}





h3. Using commands