ndpax.blogg.se

Pycharm remote development
Pycharm remote development










pycharm remote development

Sudo su -c 'echo "# /etc/systemd/system//nf ExecStart= ExecStart=/usr/bin/dockerd -H fd:// -tlsverify -tlscacert=/etc/docker/certs/ca.pem -tlscert=/etc/docker/certs/server-cert.pem -tlskey=/etc/docker/certs/server-key.pem -H 0.0.0.0:2376" > /etc/systemd/system//nf'Ĭurl -cert ~/certs/cert.pem -key ~/certs/key.pem -cacert ~/certs/ca.pem # Add system.d override configuration for Docker to start the TCP with TLS port # Moving server certs to their permanent location # Change private and public key permissionsĬhmod -v 0400 ca-key.pem key.pem server-key.pemĬhmod -v 0444 ca.pem server-cert.pem cert.pem Rm -v client.csr server.csr extfile.cnf extfile-client.cnf Openssl x509 -req -days 365 -sha256 -in client.csr -CA ca.pem -CAkey ca-key.pem -CAcreateserial -out cert.pem -extfile extfile-client.cnf Openssl req -subj '/CN=client' -new -key key.pem -out client.csrĮcho extendedKeyUsage = clientAuth > extfile-client.cnf Openssl x509 -req -days 365 -sha256 -in server.csr -CA ca.pem -CAkey ca-key.pem -CAcreateserial -out server-cert.pem -extfile extfile.cnf Openssl req -subj "/CN=assemblyline.local" -sha256 -new -key server-key.pem -out server.csrĮcho subjectAltName = DNS:assemblyline.local,IP: `ip route get 8.8.8.8 | grep 8.8.8.8 | awk '' `,IP:127.0.0.1 > extfile.cnfĮcho extendedKeyUsage = serverAuth > extfile.cnf Openssl req -new -x509 -days 365 -key ca-key.pem -sha256 -out ca.pem -subj "/C=CA/ST=Ontario/L=Ottawa/O=CCCS/CN=assemblyline.local" # Creating the server public/private key Openssl genrsa -aes256 -out ca-key.pem 4096 # Create a certificate-signing request (ignore the. # Create a CA (Remember the password you've set) How-to: Upgrade Service Updater for Assemblyline 4.1+ Adding Assemblyline specific configuration












Pycharm remote development