mirror of
https://github.com/FiloSottile/mkcert.git
synced 2026-04-25 13:36:02 +03:00
[GH-ISSUE #76] [Question] How to generate a fullchain cert file? #42
Labels
No labels
TLS stack issue
Windows
bug
duplicate
duplicate
enhancement
help wanted
help wanted
pull-request
question
question
root store
waiting for info
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/mkcert#42
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @saicrazyfire on GitHub (Oct 1, 2018).
Original GitHub issue: https://github.com/FiloSottile/mkcert/issues/76
I'm looking to leverage this on internally hosted Home Assistant and they have a Nginx proxy. I want to be able to access the web application via something like "https://hassio.local". I can create the cert and the key with mkcert but the Nginx addon for HA needs the fullchain.
@adamdecaf commented on GitHub (Oct 2, 2018):
There's only the root CA and your leaf certs. When you
mkcert -installit tells you where the CA certificate is.mkcert hassio.localwould then generate the leaf cert and key in the directory you callmkcertfrom.@saicrazyfire commented on GitHub (Oct 2, 2018):
So would it be enough to concatenate rootCA.pem and hassio.pem and have a fullchain.pem? At least from what I could google, the full chain cert is that
@adamdecaf commented on GitHub (Oct 2, 2018):
Yea, looks like the nginx docs mention that.
https://nginx.org/en/docs/http/configuring_https_servers.html#chains
@FiloSottile commented on GitHub (Jan 6, 2019):
Since mkcert does not generate intermediate CAs, you should be able to use the certificate alone as "fullchain". If not, you just need to concatenate the file in
$(mkcert -CAROOT)/rootCA.pem, but browsers don't need the root to be sent to them.@BarnabasSzabolcs commented on GitHub (Oct 24, 2019):
Unfortunately it looks like python's requests needs it.
@FiloSottile commented on GitHub (Oct 24, 2019):
Should be as simple as
@BarnabasSzabolcs commented on GitHub (Oct 25, 2019):
Thanks a bunch, Filo!
@emahuni commented on GitHub (Nov 8, 2019):
That's not the fullchain, that's just the chain. Fullchain is the cert.pem at the top + the chain at the bottom.
See #214 for the correct way of generating these files. I do this all the time developing SIP technologies that need SSL. They require these kind of files.
https://community.letsencrypt.org/t/public-and-private-keys/25493/3?u=emahuni