On 8/6/20 10:10 AM, Christopher Schultz wrote:

$ openssl pkcs12 -export \ -in /etc/tomcat8/test.foo.net.crt \
-inkey /etc/tomcat8/test.foo.net.key \ -certfile
/etc/tomcat8/test.foo.net.issuer.crt \ -out
/etc/tomcat8/test.foo.net.p12 \ -chain

Then reconfigure your <Certificate> to use your keystore.

Dear Mr. Schultz (et al):

It was a bit of a challenge to find out how to use a PKCS12 keystore in the Certificate clause, but not that difficult. And the "-chain" was not necessary.

At any rate, congratulations, you have just cut my proverbial Gordian knot!

In my case, there's obviously no need for the

curl https://localhost/manager/jmxproxy?invoke=Catalina%3Atype
%3DProtocolHandler%2Cport%3D8443%2Caddress%3D
%22127.0.0.1%22&op=reloadSslHostConfigs

in my renewal script, as given in your presentation, because it's already necessary to shut down Tomcat for the renewal: the known-good procedure for getting a Let's Encrypt on an Amazon Linux (not "2") instance with a Bitnami Trac/SVN stack uses Lego, rather than Certbot, and Lego needs to take over all the ports in order to do its magic (probably why Lego is not as popular as Certbot).

And likewise, since I'm generating a PKCS12 keystore, rather than using the certificate and key files directly, I was able to cut out making local copies of those files, and just reference the ones that Lego put in /opt/trac-1.2.3-11/letsencrypt/certificates/ directly.

--
James H. H. Lampert

---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org

Reply via email to