Docker image from scratch with ca-certs, non-root user and tmp folder
-
Updated
Nov 1, 2020 - Dockerfile
Docker image from scratch with ca-certs, non-root user and tmp folder
No more SSL errors because of unset REQUESTS_CA_BUNDLE
CA Certificates for EvroTrust bulgarian eID issuer
This is a demo for How to add CA root certification (self-signed) use openssl and update-ca-certificates(or update-ca-trust)
Dockerfile that updates a ca-certificates volume from the acme.json file generated by Traefik
docker base image that contains only the root ca-certs.
Install and configure ca-certificates using Ansible.
Simple Ethernet WebServer, HTTP/HTTPS Client wrapper library for ESP32_S2, S3 and C3 boards using ENC28J60 with LwIP Ethernet library. The WebServer supports HTTP(S) GET and POST requests, provides argument parsing, handles one client at a time. It provides HTTP(S), MQTT(S) Client and supports WebServer serving from LittleFS/SPIFFS
Ansible role which installs ca-certificates and adds CommisSign certificates to the trusted CAs list - Repository mirror - development takes place on code.europa.eu
CA Certificates for InfoNotary bulgarian eID issuer
CA Certificates for SEP Bulgaria bulgarian eID issuer
docker scratch image with ca-certificates.crt from ubuntu based images
CA Certificates for StampIT bulgarian eID issuer
CA Certificates for B-Trust bulgarian eID issuer
CA Certificates for Bulgarian trusted service providers - metapackage
Node package to find the OS-installed root CA certificates. This uses the same location list as golang
Open Badges Certification
Dockerfile that provides a volume of ca-certificates updated weekly
Certainty-js: Automated CACert.pem Management for Node.js Software
Add a description, image, and links to the ca-certificates topic page so that developers can more easily learn about it.
To associate your repository with the ca-certificates topic, visit your repo's landing page and select "manage topics."