Ryan McGuire
Ryan McGuire
I get `Error: Configuration("no keys found pem file")` when I use an elliptic curve key type (`-----BEGIN EC PRIVATE KEY-----`). But maybe this type of key is not supported by...
oh, nice, that was easy! It looks like this is still pretty early, I can see a list of notes, but when I click on them I can't view them....
I investigated the issue I saw where you couldn't see the notes. The notes list get's a high z-order value of 1070 when the window is not very wide (as...
I've started by defining these: ``` (define-key vterm-mode-map [C-left] 'vterm-send-M-b) (define-key vterm-mode-map [M-left] 'vterm-send-M-b) (define-key vterm-mode-map [C-right] 'vterm-send-M-f) (define-key vterm-mode-map [M-right] 'vterm-send-M-f) (define-key vterm-mode-map [C-up] 'vterm-send-C-p) (define-key vterm-mode-map [C-backspace] 'vterm-send-backspace)...
I have a custom integration with traefik+Let's Encrypt documented here - https://github.com/EnigmaCurry/kubelab On Sun, Jan 6, 2019, 10:04 PM Sonam Samdupkhangsar Does DigitalOcean Kubernetes have the ability to use lets...
``` Compiling sqlx-postgres v0.6.2 (https://github.com/ThibsG/sqlx?branch=postgres-native-tls-fixes#7ffc1330) error[E0063]: missing fields `client_cert_path` and `client_key_path` in initializer of `TlsConfig
I'm testing this with setting PGSSLCERT, PGSSLKEY, and PGSSLROOTCERT environment vars. I'm getting this panic: ``` thread 'main' panicked at 'called `Result::unwrap()` on an `Err` value: Tls(NotPkcs8)', src/main.rs:11:10 ``` [Heres...
FWIW, I'm still getting the same error `Tls(NotPkcs8)` with either EC or RSA keys. There must be something strange about my certs (maybe to do with step-ca vs openssl?), as...
> Try to convert using: `openssl pkcs8 -topk8 -nocrypt -in cc-client-key -out cc-client-key.pk8`. I will test this with your setup tomorrow. That fixed it! :tada: I can confirm this is...
> Rustls support PKCS#1 format. Confirmed! I fixed my script so it outputs keyfiles in both formats, but now its nice to be able to use either one. Thanks again.