DEV Community

tongxi
tongxi

Posted on

openGauss Replacing Certificates

Scenarios
Default security certificates and private keys required for SSL connection are configured in openGauss. You can change them as needed.

Prerequisites
The formal certificates and keys for the server and client have been obtained from the CA.

Precautions
Currently, openGauss supports only the X509v3 certificate in PEM format.

Procedure
Prepare for a certificate and a key.

Conventions for configuration file names on the server:

Certificate name: server.crt
Key name: server.key
Key password and encrypted file: server.key.cipher and server.key.rand
Conventions for configuration file names on the client:

Certificate name: client.crt
Key name: client.key
Key password and encrypted file: client.key.cipher and client.key.rand
Certificate name: cacert.pem
CRL file name: sslcrl-file.crl
Create a compressed package.

Package name: db-cert-replacement.zip

Package format: ZIP

Package file list: server.crt, server.key, server.key.cipher, server.key.rand, client.crt, client.key, client.key.cipher, client.key.rand, cacert.pem If you need to configure the CRL, the list must contain sslcrl-file.crl.

Invoke the certificate replacement interface to replace a certificate.

Upload the prepared package db-cert-replacement.zip to any path of an openGauss user.

For example: /home/xxxx/db-cert-replacement.zip

Run the following command to perform the replacement:

""
gs_om -t cert --cert-file= /home/xxxx/db-cert-replacement.zip
Restart the openGauss.

""
gs_om -t stop
gs_om -t start
NOTE:
Certificates can be rolled back to the version before the replacement. You can run the gs_om -t cert –rollback command to remotely invoke the interface or gs_om -t cert –rollback -L to locally invoke the interface. The certificate will be rolled back to the latest version that was successfully replaced.

Top comments (0)