Skip to content

Commit

Permalink
Updating docs for mkcert
Browse files Browse the repository at this point in the history
  • Loading branch information
konstructcarrie committed Nov 26, 2024
1 parent de02729 commit 5c8dd19
Show file tree
Hide file tree
Showing 112 changed files with 4,949 additions and 168 deletions.
18 changes: 18 additions & 0 deletions docs/akamai/quick-start/install/cli.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -38,6 +38,24 @@ export const TabLabel = ({ imgSrc, label, alt }) => (

<TabItem attributes={{ className: styles.github }} value="github" label={ <GitHubLogo /> }>
<GitHubPrerequisites />
### Install the CA (Certificate Authority) of mkcert in your trusted store

Check failure on line 41 in docs/akamai/quick-start/install/cli.mdx

View workflow job for this annotation

GitHub Actions / check-markdown (.mdx, **.mdx, mdx.markdownlint.json)

Headings should be surrounded by blank lines

docs/akamai/quick-start/install/cli.mdx:41 MD022/blanks-around-headings Headings should be surrounded by blank lines [Expected: 1; Actual: 0; Above] [Context: "### Install the CA (Certificate Authority) of mkcert in your trusted store"] https://github.com/DavidAnson/markdownlint/blob/v0.33.0/doc/md022.md

We use [mkcert](https://github.com/FiloSottile/mkcert) to generate local certificates and serve `https` with the Traefik Ingress Controller. During the installation, Kubefirst generates these certificates and pushes them to Kubernetes as secrets to attach to Ingress resources.

To allow the applications running in your Kubefirst platform in addition to your browser to trust the certificates generated by your Kubefirst local install, you need to install the CA (Certificate Authority) of mkcert in your trusted store. To do so, follow these simple steps:

```shell

Check failure on line 47 in docs/akamai/quick-start/install/cli.mdx

View workflow job for this annotation

GitHub Actions / check-markdown (.mdx, **.mdx, mdx.markdownlint.json)

Code block style

docs/akamai/quick-start/install/cli.mdx:47 MD046/code-block-style Code block style [Expected: indented; Actual: fenced] https://github.com/DavidAnson/markdownlint/blob/v0.33.0/doc/md046.md
brew install mkcert
mkcert -install
```

This is not an optional step: the cluster creation will fail if you don't install the mkcert CA in your trusted store.

If you are using Firefox, you have one more step: you need to install the [Network Security Services](https://firefox-source-docs.mozilla.org/security/nss/index.html) (NSS):

```shell

Check failure on line 56 in docs/akamai/quick-start/install/cli.mdx

View workflow job for this annotation

GitHub Actions / check-markdown (.mdx, **.mdx, mdx.markdownlint.json)

Code block style

docs/akamai/quick-start/install/cli.mdx:56 MD046/code-block-style Code block style [Expected: indented; Actual: fenced] https://github.com/DavidAnson/markdownlint/blob/v0.33.0/doc/md046.md
brew install nss
```

Check failure on line 58 in docs/akamai/quick-start/install/cli.mdx

View workflow job for this annotation

GitHub Actions / check-markdown (.mdx, **.mdx, mdx.markdownlint.json)

Fenced code blocks should be surrounded by blank lines

docs/akamai/quick-start/install/cli.mdx:58 MD031/blanks-around-fences Fenced code blocks should be surrounded by blank lines [Context: "```"] https://github.com/DavidAnson/markdownlint/blob/v0.33.0/doc/md031.md
<GitHubClusterCreateCmd />
<CommonTerminalOutput cloud="Akamai" minutes="10" handoffScreen={GitHubHandoffScreen} />
</TabItem>
Expand Down
36 changes: 36 additions & 0 deletions docs/aws/quick-start/install/cli.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -37,11 +37,47 @@ export const TabLabel = ({ imgSrc, label, alt }) => (
<Tabs groupId="git_provider" defaultValue="github" queryString>
<TabItem attributes={{ className: styles.github }} value="github" label={ <GitHubLogo /> }>
<GitHubPrerequisites />
### Install the CA (Certificate Authority) of mkcert in your trusted store

We use [mkcert](https://github.com/FiloSottile/mkcert) to generate local certificates and serve `https` with the Traefik Ingress Controller. During the installation, Kubefirst generates these certificates and pushes them to Kubernetes as secrets to attach to Ingress resources.

To allow the applications running in your Kubefirst platform in addition to your browser to trust the certificates generated by your Kubefirst local install, you need to install the CA (Certificate Authority) of mkcert in your trusted store. To do so, follow these simple steps:

```shell
brew install mkcert
mkcert -install
```

This is not an optional step: the cluster creation will fail if you don't install the mkcert CA in your trusted store.

If you are using Firefox, you have one more step: you need to install the [Network Security Services](https://firefox-source-docs.mozilla.org/security/nss/index.html) (NSS):

```shell
brew install nss
```

Check failure on line 57 in docs/aws/quick-start/install/cli.mdx

View workflow job for this annotation

GitHub Actions / check-markdown (.mdx, **.mdx, mdx.markdownlint.json)

Fenced code blocks should be surrounded by blank lines

docs/aws/quick-start/install/cli.mdx:57 MD031/blanks-around-fences Fenced code blocks should be surrounded by blank lines [Context: "```"] https://github.com/DavidAnson/markdownlint/blob/v0.33.0/doc/md031.md
<GitHubClusterCreateCmd />

Check failure on line 58 in docs/aws/quick-start/install/cli.mdx

View workflow job for this annotation

GitHub Actions / check-markdown (.mdx, **.mdx, mdx.markdownlint.json)

Code block style

docs/aws/quick-start/install/cli.mdx:58 MD046/code-block-style Code block style [Expected: fenced; Actual: indented] https://github.com/DavidAnson/markdownlint/blob/v0.33.0/doc/md046.md
<CommonTerminalOutput cloud="Aws" minutes="10" handoffScreen={GitHubHandoffScreen} />
</TabItem>
<TabItem attributes={{ className: styles.gitlab }} value="gitlab" label={ <GitLabLogo /> }>
<GitLabPrerequisites />
### Install the CA (Certificate Authority) of mkcert in your trusted store

We use [mkcert](https://github.com/FiloSottile/mkcert) to generate local certificates and serve `https` with the Traefik Ingress Controller. During the installation, Kubefirst generates these certificates and pushes them to Kubernetes as secrets to attach to Ingress resources.

To allow the applications running in your Kubefirst platform in addition to your browser to trust the certificates generated by your Kubefirst local install, you need to install the CA (Certificate Authority) of mkcert in your trusted store. To do so, follow these simple steps:

```shell
brew install mkcert
mkcert -install
```

This is not an optional step: the cluster creation will fail if you don't install the mkcert CA in your trusted store.

If you are using Firefox, you have one more step: you need to install the [Network Security Services](https://firefox-source-docs.mozilla.org/security/nss/index.html) (NSS):

```shell
brew install nss
```

Check failure on line 80 in docs/aws/quick-start/install/cli.mdx

View workflow job for this annotation

GitHub Actions / check-markdown (.mdx, **.mdx, mdx.markdownlint.json)

Fenced code blocks should be surrounded by blank lines

docs/aws/quick-start/install/cli.mdx:80 MD031/blanks-around-fences Fenced code blocks should be surrounded by blank lines [Context: "```"] https://github.com/DavidAnson/markdownlint/blob/v0.33.0/doc/md031.md
<GitLabClusterCreateCmd />

Check failure on line 81 in docs/aws/quick-start/install/cli.mdx

View workflow job for this annotation

GitHub Actions / check-markdown (.mdx, **.mdx, mdx.markdownlint.json)

Code block style

docs/aws/quick-start/install/cli.mdx:81 MD046/code-block-style Code block style [Expected: fenced; Actual: indented] https://github.com/DavidAnson/markdownlint/blob/v0.33.0/doc/md046.md
<CommonTerminalOutput cloud="Aws" minutes="10" handoffScreen={GitLabHandoffScreen} />
</TabItem>
Expand Down
36 changes: 36 additions & 0 deletions docs/azure/quick-start/install/cli.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -27,12 +27,48 @@ import GitLabHandoffScreen from "../../../img/azure/gitlab/handoff-screen.png";

<TabItem attributes={{ className: styles.github }} value="github" label={ <GitHubLogo /> }>
<GitHubPrerequisites />
### Install the CA (Certificate Authority) of mkcert in your trusted store

Check failure on line 30 in docs/azure/quick-start/install/cli.mdx

View workflow job for this annotation

GitHub Actions / check-markdown (.mdx, **.mdx, mdx.markdownlint.json)

Headings should be surrounded by blank lines

docs/azure/quick-start/install/cli.mdx:30 MD022/blanks-around-headings Headings should be surrounded by blank lines [Expected: 1; Actual: 0; Above] [Context: "### Install the CA (Certificate Authority) of mkcert in your trusted store"] https://github.com/DavidAnson/markdownlint/blob/v0.33.0/doc/md022.md

We use [mkcert](https://github.com/FiloSottile/mkcert) to generate local certificates and serve `https` with the Traefik Ingress Controller. During the installation, Kubefirst generates these certificates and pushes them to Kubernetes as secrets to attach to Ingress resources.

To allow the applications running in your Kubefirst platform in addition to your browser to trust the certificates generated by your Kubefirst local install, you need to install the CA (Certificate Authority) of mkcert in your trusted store. To do so, follow these simple steps:

```shell

Check failure on line 36 in docs/azure/quick-start/install/cli.mdx

View workflow job for this annotation

GitHub Actions / check-markdown (.mdx, **.mdx, mdx.markdownlint.json)

Code block style

docs/azure/quick-start/install/cli.mdx:36 MD046/code-block-style Code block style [Expected: indented; Actual: fenced] https://github.com/DavidAnson/markdownlint/blob/v0.33.0/doc/md046.md
brew install mkcert
mkcert -install
```

This is not an optional step: the cluster creation will fail if you don't install the mkcert CA in your trusted store.

If you are using Firefox, you have one more step: you need to install the [Network Security Services](https://firefox-source-docs.mozilla.org/security/nss/index.html) (NSS):

```shell
brew install nss
```
<GitHubClusterCreateCmd />
<CommonTerminalOutput cloud="Azure" minutes="20" handoffScreen={GitHubHandoffScreen} />
</TabItem>

<TabItem attributes={{ className: styles.gitlab }} value="gitlab" label={ <GitLabLogo /> }>
<GitLabPrerequisites />
### Install the CA (Certificate Authority) of mkcert in your trusted store

We use [mkcert](https://github.com/FiloSottile/mkcert) to generate local certificates and serve `https` with the Traefik Ingress Controller. During the installation, Kubefirst generates these certificates and pushes them to Kubernetes as secrets to attach to Ingress resources.

To allow the applications running in your Kubefirst platform in addition to your browser to trust the certificates generated by your Kubefirst local install, you need to install the CA (Certificate Authority) of mkcert in your trusted store. To do so, follow these simple steps:

```shell
brew install mkcert
mkcert -install
```

This is not an optional step: the cluster creation will fail if you don't install the mkcert CA in your trusted store.

If you are using Firefox, you have one more step: you need to install the [Network Security Services](https://firefox-source-docs.mozilla.org/security/nss/index.html) (NSS):

```shell
brew install nss
```
<GitLabClusterCreateCmd />
<CommonTerminalOutput cloud="Azure" minutes="20" handoffScreen={GitLabHandoffScreen} />
</TabItem>
Expand Down
38 changes: 38 additions & 0 deletions docs/civo/quick-start/install/cli.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -38,12 +38,50 @@ export const TabLabel = ({ imgSrc, label, alt }) => (

<TabItem attributes={{ className: styles.github }} value="github" label={ <GitHubLogo /> }>
<GitHubPrerequisites />

### Install the CA (Certificate Authority) of mkcert in your trusted store

We use [mkcert](https://github.com/FiloSottile/mkcert) to generate local certificates and serve `https` with the Traefik Ingress Controller. During the installation, Kubefirst generates these certificates and pushes them to Kubernetes as secrets to attach to Ingress resources.

To allow the applications running in your Kubefirst platform in addition to your browser to trust the certificates generated by your Kubefirst local install, you need to install the CA (Certificate Authority) of mkcert in your trusted store. To do so, follow these simple steps:

```shell
brew install mkcert
mkcert -install
```

This is not an optional step: the cluster creation will fail if you don't install the mkcert CA in your trusted store.

If you are using Firefox, you have one more step: you need to install the [Network Security Services](https://firefox-source-docs.mozilla.org/security/nss/index.html) (NSS):

```shell
brew install nss
```

<GitHubClusterCreateCmd />
<CommonTerminalOutput cloud="Civo" minutes="10" handoffScreen={GitHubHandoffScreen} />
</TabItem>

<TabItem attributes={{ className: styles.gitlab }} value="gitlab" label={ <GitLabLogo /> }>
<GitLabPrerequisites />
### Install the CA (Certificate Authority) of mkcert in your trusted store

We use [mkcert](https://github.com/FiloSottile/mkcert) to generate local certificates and serve `https` with the Traefik Ingress Controller. During the installation, Kubefirst generates these certificates and pushes them to Kubernetes as secrets to attach to Ingress resources.

To allow the applications running in your Kubefirst platform in addition to your browser to trust the certificates generated by your Kubefirst local install, you need to install the CA (Certificate Authority) of mkcert in your trusted store. To do so, follow these simple steps:

```shell
brew install mkcert
mkcert -install
```

This is not an optional step: the cluster creation will fail if you don't install the mkcert CA in your trusted store.

If you are using Firefox, you have one more step: you need to install the [Network Security Services](https://firefox-source-docs.mozilla.org/security/nss/index.html) (NSS):

```shell
brew install nss
```
<GitLabClusterCreateCmd />
<CommonTerminalOutput cloud="Civo" minutes="10" handoffScreen={GitLabHandoffScreen} />
</TabItem>
Expand Down
36 changes: 36 additions & 0 deletions docs/do/quick-start/install/cli.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -39,13 +39,49 @@ export const TabLabel = ({ imgSrc, label, alt }) => (

<TabItem attributes={{ className: styles.github }} value="github" label={<GitHubLogo /> }>
<GitHubPrerequisites />
### Install the CA (Certificate Authority) of mkcert in your trusted store

We use [mkcert](https://github.com/FiloSottile/mkcert) to generate local certificates and serve `https` with the Traefik Ingress Controller. During the installation, Kubefirst generates these certificates and pushes them to Kubernetes as secrets to attach to Ingress resources.

To allow the applications running in your Kubefirst platform in addition to your browser to trust the certificates generated by your Kubefirst local install, you need to install the CA (Certificate Authority) of mkcert in your trusted store. To do so, follow these simple steps:

```shell
brew install mkcert
mkcert -install
```

This is not an optional step: the cluster creation will fail if you don't install the mkcert CA in your trusted store.

If you are using Firefox, you have one more step: you need to install the [Network Security Services](https://firefox-source-docs.mozilla.org/security/nss/index.html) (NSS):

```shell
brew install nss
```
<GitHubClusterCreateCmd />
<SpaceRegion />
<CommonTerminalOutput cloud="Do" minutes="10" handoffScreen={GitHubHandoffScreen} />
</TabItem>

<TabItem attributes={{ className: styles.gitlab }} value="gitlab" label={ <GitLabLogo /> }>
<GitLabPrerequisites />
### Install the CA (Certificate Authority) of mkcert in your trusted store

We use [mkcert](https://github.com/FiloSottile/mkcert) to generate local certificates and serve `https` with the Traefik Ingress Controller. During the installation, Kubefirst generates these certificates and pushes them to Kubernetes as secrets to attach to Ingress resources.

To allow the applications running in your Kubefirst platform in addition to your browser to trust the certificates generated by your Kubefirst local install, you need to install the CA (Certificate Authority) of mkcert in your trusted store. To do so, follow these simple steps:

```shell
brew install mkcert
mkcert -install
```

This is not an optional step: the cluster creation will fail if you don't install the mkcert CA in your trusted store.

If you are using Firefox, you have one more step: you need to install the [Network Security Services](https://firefox-source-docs.mozilla.org/security/nss/index.html) (NSS):

```shell
brew install nss
```
<GitLabClusterCreateCmd />
<SpaceRegion />
<CommonTerminalOutput cloud="Do" minutes="10" handoffScreen={GitLabHandoffScreen} />
Expand Down
36 changes: 36 additions & 0 deletions docs/gcp/quick-start/install/cli.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -38,12 +38,48 @@ export const TabLabel = ({ imgSrc, label, alt }) => (

<TabItem attributes={{ className: styles.github }} value="github" label={ <GitHubLogo /> }>
<GitHubPrerequisites />
### Install the CA (Certificate Authority) of mkcert in your trusted store

We use [mkcert](https://github.com/FiloSottile/mkcert) to generate local certificates and serve `https` with the Traefik Ingress Controller. During the installation, Kubefirst generates these certificates and pushes them to Kubernetes as secrets to attach to Ingress resources.

To allow the applications running in your Kubefirst platform in addition to your browser to trust the certificates generated by your Kubefirst local install, you need to install the CA (Certificate Authority) of mkcert in your trusted store. To do so, follow these simple steps:

```shell
brew install mkcert
mkcert -install
```

This is not an optional step: the cluster creation will fail if you don't install the mkcert CA in your trusted store.

If you are using Firefox, you have one more step: you need to install the [Network Security Services](https://firefox-source-docs.mozilla.org/security/nss/index.html) (NSS):

```shell
brew install nss
```
<GitHubClusterCreateCmd />
<CommonTerminalOutput cloud="Gcp" minutes="10" handoffScreen={GitHubHandoffScreen} />
</TabItem>

<TabItem attributes={{ className: styles.gitlab }} value="gitlab" label={ <GitLabLogo /> }>
<GitLabPrerequisites />
### Install the CA (Certificate Authority) of mkcert in your trusted store

We use [mkcert](https://github.com/FiloSottile/mkcert) to generate local certificates and serve `https` with the Traefik Ingress Controller. During the installation, Kubefirst generates these certificates and pushes them to Kubernetes as secrets to attach to Ingress resources.

To allow the applications running in your Kubefirst platform in addition to your browser to trust the certificates generated by your Kubefirst local install, you need to install the CA (Certificate Authority) of mkcert in your trusted store. To do so, follow these simple steps:

```shell
brew install mkcert
mkcert -install
```

This is not an optional step: the cluster creation will fail if you don't install the mkcert CA in your trusted store.

If you are using Firefox, you have one more step: you need to install the [Network Security Services](https://firefox-source-docs.mozilla.org/security/nss/index.html) (NSS):

```shell
brew install nss
```
<GitLabClusterCreateCmd />
<CommonTerminalOutput cloud="Gcp" minutes="10" handoffScreen={GitLabHandoffScreen} />
</TabItem>
Expand Down
36 changes: 36 additions & 0 deletions docs/k3s/quick-start/install/cli.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -37,11 +37,47 @@ export const TabLabel = ({ imgSrc, label, alt }) => (
<Tabs groupId="git_provider" defaultValue="gitlab" queryString>
<TabItem attributes={{ className: styles.github }} value="github" label={ <GitHubLogo /> }>
<GitHubPrerequisites />
### Install the CA (Certificate Authority) of mkcert in your trusted store

We use [mkcert](https://github.com/FiloSottile/mkcert) to generate local certificates and serve `https` with the Traefik Ingress Controller. During the installation, Kubefirst generates these certificates and pushes them to Kubernetes as secrets to attach to Ingress resources.

To allow the applications running in your Kubefirst platform in addition to your browser to trust the certificates generated by your Kubefirst local install, you need to install the CA (Certificate Authority) of mkcert in your trusted store. To do so, follow these simple steps:

```shell
brew install mkcert
mkcert -install
```

This is not an optional step: the cluster creation will fail if you don't install the mkcert CA in your trusted store.

If you are using Firefox, you have one more step: you need to install the [Network Security Services](https://firefox-source-docs.mozilla.org/security/nss/index.html) (NSS):

```shell
brew install nss
```
<GitHubClusterCreateCmd />
<CommonTerminalOutput cloud="K3s" minutes="10" handoffScreen={GitHubHandoffScreen} />
</TabItem>
<TabItem attributes={{ className: styles.gitlab }} value="gitlab" label={ <GitLabLogo /> }>
<GitLabPrerequisites />
### Install the CA (Certificate Authority) of mkcert in your trusted store

We use [mkcert](https://github.com/FiloSottile/mkcert) to generate local certificates and serve `https` with the Traefik Ingress Controller. During the installation, Kubefirst generates these certificates and pushes them to Kubernetes as secrets to attach to Ingress resources.

To allow the applications running in your Kubefirst platform in addition to your browser to trust the certificates generated by your Kubefirst local install, you need to install the CA (Certificate Authority) of mkcert in your trusted store. To do so, follow these simple steps:

```shell
brew install mkcert
mkcert -install
```

This is not an optional step: the cluster creation will fail if you don't install the mkcert CA in your trusted store.

If you are using Firefox, you have one more step: you need to install the [Network Security Services](https://firefox-source-docs.mozilla.org/security/nss/index.html) (NSS):

```shell
brew install nss
```
<GitLabClusterCreateCmd />
<CommonTerminalOutput cloud="K3s" minutes="10" handoffScreen={GitLabHandoffScreen} />
</TabItem>
Expand Down
36 changes: 36 additions & 0 deletions docs/vultr/quick-start/install/cli.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -38,12 +38,48 @@ export const TabLabel = ({ imgSrc, label, alt }) => (

<TabItem attributes={{ className: styles.github }} value="github" label={ <GitHubLogo /> }>
<GitHubPrerequisites />
### Install the CA (Certificate Authority) of mkcert in your trusted store

We use [mkcert](https://github.com/FiloSottile/mkcert) to generate local certificates and serve `https` with the Traefik Ingress Controller. During the installation, Kubefirst generates these certificates and pushes them to Kubernetes as secrets to attach to Ingress resources.

To allow the applications running in your Kubefirst platform in addition to your browser to trust the certificates generated by your Kubefirst local install, you need to install the CA (Certificate Authority) of mkcert in your trusted store. To do so, follow these simple steps:

```shell
brew install mkcert
mkcert -install
```

This is not an optional step: the cluster creation will fail if you don't install the mkcert CA in your trusted store.

If you are using Firefox, you have one more step: you need to install the [Network Security Services](https://firefox-source-docs.mozilla.org/security/nss/index.html) (NSS):

```shell
brew install nss
```
<GitHubClusterCreateCmd />
<CommonTerminalOutput cloud="Vultr" minutes="10" handoffScreen={GitHubHandoffScreen} />
</TabItem>

<TabItem attributes={{ className: styles.gitlab }} value="gitlab" label={ <GitLabLogo /> }>
<GitLabPrerequisites />
### Install the CA (Certificate Authority) of mkcert in your trusted store

We use [mkcert](https://github.com/FiloSottile/mkcert) to generate local certificates and serve `https` with the Traefik Ingress Controller. During the installation, Kubefirst generates these certificates and pushes them to Kubernetes as secrets to attach to Ingress resources.

To allow the applications running in your Kubefirst platform in addition to your browser to trust the certificates generated by your Kubefirst local install, you need to install the CA (Certificate Authority) of mkcert in your trusted store. To do so, follow these simple steps:

```shell
brew install mkcert
mkcert -install
```

This is not an optional step: the cluster creation will fail if you don't install the mkcert CA in your trusted store.

If you are using Firefox, you have one more step: you need to install the [Network Security Services](https://firefox-source-docs.mozilla.org/security/nss/index.html) (NSS):

```shell
brew install nss
```
<GitLabClusterCreateCmd />
<CommonTerminalOutput cloud="Vultr" minutes="10" handoffScreen={GitLabHandoffScreen} />
</TabItem>
Expand Down
Original file line number Diff line number Diff line change
@@ -1,3 +1,3 @@
### Installed Applications

To see what is installed by kubefirst, check the [overview page](../../overview.mdx).
To see what is installed by Kubefirst, check the [overview page](../../overview.mdx).
Loading

0 comments on commit 5c8dd19

Please sign in to comment.