Reference
del ssl crt-list
Available since
- HAProxy 2.2
- HAProxy Enterprise 2.2r1
Delete an entry from an SSL CRT list residing in memory.
Description Jump to heading
CRT lists are text files that describe the SSL certificates used by the load balancer. When dynamically creating and manipulating certificates, this command deletes a line from an SSL CRT list in memory.
This operation deletes the certificate only from the CRT list in memory. To make the deletion permanent, also delete the certificate from the CRT list file on disk. Then delete the certificate file.
Examples Jump to heading
In this example, a line reading /etc/hapee-3.0/api.pem
is deleted from the in-memory CRT list at /etc/hapee-3.0/crt-list.txt
.
nix
echo -e "del ssl crt-list /etc/hapee-3.0/crt-list.txt /etc/hapee-3.0/api.pem" | \sudo socat stdio tcp4-connect:127.0.0.1:9999
nix
echo -e "del ssl crt-list /etc/hapee-3.0/crt-list.txt /etc/hapee-3.0/api.pem" | \sudo socat stdio tcp4-connect:127.0.0.1:9999
outputtext
Entry '/etc/hapee-3.0/api.pem' deleted in crtlist '/etc/hapee-3.0/crt-list.txt'!
outputtext
Entry '/etc/hapee-3.0/api.pem' deleted in crtlist '/etc/hapee-3.0/crt-list.txt'!
Example workflow Jump to heading
This operation is generally performed as part of a series of transactions. An example is outlined below. This example demonstrates how to upload a new certificate, attach it to the load balancer’s running configuration, and store it in a CRT list with cipher and SNI parameters. An optional delete command is included at the end.
-
Add a CRT list to your HAProxy Enterprise configuration file on a
bind
line:haproxyfrontend fe_mainmode httpbind :80bind :443 ssl crt-list /etc/hapee-3.0/certificate-list.txt ## This file must exist and contain at least one certificate, self-signed, if need be.http-request redirect scheme https unless { ssl_fc }default_backend servershaproxyfrontend fe_mainmode httpbind :80bind :443 ssl crt-list /etc/hapee-3.0/certificate-list.txt ## This file must exist and contain at least one certificate, self-signed, if need be.http-request redirect scheme https unless { ssl_fc }default_backend servers -
Use the
new ssl cert
command to create an empty slot for a certificate in HAProxy’s memory.nixecho -e "new ssl cert /etc/hapee-3.0/certs/new_certificate.pem" | \sudo socat stdio unix-connect:/var/run/hapee-3.0/hapee-lb.socknixecho -e "new ssl cert /etc/hapee-3.0/certs/new_certificate.pem" | \sudo socat stdio unix-connect:/var/run/hapee-3.0/hapee-lb.sockoutputtextNew empty certificate store '/etc/hapee-3.0/certs/new_certificate.pem'!outputtextNew empty certificate store '/etc/hapee-3.0/certs/new_certificate.pem'! -
Begin a transaction to upload the certificate into that slot by using the
set ssl cert
command.The new certificate should be in your local working directory.
nixecho -e "set ssl cert /etc/hapee-3.0/certs/new_certificate.pem <<\n$(cat ./new_certificate.pem)\n" | \sudo socat stdio unix-connect:/var/run/hapee-3.0/hapee-lb.socknixecho -e "set ssl cert /etc/hapee-3.0/certs/new_certificate.pem <<\n$(cat ./new_certificate.pem)\n" | \sudo socat stdio unix-connect:/var/run/hapee-3.0/hapee-lb.sockoutputtextTransaction created for certificate /etc/hapee-3.0/certs/new_certificate.pem!outputtextTransaction created for certificate /etc/hapee-3.0/certs/new_certificate.pem! -
Commit the transaction:
nixecho -e "commit ssl cert /etc/hapee-3.0/certs/new_certificate.pem" | \sudo socat stdio unix-connect:/var/run/hapee-3.0/hapee-lb.socknixecho -e "commit ssl cert /etc/hapee-3.0/certs/new_certificate.pem" | \sudo socat stdio unix-connect:/var/run/hapee-3.0/hapee-lb.sockoutputtextCommitting /etc/hapee-3.0/certs/new_certificate.pemSuccess!outputtextCommitting /etc/hapee-3.0/certs/new_certificate.pemSuccess! -
Add a line to the CRT list, to add the certificate, cipher suite, and SNI options:
nixecho -e "add ssl crt-list /etc/hapee-3.0/certificate-list.txt <<\n/etc//haproxy/certs/new_certificate.pem [alpn h2] mysite.local\n" | \sudo socat stdio unix-connect:/var/run/hapee-3.0/hapee-lb.socknixecho -e "add ssl crt-list /etc/hapee-3.0/certificate-list.txt <<\n/etc//haproxy/certs/new_certificate.pem [alpn h2] mysite.local\n" | \sudo socat stdio unix-connect:/var/run/hapee-3.0/hapee-lb.sockoutputtextInserting certificate '/etc/hapee-3.0/certs/new_certificate.pem' in crt-list '/etc//haproxy/certificate-list.txt'.Success!outputtextInserting certificate '/etc/hapee-3.0/certs/new_certificate.pem' in crt-list '/etc//haproxy/certificate-list.txt'.Success! -
Use
show ssl crt-list
to verify that the CRT list was updated correctly:nixecho "show ssl crt-list /etc/hapee-3.0/certificate-list.txt" | \sudo socat stdio unix-connect:/var/run/hapee-3.0/hapee-lb.socknixecho "show ssl crt-list /etc/hapee-3.0/certificate-list.txt" | \sudo socat stdio unix-connect:/var/run/hapee-3.0/hapee-lb.sockoutputtext# /etc//haproxy/certificate-list.txt/etc/hapee-3.0/certs/site.pem/etc/hapee-3.0/certs/test.local.pem [alpn h2 ssl-min-ver TLSv1.2] test.local/etc/hapee-3.0/certs/new_certificate.pem [alpn h2] mysite.localoutputtext# /etc//haproxy/certificate-list.txt/etc/hapee-3.0/certs/site.pem/etc/hapee-3.0/certs/test.local.pem [alpn h2 ssl-min-ver TLSv1.2] test.local/etc/hapee-3.0/certs/new_certificate.pem [alpn h2] mysite.local -
When needed, use
del ssl crt-list
to delete an entry from the CRT list in memory:nixecho -e "del ssl crt-list /etc/hapee-3.0/certificate-list.txt /etc/hapee-3.0/new_certificate.pem" | \sudo socat stdio unix-connect:/var/run/hapee-3.0/hapee-lb.socknixecho -e "del ssl crt-list /etc/hapee-3.0/certificate-list.txt /etc/hapee-3.0/new_certificate.pem" | \sudo socat stdio unix-connect:/var/run/hapee-3.0/hapee-lb.sockoutputtextEntry '/etc/hapee-3.0/new_certificate.pem' deleted in crtlist '/etc/hapee-3.0/certificate-list.txt'!outputtextEntry '/etc/hapee-3.0/new_certificate.pem' deleted in crtlist '/etc/hapee-3.0/certificate-list.txt'!Info
This operation deletes the certificate only from the CRT list in memory. To make the deletion permanent, also delete the certificate from the CRT list file on disk. Then delete the certificate file.
See also Jump to heading
Do you have any suggestions on how we can improve the content of this page?