mkcert is a simple tool for making locally-trusted development certificates. It requires no configuration. Using certificates from real certificate authorities (CAs) for development can be dangerous or impossible (for hosts like localhost or 127.0.0.1), but self-signed certificates cause trust errors. Managing your own CA is the best solution, but usually involves arcane commands, specialized knowledge and manual steps. mkcert automatically creates and installs a local CA in the system root store, and generates locally-trusted certificates. mkcert does not automatically configure servers to use the certificates, though, that's up to you.
OS | Architecture | Version |
---|---|---|
NetBSD 10.0 | aarch64 | go-mkcert-1.4.4nb18.tgz |
NetBSD 10.0 | aarch64 | go-mkcert-1.4.4nb15.tgz |
NetBSD 10.0 | earmv7hf | go-mkcert-1.4.4nb18.tgz |
NetBSD 10.0 | earmv7hf | go-mkcert-1.4.4nb12.tgz |
NetBSD 10.0 | earmv7hf | go-mkcert-1.4.4nb15.tgz |
NetBSD 10.0 | i386 | go-mkcert-1.4.4nb18.tgz |
NetBSD 10.0 | i386 | go-mkcert-1.4.4nb15.tgz |
NetBSD 10.0 | x86_64 | go-mkcert-1.4.4nb18.tgz |
NetBSD 10.0 | x86_64 | go-mkcert-1.4.4nb15.tgz |
NetBSD 9.0 | aarch64 | go-mkcert-1.4.4nb18.tgz |
NetBSD 9.0 | aarch64 | go-mkcert-1.4.4nb15.tgz |
NetBSD 9.0 | earmv7hf | go-mkcert-1.4.4nb18.tgz |
NetBSD 9.0 | earmv7hf | go-mkcert-1.4.4nb12.tgz |
NetBSD 9.0 | earmv7hf | go-mkcert-1.4.4nb15.tgz |
NetBSD 9.0 | i386 | go-mkcert-1.4.4nb18.tgz |
NetBSD 9.0 | i386 | go-mkcert-1.4.4nb15.tgz |
NetBSD 9.0 | x86_64 | go-mkcert-1.4.4nb18.tgz |
NetBSD 9.0 | x86_64 | go-mkcert-1.4.4nb15.tgz |
NetBSD 9.3 | x86_64 | go-mkcert-1.4.4nb18.tgz |
Binary packages can be installed with the high-level tool pkgin (which can be installed with pkg_add) or pkg_add(1) (installed by default). The NetBSD packages collection is also designed to permit easy installation from source.
The pkg_admin audit command locates any installed package which has been mentioned in security advisories as having vulnerabilities.
Please note the vulnerabilities database might not be fully accurate, and not every bug is exploitable with every configuration.
Problem reports, updates or suggestions for this package should be reported with send-pr.