Hi,
I would like to run the vCert.sh tool on a vCenter Server that I care about, but I would like to confirm that the download has not been tainted first; as I was pointed to the file on a non-VMware site.
Would anyone in GSS be able to confirm the official SHA256 hash for vCenter 7.0 Certificate Management Utility (4.7.0) vCert.sh file?
#!/bin/bash
#------------------------------
# Script to manage vCenter SSL certificates.
#
# Author: [REDACTED]
#------------------------------
#------------------------------
# for debugging purposes only, uncomment the following line:
# export PS4='+[${SECONDS}s][${BASH_SOURCE}:${LINENO}]: ${FUNCNAME[0]:+${FUNCNAME[0]}(): }'; set -x;
# to debug run: ./vCert 2>vCert-debug.txt
#------------------------------
VERSION="4.7.0"
#------------------------------
I would be most grateful.
Cheers,
M
I have a script on my GitHub account:
https://github.com/AngrySysOps/scripts/blob/main/vCert.sh
Here is an article I describe the usage:
https://angrysysops.com/2023/07/24/vcenter-http-status-500-internal-server-error/
and here:
Hello Piotr; It's Martin from the other group. ![]()
I need to validate the SHA256 with a known good from the vendor in order to run it outside of my lab sandbox.
