fix: Resolve test failure - Refresh server.crt with existing key extending expiry to Nov 21 03:28:10 2034 GMT#1003
Conversation
UlisesGascon
left a comment
There was a problem hiding this comment.
LGTM! Thanks @BaileyFirman for this pr!
ctcpip
left a comment
There was a problem hiding this comment.
I know it doesn't matter for testing, but can we use at least 2048 bits?
|
We should merge as soon as possible and maybe release a new version (I'm not sure how CITGM works), since this solves #1009 cc: @expressjs/express-tc @UlisesGascon |
There was a problem hiding this comment.
@ctcpip would you be alright removing your request if we fast followed with a script to regenerate the cert following that best practice?
EDIT: I probably should have looked at the commands listed to regen this first and noticed this was not regenerating the private key. Honestly this request seems like a new one that is unrelated to landing this PR. I think we should automate it, but I think we should override the "change request" for now as an unrelated (but still good) next step.
|
my ask was a trivial one openssl genpkey -algorithm RSA -out new_server.key -pkeyopt rsa_keygen_bits:2048
openssl x509 -in server.crt -signkey new_server.key -days 3650 -out new_server.crt
openssl x509 -in new_server.crt -text -noout
mv new_server.crt server.crt
mv new_server.key server.keyanyway, I went ahead and did it, and pushed a new commit |
cd test/fixtures openssl genpkey -algorithm RSA -out new_server.key -pkeyopt rsa_keygen_bits:2048 openssl x509 -in server.crt -signkey new_server.key -days 3650 -out new_server.crt openssl x509 -in new_server.crt -text -noout mv new_server.crt server.crt mv new_server.key server.key
|
Adding a script for this: #1015 |
Cert used for testing has expired, used openssl to refresh with extended expiry 10 years into the future