@@ -111,11 +111,6 @@ where
111111 #[ builder( default = DEFAULT_CERTIFICATE_VALIDITY ) ]
112112 validity : Duration ,
113113
114- /// Serial number of the generated certificate.
115- ///
116- /// If not specified a random serial will be generated.
117- serial_number : Option < u64 > ,
118-
119114 /// Cryptographic keypair used to for the certificates.
120115 ///
121116 /// If not specified a random keypair will be generated.
@@ -143,9 +138,6 @@ where
143138 <KP :: SigningKey as signature:: Keypair >:: VerifyingKey : EncodePublicKey ,
144139{
145140 pub fn build ( self ) -> Result < CertificatePair < KP > , CreateCertificateError < KP :: Error > > {
146- let serial_number =
147- SerialNumber :: from ( self . serial_number . unwrap_or_else ( || rand:: random :: < u64 > ( ) ) ) ;
148-
149141 let validity = Validity :: from_now ( * self . validity ) . context ( ParseValiditySnafu ) ?;
150142 let subject: Name = self . subject . parse ( ) . context ( ParseSubjectSnafu {
151143 subject : self . subject ,
@@ -154,6 +146,7 @@ where
154146 Some ( key_pair) => key_pair,
155147 None => KP :: new ( ) . context ( CreateKeyPairSnafu ) ?,
156148 } ;
149+ let serial_number = SerialNumber :: from ( rand:: random :: < u64 > ( ) ) ;
157150
158151 let ca_validity = self . signed_by . ca_cert ( ) . tbs_certificate . validity ;
159152 let ca_not_after = ca_validity. not_after . to_system_time ( ) ;
@@ -261,7 +254,6 @@ mod tests {
261254 & [ ] ,
262255 & [ ] ,
263256 DEFAULT_CERTIFICATE_VALIDITY ,
264- None ,
265257 ) ;
266258 }
267259
@@ -281,7 +273,6 @@ mod tests {
281273 . subject ( "CN=trino-coordinator-default-0" )
282274 . subject_alterative_dns_names ( & sans)
283275 . subject_alterative_ip_addresses ( & san_ips)
284- . serial_number ( 08121997 )
285276 . validity ( Duration :: from_days_unchecked ( 42 ) )
286277 . key_pair ( rsa:: SigningKey :: new ( ) . unwrap ( ) )
287278 . signed_by ( & ca)
@@ -294,7 +285,6 @@ mod tests {
294285 & sans,
295286 & san_ips,
296287 Duration :: from_days_unchecked ( 42 ) ,
297- Some ( 08121997 ) ,
298288 ) ;
299289 }
300290
@@ -304,7 +294,6 @@ mod tests {
304294 sans : & [ & str ] ,
305295 san_ips : & [ IpAddr ] ,
306296 validity : Duration ,
307- serial_number : Option < u64 > ,
308297 ) {
309298 assert_eq ! ( certificate. subject, subject. parse( ) . unwrap( ) ) ;
310299
@@ -345,12 +334,6 @@ mod tests {
345334 . expect( "Failed to calculate duration between notBefore and notAfter" ) ,
346335 * validity
347336 ) ;
348-
349- if let Some ( serial_number) = serial_number {
350- assert_eq ! ( certificate. serial_number, SerialNumber :: from( serial_number) )
351- } else {
352- assert_ne ! ( certificate. serial_number, SerialNumber :: from( 0_u64 ) )
353- }
354337 }
355338
356339 fn bytes_to_ip_addr ( bytes : & [ u8 ] ) -> IpAddr {
0 commit comments