123456789101112131415161718192021 |
- #! /bin/bash
- # TODO: `rustls` (really, `webpki`) doesn't currently use the CN in the subject
- # to check if a certificate is valid for a server name sent via SNI. It's not
- # clear if this is intended, since certificates _should_ have a `subjectAltName`
- # with a DNS name, or if it simply hasn't been implemented yet. See
- # https://bugzilla.mozilla.org/show_bug.cgi?id=552346 for a bit more info.
- CA_SUBJECT="/C=UK/O=Dim CA/CN=Dim Labs CA"
- SUBJECT="/C=UK/O=Dim/CN=localhost"
- ALT="DNS:localhost"
- openssl genrsa -out ca_key.pem 4096
- openssl req -new -x509 -days 3650 -key ca_key.pem -subj "${CA_SUBJECT}" -out ca_cert.pem
- openssl req -newkey rsa:4096 -nodes -sha256 -keyout key.pem -subj "${SUBJECT}" -out server.csr
- openssl x509 -req -sha256 -extfile <(printf "subjectAltName=${ALT}") -days 3650 \
- -CA ca_cert.pem -CAkey ca_key.pem -CAcreateserial \
- -in server.csr -out cert.pem
- rm ca_cert.srl server.csr
|