feat(authority): avoid hardcoded cn in authority csr

This commit is contained in:
Ahmet DEMIR 2022-01-13 20:30:54 +01:00
parent 988efc8cd4
commit 68b980d689
No known key found for this signature in database
GPG key ID: 7F0E92AFAC67CDD5
2 changed files with 5 additions and 1 deletions

View file

@ -64,6 +64,7 @@ type Config struct {
TLS *TLSOptions `json:"tls,omitempty"` TLS *TLSOptions `json:"tls,omitempty"`
Password string `json:"password,omitempty"` Password string `json:"password,omitempty"`
Templates *templates.Templates `json:"templates,omitempty"` Templates *templates.Templates `json:"templates,omitempty"`
CommonName string `json:"commonName,omitempty"`
} }
// ASN1DN contains ASN1.DN attributes that are used in Subject and Issuer // ASN1DN contains ASN1.DN attributes that are used in Subject and Issuer
@ -169,6 +170,9 @@ func (c *Config) Init() {
if c.AuthorityConfig == nil { if c.AuthorityConfig == nil {
c.AuthorityConfig = &AuthConfig{} c.AuthorityConfig = &AuthConfig{}
} }
if c.CommonName == "" {
c.CommonName = "Step Online CA"
}
c.AuthorityConfig.init() c.AuthorityConfig.init()
} }

View file

@ -509,7 +509,7 @@ func (a *Authority) GetTLSCertificate() (*tls.Certificate, error) {
} }
// Create initial certificate request. // Create initial certificate request.
cr, err := x509util.CreateCertificateRequest("Step Online CA", a.config.DNSNames, signer) cr, err := x509util.CreateCertificateRequest(a.config.CommonName, a.config.DNSNames, signer)
if err != nil { if err != nil {
return fatal(err) return fatal(err)
} }