-
-
Notifications
You must be signed in to change notification settings - Fork 3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Feature request: Better certificate handling #1085
Labels
Comments
Related #1072 that can be closed in favor of this one. If anyone is willing to do this I will send some beers in BTC. |
Would love some nice PRs on this! |
For the CA: Otherwise, use option |
There is this PR that partially tackles this: #1060 but it's not mergeable. |
Closing to keep things in #974 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
It would be nice to have the following more options that will make this script absolutely complete:
CA
. This can be done using the varEASYRSA_CA_EXPIRE
:Here user will enter
1
for default or2
for custom period.EASYRSA_CERT_EXPIRE
var. A message like this to be printed:Here user will enter
1
for default or2
for custom period AND if2
, user MUST not be allowed to enter a period greater than (>) period selected fro CA certificate before. Return and ask to enter again the expiration days with notification that it cannot be greater than CA, where CA expires in $ca_days.Secondly, if script is run the second time (after OpenVPN has been installed), in addition to
We should also have:
Here we will read the contents of
/pki
and display all the certificates with their respectiveCN
, serial, expiration time, and days that it can be renewed before its expiration (theEASYRSA_CERT_RENEW
value that was used at certificate generation time, currently defaults to 90 days).After we list this information in a table, among Add a client and Remove a client we should also have Renew a certificate (that should also work for also for SERVER certificate and for clients certificates if they are within their CERT_RENEW time-window) and if selected, ask again for the var
EASYRSA_CERT_EXPIRE
how much it should be, otherwise fail down to the default.The text was updated successfully, but these errors were encountered: