You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The solution for openssl 3 is to add a check for openssl 3 and do this:
# Check for OpenSSL 3.x
OPENSSL_VERSION=$(openssl version -v | awk '{print $2}'| awk -F '.' '{print $1}')
if [[ "${OPENSSL_VERSION}" -ge '3' ]]; then
OPENSSL_LEGACY_FLAG='-legacy'
else
OPENSSL_LEGACY_FLAG=
fi
#If there is a signed crt we should include this in the export
if [[ -f ${SIGNED_CRT} ]]; then
openssl pkcs12 -export \
-in "${CHAIN_FILE}" \
-in "${SIGNED_CRT}" \
-inkey "${PRIV_KEY}" \
-out "${P12_TEMP}" -passout pass:"${PASSWORD}" \
-name "${ALIAS}" \
${OPENSSL_LEGACY_FLAG}
else
openssl pkcs12 -export \
-in "${CHAIN_FILE}" \
-inkey "${PRIV_KEY}" \
-out "${P12_TEMP}" -passout pass:"${PASSWORD}" \
-name "${ALIAS}" \
${OPENSSL_LEGACY_FLAG}
fi
The current version people download doesn't have this fix. Is there still maintenance on this script or is everybody on their own now? Because I would like to make this script work when the controller is run inside a docker container.
This section no longer generates a working certificate with openssl 3.x, as the password gets mangled:
Giving this issue:
The solution for openssl 3 is to add a check for openssl 3 and do this:
Which gives this:
The text was updated successfully, but these errors were encountered: