Resolve IOS acceptance

Fully closes #2.
This commit is contained in:
Spotlight 2022-03-30 00:56:02 -05:00
parent 79a712e3ad
commit 4a232c552b
No known key found for this signature in database
GPG Key ID: 874AA355B3209BDC

View File

@ -50,23 +50,24 @@ func createCertificates() []byte {
//////////////////////////////////// ////////////////////////////////////
// Issue server TLS certificate // // Issue server TLS certificate //
//////////////////////////////////// ////////////////////////////////////
// We'll issue a wildcard for our CN and SANs.
// Is this recommended? Absolutely not, but who's to stop us?
issueName := "*." + baseDomain
serverCert := x509.Certificate{ serverCert := x509.Certificate{
SignatureAlgorithm: x509.SHA1WithRSA, SignatureAlgorithm: x509.SHA1WithRSA,
SerialNumber: generateSerial(), SerialNumber: generateSerial(),
// We'll issue with a primary common name for our base domain.
Subject: pkix.Name{ Subject: pkix.Name{
CommonName: baseDomain, CommonName: issueName,
}, },
// The SAN will be a wildcard for our base domain, as it cannot be the CN.
DNSNames: []string{ DNSNames: []string{
"*." + baseDomain, issueName,
}, },
NotBefore: YearIssueTime, NotBefore: YearIssueTime,
NotAfter: YearIssueTime.AddDate(10, 0, 0), NotAfter: YearIssueTime.AddDate(10, 0, 0),
KeyUsage: x509.KeyUsageKeyAgreement | x509.KeyUsageKeyEncipherment | x509.KeyUsageDigitalSignature, KeyUsage: x509.KeyUsageKeyAgreement | x509.KeyUsageKeyEncipherment | x509.KeyUsageDigitalSignature,
ExtKeyUsage: []x509.ExtKeyUsage{x509.ExtKeyUsageServerAuth}, ExtKeyUsage: []x509.ExtKeyUsage{x509.ExtKeyUsageServerAuth},
IsCA: false, BasicConstraintsValid: true,
MaxPathLenZero: true, IsCA: false,
} }
serverPriv, err := rsa.GenerateKey(rand.Reader, 2048) serverPriv, err := rsa.GenerateKey(rand.Reader, 2048)