-
Notifications
You must be signed in to change notification settings - Fork 326
Rework cert detection a bit #1532
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Martii
commented
Oct 28, 2018
- This is a WIP... so there might be an error thrown when running on actual pro (hopefully not)... working on it now, so possible downtime expectation perhaps. Works on local pro so far.
- Check for backup alternate keys
- Ensure keys are in UTF-8
* This is a WIP... so there might be an error thrown when running on actual pro *(hopefully not)*... working on it now, so possible downtime expectation perhaps. Works on local pro so far. * Check for backup alternate keys * Ensure keys are in UTF-8
Retested this with last years (2017) certs and it produces a general failure on actual expired certs: $ node app.js
Starting application...
_tls_common.js:134
c.context.setKey(key, passphrase);
^
Error: error:0B080074:x509 certificate routines:X509_check_private_key:key values mismatch
at Object.createSecureContext (_tls_common.js:134:17)
at Server (_tls_wrap.js:868:27)
at new Server (https.js:62:14)
at Object.createServer (https.js:84:10)
at Object.<anonymous> (~/OpenUserJS.org1/app.js:303:24)
at Module._compile (internal/modules/cjs/loader.js:688:30)
at Object.Module._extensions..js (internal/modules/cjs/loader.js:699:10)
at Module.load (internal/modules/cjs/loader.js:598:32)
at tryModuleLoad (internal/modules/cjs/loader.js:537:12)
at Function.Module._load (internal/modules/cjs/loader.js:529:3)
at Function.Module.runMain (internal/modules/cjs/loader.js:741:12)
at startup (internal/bootstrap/node.js:285:19)
at bootstrapNodeJSCore (internal/bootstrap/node.js:739:3 e.g. if they expire it will currently, constantly, trip the server with this message with process manager (pm). May need a Refs: |
* Relax `isPro` requirement in a few areas and rely upon `isSecured` as primary test condition * Trap TLS failure if certs are already expired * Change some verbiage so we know which routine tripped it. e.g. `...ing` vs `...ed`. This routine didn't work last time however things are of course different this year. This use case is finite to detect. Post OpenUserJS#1532 OpenUserJS#1533 and OpenUserJS#37
* Relax `isPro` requirement in a few areas and rely upon `isSecured` as primary test condition * Trap TLS failure if certs are already expired * Change some verbiage so we know which routine tripped it. e.g. `...ing` vs `...ed`. This routine didn't work last time however things are of course different this year. This use case is finite to detect. Post #1532 #1533 and #37 Auto-merge