@@ -111,11 +111,6 @@ where
111
111
#[ builder( default = DEFAULT_CERTIFICATE_VALIDITY ) ]
112
112
validity : Duration ,
113
113
114
- /// Serial number of the generated certificate.
115
- ///
116
- /// If not specified a random serial will be generated.
117
- serial_number : Option < u64 > ,
118
-
119
114
/// Cryptographic keypair used to for the certificates.
120
115
///
121
116
/// If not specified a random keypair will be generated.
@@ -143,9 +138,6 @@ where
143
138
<KP :: SigningKey as signature:: Keypair >:: VerifyingKey : EncodePublicKey ,
144
139
{
145
140
pub fn build ( self ) -> Result < CertificatePair < KP > , CreateCertificateError < KP :: Error > > {
146
- let serial_number =
147
- SerialNumber :: from ( self . serial_number . unwrap_or_else ( || rand:: random :: < u64 > ( ) ) ) ;
148
-
149
141
let validity = Validity :: from_now ( * self . validity ) . context ( ParseValiditySnafu ) ?;
150
142
let subject: Name = self . subject . parse ( ) . context ( ParseSubjectSnafu {
151
143
subject : self . subject ,
@@ -154,6 +146,7 @@ where
154
146
Some ( key_pair) => key_pair,
155
147
None => KP :: new ( ) . context ( CreateKeyPairSnafu ) ?,
156
148
} ;
149
+ let serial_number = SerialNumber :: from ( rand:: random :: < u64 > ( ) ) ;
157
150
158
151
let ca_validity = self . signed_by . ca_cert ( ) . tbs_certificate . validity ;
159
152
let ca_not_after = ca_validity. not_after . to_system_time ( ) ;
@@ -261,7 +254,6 @@ mod tests {
261
254
& [ ] ,
262
255
& [ ] ,
263
256
DEFAULT_CERTIFICATE_VALIDITY ,
264
- None ,
265
257
) ;
266
258
}
267
259
@@ -281,7 +273,6 @@ mod tests {
281
273
. subject ( "CN=trino-coordinator-default-0" )
282
274
. subject_alterative_dns_names ( & sans)
283
275
. subject_alterative_ip_addresses ( & san_ips)
284
- . serial_number ( 08121997 )
285
276
. validity ( Duration :: from_days_unchecked ( 42 ) )
286
277
. key_pair ( rsa:: SigningKey :: new ( ) . unwrap ( ) )
287
278
. signed_by ( & ca)
@@ -294,7 +285,6 @@ mod tests {
294
285
& sans,
295
286
& san_ips,
296
287
Duration :: from_days_unchecked ( 42 ) ,
297
- Some ( 08121997 ) ,
298
288
) ;
299
289
}
300
290
@@ -304,7 +294,6 @@ mod tests {
304
294
sans : & [ & str ] ,
305
295
san_ips : & [ IpAddr ] ,
306
296
validity : Duration ,
307
- serial_number : Option < u64 > ,
308
297
) {
309
298
assert_eq ! ( certificate. subject, subject. parse( ) . unwrap( ) ) ;
310
299
@@ -345,12 +334,6 @@ mod tests {
345
334
. expect( "Failed to calculate duration between notBefore and notAfter" ) ,
346
335
* validity
347
336
) ;
348
-
349
- if let Some ( serial_number) = serial_number {
350
- assert_eq ! ( certificate. serial_number, SerialNumber :: from( serial_number) )
351
- } else {
352
- assert_ne ! ( certificate. serial_number, SerialNumber :: from( 0_u64 ) )
353
- }
354
337
}
355
338
356
339
fn bytes_to_ip_addr ( bytes : & [ u8 ] ) -> IpAddr {
0 commit comments