Majic Projects
Gimmecert
Go to the previous open issue
Go to the previous issue (open or closed)
star_faded.png
Please log in to bookmark issues
icon_project.png Gimmecert / Closed Feature request GC-3 Ability to initialise CA hierarchy
action_vote_minus_faded.png
0
Votes
action_vote_plus_faded.png
Go to the next issue (open or closed)
Go to the next open issue
This issue has been closed with status "Closed" and resolution "RESOLVED".
Issue basics
  • Type of issue
    Feature request
  • Category
    Not determined
  • Targetted for
    0.1.0
  • Status
    Closed
  • Progress
  • Priority
    Not determined
User pain
  • Type of bug
    Not triaged
  • Likelihood
    Not triaged
  • Effect
    Not triaged
Affected by this issue (0)
There are no items
People involved
Times and dates
  • Posted at
  • Last updated
  • Estimated time
    4 hours
  • Time spent
    16 hours
    Click here to see time logged against this issue
Issue details
  • Resolution
    RESOLVED
Attachments (0)
There is nothing attached to this issue
Duplicate issues (0)
This issue does not have any duplicates
Description

In order to successfully issue end entity (server/client) certificates, it must be possible to initialise a CA hierarchy. Hierarchy initialisation should be kept as simple as possible.

The following should be done:

  • Implement initialisation command.
  • Initialisation command should:
    • Set-up the necessary directories.
    • Generate the necessary CA private keys.
    • Issue the necessary CA certificates.
    • Provide user with information on what has been created.
  • Initialisation command should support the following options:
    • Base name for the issued CA certificates. Base name should default to current working directory name.
    • CA hierarchy depth. Default should be 1 (just the root).
  • Initialisation command should be implemented with the following constraints in mind:
    • Don't be destructive. If the hierarchy has already been created, show a warning to user, instructing them to remove directory first, and do not overwrite any data.
    • Artifacts should be stored within a sub-directory called .gimmecert.
    • CA certificate subject DN should be of format CN=BASE Level N CA, where BASE is the base name, and N is the level of CA (level 1 for root, level 2 for CAs signed by root etc).
  • Documentation should cover:
    • Simple command use, without providing any parameters.
    • Complex command use, showing how to specify custom base name and hierarchy depth.
    • Directory and file layout structure of generated artifacts.
Todos (0 / 0)
There are no comments