mirror of
https://github.com/marcogll/passkit-generator.git
synced 2026-03-15 22:25:24 +00:00
Added updates for OpenSSL for Windows in termal steps for cers generation
This commit is contained in:
@@ -2,7 +2,7 @@
|
||||
|
||||
This is a branch file that starts from the [Certificate paragraph](./README.md#certificates) and is made for developers that does not have access to macOS or are very very enthusiast of terminal (so its still valid for macOS).
|
||||
|
||||
I have to use these steps to work under WSL (Windows Subsystem for Linux), or Bash on Windows. I've not tested them under OpenSSL for Windows, but they might work in the same way. The only thing you'll still need over the certificates, are an Wallet-ready iOS App (and so an iPhone) or a way to pass it.
|
||||
I have to use these steps to work under WSL (Windows Subsystem for Linux), or Bash on Windows. The only thing you'll still need over the certificates, are an Wallet-ready iOS App (and so an iPhone) or a way to pass it.
|
||||
To test it, I use my [Passkit-sample-client](https://github.com/alexandercerutti/passkit-sample-client), an really basic iOS App which requires just few informations and will show you the generated pass. Or you can use like Telegram, save your generated pass in your "Saved Messages" and then open it from the iPhone. Your choice.
|
||||
|
||||
But let's not talk anymore about testing and let's go with the steps to follow. **It will still require OpenSSL installed**. We are going to use it in a massive way.
|
||||
@@ -32,6 +32,16 @@ But let's not talk anymore about testing and let's go with the steps to follow.
|
||||
$ openssl req -new -key <your-key-name>.key -out csr.certSigningRequest
|
||||
```
|
||||
|
||||
> **Please note that to generate a Certificate Signing Request under OpenSSL for Windows, you'll need a configuration file or you'll fall into error.**
|
||||
>
|
||||
> You can load it by adding to the command above the flag `-config <path/to/.cnf>`
|
||||
>
|
||||
> Other functions might need configuration file.
|
||||
|
||||
<br>
|
||||
<br>
|
||||
<hr>
|
||||
|
||||
You will be prompted to insert some informations. You'll have to insert Apple CA's informations, like below (**bold ones**). If none, press Enter to skip. After the email address, you won't need any further informations. So press Enter until you won't finish.
|
||||
|
||||
<hr>
|
||||
@@ -55,7 +65,7 @@ But let's not talk anymore about testing and let's go with the steps to follow.
|
||||
If you are curious about how a CSR is composed, use this command:
|
||||
|
||||
```sh
|
||||
# Optional, just for curious people
|
||||
# Optional, just for curious people, like George, even if it's a monkey.
|
||||
$ openssl asn1parse -i -in csr.certSigningRequest
|
||||
```
|
||||
<hr>
|
||||
|
||||
Reference in New Issue
Block a user