@@ -4335,6 +4335,12 @@ read_db() {
4335
4335
4336
4336
while read -r db_status db_notAfter db_record; do
4337
4337
4338
+ # Quiet schellcheck
4339
+ # SC2034 (warning): db_notAfter appears unused
4340
+ unused="$db_notAfter"
4341
+ db_notAfter="$unused"
4342
+ unset -v db_notAfter unused
4343
+
4338
4344
verbose "***** Read next record *****"
4339
4345
4340
4346
# Recreate temp-session and
@@ -4480,6 +4486,7 @@ expire_status_v2() {
4480
4486
verbose "cert will still be valid by expiry window"
4481
4487
else
4482
4488
# cert expiry date
4489
+ cert_not_after_date=
4483
4490
if iso_8601_cert_enddate "$1" cert_not_after_date; then
4484
4491
: # ok
4485
4492
else
@@ -4689,10 +4696,6 @@ Missing request file:
4689
4696
ssl_cert_serial "$crt_in" cert_serial || \
4690
4697
die "$cmd: Failed to get cert serial number!"
4691
4698
4692
- # Duplicate cert by serial file
4693
- dup_dir="$EASYRSA_PKI/certs_by_serial"
4694
- dup_crt_by_serial="$dup_dir/${cert_serial}.pem"
4695
-
4696
4699
# Set out_dir
4697
4700
out_dir="$EASYRSA_PKI/renewed"
4698
4701
crt_out="$out_dir/issued/${file_name_base}.crt"
@@ -4707,6 +4710,7 @@ Use command 'revoke-renewed' to revoke this certificate."
4707
4710
fi
4708
4711
4709
4712
# Extract certificate usage from old cert
4713
+ cert_type=
4710
4714
ssl_cert_x509v3_eku "$crt_in" cert_type
4711
4715
4712
4716
# create temp-file for full cert text
@@ -4972,12 +4976,13 @@ renew_ca_cert() {
4972
4976
$cmd does not support setting an external commonName."
4973
4977
4974
4978
# Copy Old CA commonName as default
4975
- export EASYRSA_REQ_CN="$(
4979
+ EASYRSA_REQ_CN="$(
4976
4980
"$EASYRSA_OPENSSL" x509 -in "$ca_cert_file" \
4977
4981
-noout -subject -nameopt utf8,multiline | \
4978
4982
grep 'commonName' | sed -e \
4979
4983
s\`^[[:blank:]]*commonName[[:blank:]]*=[[:blank:]]\`\`
4980
- )"
4984
+ )" || die "renew_ca_cert - Failed to get EASYRSA_REQ_CN"
4985
+ export EASYRSA_REQ_CN
4981
4986
4982
4987
# Set ssl batch mode, as required
4983
4988
[ "$EASYRSA_BATCH" ] && ssl_batch=1
0 commit comments