- 
                Notifications
    
You must be signed in to change notification settings  - Fork 4
 
[FIX] cert #4
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[FIX] cert #4
Conversation
| 
           
 Alex E seems not to be a GitHub user. You need a GitHub account to be able to sign the CLA. If you have already a GitHub account, please add the email address used for this commit to your account. You have signed the CLA already but the status is still pending? Let us recheck it.  | 
    
          
WalkthroughThe changes update the  Changes
 Sequence Diagram(s)Not applicable: No new features or control flow changes introduced. Estimated code review effort3 (~45 minutes) Possibly related PRs
 Suggested reviewers
 Poem
 Warning There were issues while running some tools. Please review the errors and either fix the tool's configuration or disable the tool if it's a critical failure. 🔧 ESLint
 npm error Exit handler never called! ✨ Finishing Touches
 Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. 🪧 TipsChatThere are 3 ways to chat with CodeRabbit: 
 SupportNeed help? Create a ticket on our support page for assistance with any issues or questions. Note: Be mindful of the bot's finite context window. It's strongly recommended to break down tasks such as reading entire modules into smaller chunks. For a focused discussion, use review comments to chat about specific files and their changes, instead of using the PR comments. CodeRabbit Commands (Invoked using PR comments)
 Other keywords and placeholders
 CodeRabbit Configuration File (
 | 
    
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Actionable comments posted: 0
🧹 Nitpick comments (2)
package.json (1)
3-3: No issues – version bump looks fineThe bump to
0.0.5is syntactically correct and confined to the version field.
Just make sure a matching tag / release-note entry is cut so consumers can pin to the new CA bundle.src/scripts/ca-template.ts (1)
3-184: Single source-of-truth for the CA bundle would simplify maintenance
src/scripts/ca-template.tsandsrc/utils/root-ca.tsboth embed identical PEM arrays.
Duplicating ~100 KB of literal strings bloats the bundle and invites drift.Consider:
- Moving the list to a dedicated
 .pemor.jsonfile committed once,- Re-exporting it from both modules (
 fs.readFileSyncin Node / import in bundlers).That cuts the maintenance surface and prevents accidental divergence.
📜 Review details
Configuration used: CodeRabbit UI
Review profile: CHILL
Plan: Pro
⛔ Files ignored due to path filters (1)
package-lock.jsonis excluded by!**/package-lock.json
📒 Files selected for processing (3)
package.json(1 hunks)src/scripts/ca-template.ts(1 hunks)src/utils/root-ca.ts(5 hunks)
👮 Files not reviewed due to content moderation or server errors (1)
- src/utils/root-ca.ts
 
🔇 Additional comments (2)
src/scripts/ca-template.ts (2)
147-147: Trailing comma now required – change is correctBecause the new certificate follows, adding a comma after the GeoTrust block is mandatory and you did that.
Nothing further here.
148-183: Validate that this cert is a true root CA before adding to ROOT_CASPlease perform the following manual checks on the new Sectigo entry in src/scripts/ca-template.ts (lines 148–183):
- Verify it is self-signed (Issuer == Subject) and its Basic Constraints include
 CA:TRUEwithpathLenConstraint=0.- Confirm its SHA-256 fingerprint appears in Mozilla’s NSS root store.
 If either check fails, this certificate belongs in your intermediate bundle—not in
ROOT_CAS.
Summary by CodeRabbit
New Features
Bug Fixes