From ffba096dc52dedcf851c6a48bbd07c0dda36b998 Mon Sep 17 00:00:00 2001
From: Thomas Woerner <twoerner@redhat.com>
Date: Tue, 21 Jul 2020 12:40:02 +0200
Subject: [PATCH] tests/external-signed-ca-../external-ca.sh: Password too weak
 in FIPS mode

The password that is used in the script to generate the CA and also sign
the CSR is not strong enough in FIPS mode. In normal mode the password was
ok, though.

In FIPS mode the password needs to have at least one upper, lower, digit
and a special char.
---
 tests/external-signed-ca-with-automatic-copy/external-ca.sh | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/tests/external-signed-ca-with-automatic-copy/external-ca.sh b/tests/external-signed-ca-with-automatic-copy/external-ca.sh
index 9bf6f1cc..de5fcecc 100644
--- a/tests/external-signed-ca-with-automatic-copy/external-ca.sh
+++ b/tests/external-signed-ca-with-automatic-copy/external-ca.sh
@@ -8,7 +8,7 @@ if [ -z "$master" ]; then
     exit 0;
 fi
 
-PASSWORD="SomeCApassword"
+PASSWORD="SomeCApassword.123"
 DBDIR="${master}-nssdb"
 PWDFILE="$DBDIR/pwdfile.txt"
 NOISE="$DBDIR/noise.txt"
-- 
GitLab