|
| 1 | +#!/bin/bash |
| 2 | + |
| 3 | +CERTDIR="`pwd`/assets/certs/" |
| 4 | + |
| 5 | +CACONF="${CERTDIR}/openssl.cnf" |
| 6 | +CAKEY="${CERTDIR}/ca/ca.key" |
| 7 | +CACERT="${CERTDIR}/ca/ca.pem" |
| 8 | + |
| 9 | +if [ -f "$CAKEY" ] && [ -f "${CACERT}" ]; then |
| 10 | + echo "Using existing CA private key" |
| 11 | + echo |
| 12 | +else |
| 13 | + # Generate the private key for the CA: |
| 14 | + echo "Generating the key and certificate for the CA server" |
| 15 | + mkdir -p "${CERTDIR}/ca" |
| 16 | + mkdir -p "${CERTDIR}/certs" |
| 17 | + |
| 18 | + # Generate the key and certificate for the CA. |
| 19 | + cat <<EOF | openssl req -config ${CACONF} -nodes -new -x509 -keyout "${CAKEY}" -out "${CACERT}" |
| 20 | +AU |
| 21 | +Western Australia |
| 22 | +Perth |
| 23 | +Moodle Pty Ltd |
| 24 | +Moodle LMS |
| 25 | +
|
| 26 | +
|
| 27 | +EOF |
| 28 | + |
| 29 | + echo "Generated an OpenSSL Certificate Authority" |
| 30 | + touch "${CERTDIR}/ca/index.txt" |
| 31 | + echo '01' > "${CERTDIR}/ca/serial.txt" |
| 32 | + echo |
| 33 | + echo "You should add this certificate to your root certificate store." |
| 34 | + |
| 35 | + OS=`uname -s` |
| 36 | + if [ "${OS}" = "Darwin" ] |
| 37 | + then |
| 38 | + echo "You can use the following command:" |
| 39 | + echo "sudo security add-trusted-cert -d -r trustRoot -k '/Library/Keychains/System.keychain' ${CACERT}" |
| 40 | + read -p "Do you want me to do that for you now? " yn |
| 41 | + case $yn in |
| 42 | + [Yy]* ) sudo security add-trusted-cert -d -r trustRoot -k '/Library/Keychains/System.keychain' "${CACERT}"; break;; |
| 43 | + esac |
| 44 | + fi |
| 45 | + |
| 46 | + if [ "${OS}" = "Linux" ] |
| 47 | + then |
| 48 | + echo "You can use the following command:" |
| 49 | + echo "sudo cp ${CERTDIR}/ca/ca.pem usr/local/share/ca-certificates/moodle-docker-ca.crt && sudo update-ca-certificates" |
| 50 | + read -p "Do you want me to do that for you now? " yn |
| 51 | + case $yn in |
| 52 | + [Yy]* ) sudo cp "${CERTDIR}/ca/ca.pem" usr/local/share/ca-certificates/moodle-docker-ca.crt && sudo update-ca-certificates; break;; |
| 53 | + esac |
| 54 | + |
| 55 | + fi |
| 56 | +fi |
| 57 | + |
| 58 | +if [ "$#" -lt 1 ] |
| 59 | +then |
| 60 | + echo "Usage: Must supply at least one hostname." |
| 61 | + exit 1 |
| 62 | +fi |
| 63 | + |
| 64 | +# The first hostname is canonical. |
| 65 | +DOMAIN=$1 |
| 66 | + |
| 67 | +HOSTKEY="${CERTDIR}/certs/${DOMAIN}.key" |
| 68 | +HOSTCSR="${CERTDIR}/certs/${DOMAIN}.csr" |
| 69 | +HOSTCRT="${CERTDIR}/certs/${DOMAIN}.crt" |
| 70 | +HOSTEXT="${CERTDIR}/certs/${DOMAIN}.ext" |
| 71 | + |
| 72 | +# Create a private key for the dev site: |
| 73 | +echo |
| 74 | +echo "Generating a private key for the $DOMAIN dev site" |
| 75 | +echo |
| 76 | +openssl genrsa -out "${HOSTKEY}" 2048 |
| 77 | + |
| 78 | +echo "Generating a CSR for $DOMAIN" |
| 79 | +cat <<EOF | openssl req -nodes -new -key "${HOSTKEY}" -out "${HOSTCSR}" |
| 80 | +AU |
| 81 | +Western Australia |
| 82 | +Perth |
| 83 | +Moodle Pty Ltd |
| 84 | +Moodle LMS |
| 85 | +
|
| 86 | +
|
| 87 | +EOF |
| 88 | +echo |
| 89 | + |
| 90 | +DNSCOUNT=1 |
| 91 | +for var in "$@" |
| 92 | +do |
| 93 | + DNS=$(cat <<-EOF |
| 94 | +${DNS} |
| 95 | +DNS.${DNSCOUNT} = ${var} |
| 96 | +EOF |
| 97 | +) |
| 98 | + DNSCOUNT=$((DNSCOUNT + 1)) |
| 99 | +done |
| 100 | + |
| 101 | +cat > "${HOSTEXT}" << EOF |
| 102 | +[ req ] |
| 103 | +default_bits = 2048 |
| 104 | +default_keyfile = ${HOSTKEY} |
| 105 | +distinguished_name = server_distinguished_name |
| 106 | +req_extensions = server_req_extensions |
| 107 | +string_mask = utf8only |
| 108 | +
|
| 109 | +[ server_distinguished_name ] |
| 110 | +
|
| 111 | +countryName = Country Name (2 letter code) |
| 112 | +countryName_default = AU |
| 113 | +
|
| 114 | +stateOrProvinceName = State or Province Name (full name) |
| 115 | +stateOrProvinceName_default = Western Australia |
| 116 | +
|
| 117 | +localityName = Locality Name (eg, city) |
| 118 | +localityName_default = Perth |
| 119 | +
|
| 120 | +organizationName = Organization Name (eg, company) |
| 121 | +organizationName_default = Moodle Pty Ltd |
| 122 | +
|
| 123 | +organizationalUnitName = Organizational Unit (eg, division) |
| 124 | +organizationalUnitName_default = Moodle LMS |
| 125 | +
|
| 126 | +commonName = Common Name (e.g. server FQDN or YOUR name) |
| 127 | +commonName_default = ${DOMAIN} |
| 128 | +
|
| 129 | +emailAddress = Email Address |
| 130 | +emailAddress_default = [email protected] |
| 131 | +
|
| 132 | +[ server_req_extensions ] |
| 133 | +subjectKeyIdentifier = hash |
| 134 | +basicConstraints = CA:FALSE |
| 135 | +keyUsage = digitalSignature, nonRepudiation, keyEncipherment, dataEncipherment |
| 136 | +subjectAltName = @alternate_names |
| 137 | +[ alternate_names ] |
| 138 | +$DNS |
| 139 | +EOF |
| 140 | + |
| 141 | +#Next run the command to create the certificate: using our CSR, the CA private key, the CA certificate, and the config file: |
| 142 | +echo "Generating a certificate for $DOMAIN" |
| 143 | +cat <<EOF | openssl req -config "${HOSTEXT}" -newkey rsa:2048 -sha256 -nodes -out "${HOSTCSR}" -outform PEM |
| 144 | +AU |
| 145 | +Western Australia |
| 146 | +Perth |
| 147 | +Moodle Pty Ltd |
| 148 | +Moodle LMS |
| 149 | +
|
| 150 | +
|
| 151 | +EOF |
| 152 | +echo |
| 153 | + |
| 154 | +echo "Signing the request" |
| 155 | +openssl ca -config "${CACONF}" -policy signing_policy -extensions signing_req -out "${HOSTCRT}" -infiles "${HOSTCSR}" |
0 commit comments