-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathgenerate.sh
More file actions
181 lines (157 loc) · 4.45 KB
/
generate.sh
File metadata and controls
181 lines (157 loc) · 4.45 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
#!/bin/sh
# docker entrypoint script
# generate three tier certificate chain
if [ $RENEW == "yes" ]
then
echo "Renewing. RENEW env var is: $RENEW"
rm "$CERT_DIR/$ROOT_NAME.crt"
rm "$CERT_DIR/$ISSUER_NAME.crt"
rm "$CERT_DIR/$PUBLIC_NAME.crt"
rm "$CERT_DIR/key.pem"
rm "$CERT_DIR/chain.pem"
rm "$CERT_DIR/fullchain.pem"
rm "$CERT_DIR/dhparam.pem"
else
echo "Not renewing. RENEW env var is: $RENEW"
fi
SUBJ="/C=$COUNTRY/ST=$STATE/L=$LOCATION/O=$ORGANISATION"
if [ ! -f "$CERT_DIR/$ROOT_NAME.crt" ]
then
# generate root certificate
echo "ROOT CERTIFICATE"
ROOT_SUBJ="$SUBJ/CN=$ROOT_CN"
echo "Generating RSA: $ROOT_NAME.key"
openssl genrsa \
-out "$ROOT_NAME.key" \
"$RSA_KEY_NUMBITS"
echo "Generating CSR: $ROOT_NAME.csr"
openssl req \
-new \
-key "$ROOT_NAME.key" \
-out "$ROOT_NAME.csr" \
-subj "$ROOT_SUBJ"
echo "Generating root certificate: $ROOT_NAME.crt"
openssl req \
-x509 \
-key "$ROOT_NAME.key" \
-in "$ROOT_NAME.csr" \
-out "$ROOT_NAME.crt" \
-days "$DAYS"
# copy certificate to volume
echo "Copying $ROOT_NAME.crt to $CERT_DIR."
cp "$ROOT_NAME.crt" "$CERT_DIR"
else
echo "ENTRYPOINT: $ROOT_NAME.crt already exists. Making a copy…"
cp "$CERT_DIR/$ROOT_NAME.crt" .
fi
if [ ! -f "$CERT_DIR/$ISSUER_NAME.crt" ]
then
echo "ISSUER CERTIFICATE"
# generate issuer certificate
ISSUER_SUBJ="$SUBJ/CN=$ISSUER_CN"
echo "Generating RSA: $ISSUER_NAME.key"
openssl genrsa \
-out "$ISSUER_NAME.key" \
"$RSA_KEY_NUMBITS"
echo "Generating CSR."
openssl req \
-new \
-key "$ISSUER_NAME.key" \
-out "$ISSUER_NAME.csr" \
-subj "$ISSUER_SUBJ"
echo "Generating issuer certificate: $ISSUER_NAME.crt"
openssl x509 \
-req \
-in "$ISSUER_NAME.csr" \
-CA "$ROOT_NAME.crt" \
-CAkey "$ROOT_NAME.key" \
-out "$ISSUER_NAME.crt" \
-CAcreateserial \
-extfile issuer.ext \
-days "$DAYS"
# copy certificate to volume
echo "Copying $ISSUER_NAME.crt to $CERT_DIR."
cp "$ISSUER_NAME.crt" "$CERT_DIR"
else
echo "ENTRYPOINT: $ISSUER_NAME.crt already exists. Making a copy…"
cp "$CERT_DIR/$ISSUER_NAME.crt" .
fi
if [ ! -f "$CERT_DIR/key.pem" ]
then
# generate public rsa key
echo "Generating RSA: key.pem"
openssl genrsa \
-out "key.pem" \
"$RSA_KEY_NUMBITS"
# copy public rsa key to volume
echo "Copying key.pem to $CERT_DIR"
cp "key.pem" "$CERT_DIR"
else
echo "ENTRYPOINT: key.pem already exists. Making a copy…"
cp "$CERT_DIR/key.pem" .
fi
if [ ! -f "$CERT_DIR/$PUBLIC_NAME.crt" ]
then
# generate public certificate
echo "PUBLIC CERTIFICATE"
PUBLIC_SUBJ="$SUBJ/CN=$PUBLIC_CN"
echo "Generating CSR: $PUBLIC_NAME.csr"
openssl req \
-new \
-key "key.pem" \
-out "$PUBLIC_NAME.csr" \
-subj "$PUBLIC_SUBJ"
# append public cn to subject alt names
echo "Appending to public.ext:"
DNS=""
dnscount=0
for cn in ${PUBLIC_CN//;/ } ; do
dnscount=$((dnscount+1))
echo "DNS.$dnscount = $cn"
echo "DNS.$dnscount = $cn" >> public.ext
done
echo "Generating certificate: $PUBLIC_NAME.crt"
openssl x509 \
-req \
-in "$PUBLIC_NAME.csr" \
-CA "$ISSUER_NAME.crt" \
-CAkey "$ISSUER_NAME.key" \
-out "$PUBLIC_NAME.crt" \
-CAcreateserial \
-extfile public.ext \
-days "$DAYS"
# copy certificate to volume
echo "Copying $PUBLIC_NAME.crt to $CERT_DIR"
cp "$PUBLIC_NAME.crt" "$CERT_DIR"
else
echo "ENTRYPOINT: $PUBLIC_NAME.crt already exists. Making a copy…"
cp "$CERT_DIR/$PUBLIC_NAME.crt" .
fi
if [ ! -f "$CERT_DIR/chain.pem" ]
then
# make combined root and issuer chain.pem
echo "Concat $CERT_DIR/$ISSUER_NAME.crt and $CERT_DIR/$ROOT_NAME.crt into $CERT_DIR/chain.pem"
cat "$CERT_DIR/$ISSUER_NAME.crt" "$CERT_DIR/$ROOT_NAME.crt" > "$CERT_DIR/chain.pem"
else
echo "ENTRYPOINT: chain.pem already exists"
fi
if [ ! -f "$CERT_DIR/fullchain.pem" ]
then
# make combined root and issuer fullchain.pem
echo "Concat $CERT_DIR/$PUBLIC_NAME.crt and $CERT_DIR/chain.pem into $CERT_DIR/fullchain.pem"
cat "$CERT_DIR/$PUBLIC_NAME.crt" "$CERT_DIR/chain.pem" > "$CERT_DIR/fullchain.pem"
else
echo "ENTRYPOINT: fullchain.pem already exists"
fi
if [ ! -f "$CERT_DIR/dhparam.pem" ] && [ $DHPARAMS == "yes" ]
then
# generate dhparam.pem
openssl dhparam -dsaparam -out dhparam.pem 4096
# copy dhparam to volume
echo "Copying dhparam.pem to $CERT_DIR"
cp "dhparam.pem" "$CERT_DIR"
else
echo "ENTRYPOINT: dhparam.pem already exists"
fi
# run command passed to docker run
exec "$@"