blob: ff0e0c5ee95e6a54eab3f2903eca3d89c065fb77 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
|
#!/bin/bash
# generate new ca certificate, roll over the old one(s)
set -e
key_dir='#ETCDIR#/simple-pki/keys'
if [ -r '#ETCDIR#/simple-pki/ca.conf' ]; then
. '#ETCDIR#/simple-pki/ca.conf'
fi
if [ -f "${key_dir}/${ca_name}.key.new" ] \
&& [ -f "${key_dir}/${ca_name}.crt.new" ]; then
if [ "$(stat -c%Y "${key_dir}/${ca_name}.key.new")" -lt "$(($(date +%s)-60*60*24*30))" ] \
|| [ ! -f "${key_dir}/${ca_name}.key" ] \
|| [ "$(stat -c%Y "${key_dir}/${ca_name}.crt.new")" -lt "$(($(date +%s)-60*60*24*30))" ] \
|| [ ! -f "${key_dir}/${ca_name}.crt" ]; then
mv "${key_dir}/${host_key_file}.key"{.new,}
mv "${key_dir}/${host_key_file}.crt"{.new,}
fi
fi
if [ ! -f "${key_dir}/${ca_name}.key.new" ] \
|| [ ! -f "${key_dir}/${ca_name}.crt.new" ]; then
openssl req -x509 -new \
-newkey rsa:4096 -sha256 \
-keyout "${key_dir}/${ca_name}.key.new" \
-out "${key_dir}/${ca_name}.crt.new" \
-days 365 -nodes \
-subj "${ca_subject}"'/CN=Certification Authority' \
-addext 'subjectKeyIdentifier = hash' \
-addext 'authorityKeyIdentifier = keyid:always, issuer' \
-addext 'basicConstraints = critical, CA:true' \
-addext 'keyUsage = keyCertSign, cRLSign'
done
rsync --ignore-missing-args \
"${key_dir}/${ca_name}.crt"{.new,} \
"${remote_host}:${remote_dir}/"
(
cd "${key_dir}"
printf '%s %s\n' "$(
date -u --iso-8601=seconds -d@$(stat -c%Y "${ca_name}.key") \
| cut -d+ -f1
)" "$(
sha512sum "${ca_name}.key" \
| sed 's/\s\+/ /'
)"
) \
| ssh "${remote_host}" '
cd "'"${remote_dir}"'"
while read -r time sum file; do
rm -f ????-??-??T??\:??\:??".${file}"
mv "${file}" "${time}.${file}"
sed -i '"'"'
/ [^.]\+\.'"'"'"${file//./\.}"'"'"'$/d
'"'"' sha512sums
printf '"'"'%s %s\n'"'"' "${sum}" "${time}.${file}" \
>> sha512sums
done
'
|