diff options
author | Alex Auvolat <alex@adnab.me> | 2022-04-20 15:03:04 +0200 |
---|---|---|
committer | Alex Auvolat <alex@adnab.me> | 2022-04-20 15:03:04 +0200 |
commit | 7c1444b7143710066f5173119a529c3b5e101300 (patch) | |
tree | ec5206aa0986e070b2ebae5fdbea8b385fa01875 /gen_pki | |
parent | a8717f9bf5dbc9b102d872678f4e5d3d2790a408 (diff) | |
download | nixcfg-7c1444b7143710066f5173119a529c3b5e101300.tar.gz nixcfg-7c1444b7143710066f5173119a529c3b5e101300.zip |
Move pki to pass
Diffstat (limited to 'gen_pki')
-rwxr-xr-x | gen_pki | 118 |
1 files changed, 118 insertions, 0 deletions
@@ -0,0 +1,118 @@ +#!/usr/bin/env sh + +set -ex + +cd $(dirname $0) + +CLUSTER="$1" +if [ -z "$CLUSTER" ] || [ ! -d "cluster/$CLUSTER" ]; then + echo "Usage: $0 <cluster name>" + echo "The cluster name must be the name of a subdirectory of cluster/" + exit 1 +fi + +PREFIX="deuxfleurs/cluster/$CLUSTER" + +YEAR=$(date +%Y) +for APP in consul nomad; do + # 1. Create certificate authority + if ! pass $PREFIX/$APP-ca.key >/dev/null; then + echo "Generating $APP CA keys..." + openssl genrsa 4096 | pass insert -m $PREFIX/$APP-ca.key + + openssl req -x509 -new -nodes \ + -key <(pass $PREFIX/$APP-ca.key) -sha256 \ + -days 3650 -subj "/C=FR/O=Deuxfleurs/CN=$APP" \ + | pass insert -m -f $PREFIX/$APP-ca.crt + fi + + CERT="${APP}${YEAR}" + + # 2. Create and sign certificates for inter-node communication + if ! pass $PREFIX/$CERT.crt >/dev/null; then + echo "Generating $CERT agent keys..." + if ! pass $PREFIX/$CERT.key >/dev/null; then + openssl genrsa 4096 | pass insert -m $PREFIX/$CERT.key + fi + openssl req -new -sha256 -key <(pass $PREFIX/$CERT.key) \ + -subj "/C=FR/O=Deuxfleurs/CN=$APP" \ + -out /tmp/tmp-$CLUSTER-$CERT.csr + openssl req -in /tmp/tmp-$CLUSTER-$CERT.csr -noout -text + openssl x509 -req -in /tmp/tmp-$CLUSTER-$CERT.csr \ + -extensions v3_req \ + -extfile <(cat <<EOF +[req] +distinguished_name = req_distinguished_name +req_extensions = v3_req +prompt = no + +[req_distinguished_name] +C = FR +O = Deuxfleurs +CN = $APP + +[v3_req] +keyUsage = keyEncipherment, keyCertSign, dataEncipherment +extendedKeyUsage = serverAuth, clientAuth +subjectAltName = @alt_names + +[alt_names] +DNS.1 = server.$CLUSTER.$APP +DNS.2 = client.$CLUSTER.$APP +DNS.3 = localhost +DNS.4 = 127.0.0.1 +EOF + ) \ + -CA <(pass $PREFIX/$APP-ca.crt) \ + -CAkey <(pass $PREFIX/$APP-ca.key) -CAcreateserial \ + -CAserial /tmp/tmp-$CLUSTER-$CERT.srl \ + -days 700 \ + | pass insert -m $PREFIX/$CERT.crt + rm /tmp/tmp-$CLUSTER-$CERT.{csr,srl} + fi + + # 3. Create client-only certificate used for the CLI + if ! pass $PREFIX/$CERT-client.crt >/dev/null; then + echo "Generating $CERT client keys..." + if ! pass $PREFIX/$CERT-client.key >/dev/null; then + openssl genrsa 4096 | pass insert -m $PREFIX/$CERT-client.key + fi + openssl req -new -sha256 -key <(pass $PREFIX/$CERT-client.key) \ + -subj "/C=FR/O=Deuxfleurs/CN=$APP-client" \ + -out /tmp/tmp-$CLUSTER-$CERT-client.csr + openssl req -in /tmp/tmp-$CLUSTER-$CERT-client.csr -noout -text + openssl x509 -req -in /tmp/tmp-$CLUSTER-$CERT-client.csr \ + -extensions v3_req \ + -extfile <(cat <<EOF +[req] +distinguished_name = req_distinguished_name +req_extensions = v3_req +prompt = no + +[req_distinguished_name] +C = FR +O = Deuxfleurs +CN = $APP-client + +[v3_req] +keyUsage = keyEncipherment, keyCertSign, dataEncipherment +extendedKeyUsage = clientAuth +subjectAltName = @alt_names + +[alt_names] +DNS.1 = client.$CLUSTER.$APP +EOF + ) \ + -CA <(pass $PREFIX/$APP-ca.crt) \ + -CAkey <(pass $PREFIX/$APP-ca.key) \ + -CAcreateserial -days 700 \ + -CAserial /tmp/tmp-$CLUSTER-$CERT-client.srl \ + | pass insert -m $PREFIX/$CERT-client.crt + rm /tmp/tmp-$CLUSTER-$CERT-client.{csr,srl} + fi + + #if [ ! -f $CERT-client.p12 ]; then + # openssl pkcs12 -export -out $CERT-client.p12 \ + # -in $APP-ca.pem -in $CERT-client.crt -inkey $CERT-client.key + #fi +done |