BCC: admins@hcoop.net instead of just admins in quotacheck
[hcoop/scripts.git] / ca-sign
1 #!/bin/bash
2 #
3 # Sign a certificate request as a CA. Run this on deleuze as an
4 # admin. If a domain is provided, then the certificate request must
5 # apply only to that domain.
6 #
7 # Run this on deleuze as an admin.
8 #
9 # Usage: ca-sign days request.csr key.asc outfile.pem [domain]
10 #
11 # If we need to generate a new CA private key and cert, do:
12 #
13 # $ openssl genrsa -out private/ca.key 2048 -nodes
14 # $ openssl req -config openssl.cnf -x509 -sha1 -days 3650 \
15 # -key private/ca.key -new -out ca.crt
16
17 if test -n "$6" || test -z "$4"; then
18 echo "Incorrect arguments."
19 echo "Usage: ca-sign days request.csr key.asc outfile.pem [domain]"
20 exit 1
21 fi
22
23 # Make sure we run this from deleuze
24 if test "$(hostname -s)" != "deleuze"; then
25 echo "Error: This script must be run from deleuze."
26 exit 1
27 fi
28
29 DIR=/var/local/lib/ca
30 CONF=$DIR/openssl.cnf
31 POLICY=policy_anything
32
33 # Certificate revocation list
34 CRL1=$DIR/crl-v1
35 CRL2=$DIR/crl-v2
36 CA_LOC=/afs/hcoop.net/user/h/hc/hcoop/public_html/ca
37
38 # Parameters
39 DAYS=$1
40 REQUEST=$2
41 KEY=$3
42 PEM=$4
43 DOMAIN=$5
44
45 # Make sure completed certificate does not already exist
46 if test -e "$PEM"; then
47 echo "Error: Refusing to overwrite existing certificate at"
48 echo " $PEM."
49 exit 1
50 fi
51
52 # Make sure that the key and request do exist
53 if test ! -f "$REQUEST"; then
54 echo "Error: The given certificate request file does not exist."
55 exit 1
56 fi
57 if test ! -f "$KEY"; then
58 echo "Error: The given key file does not exist."
59 exit 1
60 fi
61
62 # Verify request
63 STATUS=$(openssl req -noout -in "$REQUEST" -verify 2>&1)
64 if test "$STATUS" != "verify OK"; then
65 echo "Error: This is not a valid certificate request."
66 exit 1
67 fi
68 if test -n "$DOMAIN"; then
69 CN=$(openssl req -text -in "$REQUEST" | grep "Subject:" | grep "CN=." | \
70 sed -r -e 's/^.*CN=([^/=,]+).*$/\1/1')
71 if test "${CN%%${DOMAIN}}" = "${CN}"; then
72 echo "Error: Domain in cert does not match $DOMAIN."
73 exit 1
74 fi
75 fi
76
77 # Get new serial number
78 ID=$(cat -- $DIR/serial)
79
80 # Exit on error
81 set -e
82
83 # Sign
84 echo "Signing certificate request $REQUEST ..."
85 openssl ca -config $CONF -policy $POLICY -out "$PEM" -in "$REQUEST" \
86 -days "$DAYS"
87 echo
88
89 # Make a copy of the request
90 cp "$REQUEST" $DIR/requests/$ID.csr
91
92 # Append key to generated certificate
93 cat "$KEY" >> "$PEM"
94
95 # Update revocation list.
96 echo "Updating certificate revocation list ..."
97 openssl ca -config $CONF -batch -gencrl -crldays 30 -out $CRL1.pem
98 openssl crl -outform DER -out $CRL1.crl -in $CRL1.pem
99 openssl ca -config $CONF -batch -gencrl -crldays 30 -crlexts crl_ext \
100 -out $CRL2.pem
101 openssl crl -outform DER -out $CRL2.crl -in $CRL2.pem
102 cp $CRL1.crl $CRL2.crl $CA_LOC
103 echo
104
105 echo "Don't forget to run ca-install to install the signed certificate!"