3 # Sign a certificate request as a CA. Run this on deleuze as an
4 # admin. If a domain is provided, then the certificate request must
5 # apply only to that domain.
7 # Usage: ca-sign days request.csr outfile.pem [domain]
9 if test -n "$5" ||
test -z "$3"; then
10 echo "Incorrect arguments."
11 echo "Usage: ca-sign days request.csr outfile.pem [domain]"
15 # Make sure we run this from deleuze
16 if test "$(hostname -s)" != "deleuze"; then
17 echo "Error: This script must be run from deleuze."
23 POLICY
=policy_anything
25 # Certificate revocation list
28 CA_LOC
=/afs
/hcoop.net
/user
/h
/hc
/hcoop
/public_html
/ca
37 STATUS
=$
(openssl req
-noout -in "$REQUEST" -verify 2>&1)
38 if test "$STATUS" != "verify OK"; then
39 echo "Error: This is not a valid certificate request."
42 if test -n "$DOMAIN"; then
43 CN
=$
(openssl req
-text -in "$REQUEST" |
grep "Subject:" |
grep "CN=." | \
44 sed -r -e 's/^.*CN=([^/=,]+).*$/\1/1')
45 if test "${CN%%${DOMAIN}}" = "${CN}"; then
46 echo "Error: Domain in cert does not match $DOMAIN."
51 # Get new serial number
52 ID
=$
(cat -- $DIR/serial
)
58 echo "Signing certificate request $REQUEST ..."
59 openssl ca
-config $CONF -policy $POLICY -out $PEM -in $REQUEST -days $DAYS
62 # Make a copy of the request
63 cp $REQUEST $DIR/requests
/$ID.csr
65 # Update revocation list.
66 echo "Updating certificate revocation list ..."
67 openssl ca
-config $CONF -batch -gencrl -crldays 30 -out $CRL1.pem
68 openssl crl
-outform DER
-out $CRL1.crl
-in $CRL1.pem
69 openssl ca
-config $CONF -batch -gencrl -crldays 30 -crlexts crl_ext \
71 openssl crl
-outform DER
-out $CRL2.crl
-in $CRL2.pem
72 cp $CRL1.crl
$CRL2.crl
$CA_LOC
75 echo "Don't forget to run ca-install to install the signed certificate!"