3 targetHost=${targetHost%/}
5 source "$targetHost/config"
7 if [[ ! -f admin-key ]]; then
8 ssh-keygen -t ed25519 -N "" -f admin-key
9 printf >&2 'Warning: generated admin-key without passphrase\n'
12 if [[ "$2" == "install" ]]; then
13 ssh_target "cat >> modules/hop/files/authorized_keys <<< 'command=\"/home/admin/commands\",restrict,pty $(cat admin-key.pub)'"
14 ssh_target -t 'sudo lxc-attach -n hop -- bash -c "ssh-keyscan -H 10.0.3.1 > /home/admin/.ssh/known_hosts"'
15 ssh_target -t 'sudo lxc-attach -n hop -- puppet agent --test --verbose'
23 echo -n "cat >> modules/hop/files/authorized_keys <<< 'command=\"/home/admin/commands\",restrict,pty $(cat admin-key.pub)' && "
24 echo -n 'sudo lxc-attach -n hop -- bash -c "ssh-keyscan -H 10.0.3.1 > /home/admin/.ssh/known_hosts" && '
25 echo 'sudo lxc-attach -n hop -- puppet agent --test --verbose'
26 read -p "Keys installed? " _
30 grep csrf | ${1:-cat} | ${2:-cat} | sed "s/.*value='\([^']*\)'.*/\\1/"
33 [[ -f root.crt ]] || curl -s "http://www.$domain/roots?pem" > root.crt
34 echo "Opening Gigi connection"
35 rm -f $folder/cookie-jar
36 csrf=$(mcurl login -c $folder/cookie-jar|csrf)
37 if ! [[ -f $folder/cookie-jar ]]; then
38 echo "Need cookies." >&2
41 mcurl login --data-urlencode "username=$admin_email" --data-urlencode "password=$admin_password" --data-urlencode "csrf=$csrf" -c $folder/cookie-jar > /dev/null
43 csrf=$(mcurl account/details | csrf "tail -n 1")
44 mcurl account/details --data "orgaForm=orga&org%3A3=yes&csrf=$csrf"
49 csrf=$(mcurl "account/certs/new" | csrf "head -n 1")
51 encoded=$(cat "$csr" | tr '\n' '?' | sed "s/=/%3D/g;s/+/%2B/g;s/\?/%0A/g")
53 mcurl account/certs/new -d "CSR=$encoded&process=Next&csrf=$csrf" > /dev/null
55 serial=$(mcurl account/certs/new -d "$options&OU=&hash_alg=SHA256&validFrom=now&validity=2y&login=1&description=&process=Issue+Certificate&csrf=$csrf" -v 2>&1 | tee $folder/certlog | grep "< Location: " | sed "s_.*/\([a-f0-9]*\)[^0-9]*_\1_")
56 echo "Certificate: $serial"
57 if [[ $serial != "" ]]; then
58 mcurl "account/certs/$serial.crt?chain&noAnchor" > $folder/cert.crt
65 if [[ "$2" == "force" ]]; then
69 admin_ssh "${force}update certs"
74 read -r line <&${COPROC[0]} || break;
76 if [[ "$line" = "SKIP "* ]]; then
77 echo "Skipping: $line"
78 elif [[ "$line" = "ISSUE "* ]]; then
79 openssl req -out $folder/web.req <&${COPROC[0]}
80 echo "CSR received, contacting Gigi"
81 options="profile=server-orga&CN=&SANs=quiz.$domain"
82 case ${line#ISSUE } in
83 "modules/gigi/files/gigi")
84 options="profile=server-orga&CN=&SANs=www.$domain%0Asecure.$domain%0Astatic.$domain%0Aapi.$domain%0A"
86 "modules/pootle/files/web")
87 options="profile=server-orga&CN=&SANs=pootle.$domain"
89 "modules/gigi/files/client")
90 options="profile=mail-orga&CN=&SANs=gigi@$domain"
92 "modules/quiz/files/web")
93 options="profile=server-orga&CN=&SANs=quiz.$domain"
95 "modules/gitweb/files/web")
96 options="profile=server-orga&CN=&SANs=code.$domain"
98 "modules/quiz/files/client")
99 options="profile=client-orga&CN=Quiz+Api+User&SANs=quiz@$domain"
102 echo "Unknown certificate in $line, rejecting"
103 echo "FAIL" >&${COPROC[1]}
107 if issue0 "$options" $folder/web.req; then
108 echo "gigi issued successfully"
109 echo "SUCCESS" >&${COPROC[1]}
111 cnt=$(grep "BEGIN CERTIFICATE" $folder/cert.crt | wc -l)
112 echo "chain of length $cnt"
113 echo "$cnt" >&${COPROC[1]}
114 cat $folder/cert.crt >&${COPROC[1]}
115 read -r reply <&${COPROC[0]};
118 echo "FAIL" >&${COPROC[1]}
120 elif [[ "$line" = "DONE" ]]; then
125 echo "end process" >&${COPROC[1]}
127 mcurl logout > /dev/null
129 if [[ "$updated" == "true" ]]; then
130 admin_ssh -t "reload certs"