]> WPIA git - infra.git/blob - manager/admin-manage-certificates
fix: use certificate authentication to request new gigi-certificates
[infra.git] / manager / admin-manage-certificates
1 #!/bin/bash
2 targetHost=$1
3 targetHost=${targetHost%/}
4 source config
5 source "$targetHost/config"
6
7 if [[ ! -f admin-key ]]; then
8     ssh-keygen -t ed25519 -N "" -f admin-key
9     printf >&2 'Warning: generated admin-key without passphrase\n'
10 fi
11
12 if [[ "$2" == "install" ]]; then
13     ssh_target "cat >> modules/hop/files/authorized_keys <<< 'command=\"/home/admin/commands\",restrict,pty $(cat admin-key.pub)'"
14     ssh_target -t 'sudo lxc-attach -n hop -- bash -c "ssh-keyscan -H 10.0.3.1 > /home/admin/.ssh/known_hosts"'
15     ssh_target -t 'sudo lxc-attach -n hop -- puppet agent --test --verbose'
16     exit 0;
17 fi
18
19
20 read_admin_email
21 read_admin_password
22
23 echo -n "cat >> modules/hop/files/authorized_keys <<< 'command=\"/home/admin/commands\",restrict,pty $(cat admin-key.pub)' && "
24 echo -n 'sudo lxc-attach -n hop -- bash -c "ssh-keyscan -H 10.0.3.1 > /home/admin/.ssh/known_hosts" && '
25 echo 'sudo lxc-attach -n hop -- puppet agent --test --verbose'
26 read -p "Keys installed? " _
27 folder=.tmpdata
28 mkdir -p $folder
29 function csrf {
30     grep csrf | ${1:-cat}  | ${2:-cat} | sed "s/.*value='\([^']*\)'.*/\\1/"
31 }
32
33 [[ -f root.crt ]] || curl -s "http://www.$domain/roots?pem" > root.crt
34 echo "Opening Gigi connection"
35 rm -f $folder/cookie-jar
36 curl -v --cacert root.crt -c "$folder/cookie-jar" -E gigi-key.pem "https://secure.$domain/login"
37 if ! [[ -f $folder/cookie-jar ]]; then
38     echo "Need cookies." >&2
39     exit 1;
40 fi
41 csrf=$(mscurl account/details | csrf "tail -n 1")
42 mscurl account/details --data "orgaForm=orga&org%3A3=yes&csrf=$csrf"
43 echo "Gigi is ready"
44 function issue0 {
45     options=$1
46     csr=$2
47     csrf=$(mscurl "account/certs/new" | csrf "head -n 1")
48
49     encoded=$(cat "$csr" | tr '\n' '?' | sed "s/=/%3D/g;s/+/%2B/g;s/\?/%0A/g")
50
51     mscurl account/certs/new -d "CSR=$encoded&process=Next&csrf=$csrf" > /dev/null
52
53     serial=$(mscurl account/certs/new -d "$options&OU=&hash_alg=SHA256&validFrom=now&validity=2y&login=1&description=&process=Issue+Certificate&csrf=$csrf" -v 2>&1 | tee $folder/certlog | grep "< Location: " | sed "s_.*/\([a-f0-9]*\)[^0-9]*_\1_")
54     echo "Certificate: $serial"
55     if [[ $serial != "" ]]; then
56         mscurl "account/certs/$serial.crt?chain&noAnchor" > $folder/cert.crt
57         return 0;
58     else
59         return 1;
60     fi
61 }
62 force=""
63 if [[ "$2" == "force" ]]; then
64     force="force "
65 fi
66 coproc {
67     admin_ssh "${force}update certs"
68     read -r end
69 }
70 updated="false"
71 while true; do
72     read -r line <&${COPROC[0]} || break;
73     echo "Command: $line"
74     if [[ "$line" = "SKIP "* ]]; then
75         echo "Skipping: $line"
76     elif [[ "$line" = "ISSUE "* ]]; then
77         openssl req -out $folder/web.req <&${COPROC[0]}
78         echo "CSR received, contacting Gigi"
79         options="profile=server-orga&CN=&SANs=quiz.$domain"
80         case ${line#ISSUE } in
81             "modules/gigi/files/gigi")
82                 options="profile=server-orga&CN=&SANs=www.$domain%0Asecure.$domain%0Astatic.$domain%0Aapi.$domain%0A"
83                 ;;
84             "modules/pootle/files/web")
85                 options="profile=server-orga&CN=&SANs=pootle.$domain"
86                 ;;
87             "modules/gigi/files/client")
88                 options="profile=mail-orga&CN=&SANs=gigi@$domain"
89                 ;;
90             "modules/quiz/files/web")
91                 options="profile=server-orga&CN=&SANs=quiz.$domain"
92                 ;;
93             "modules/gitweb/files/web")
94                 options="profile=server-orga&CN=&SANs=code.$domain"
95                 ;;
96             "modules/quiz/files/client")
97                 options="profile=client-orga&CN=Quiz+Api+User&SANs=quiz@$domain"
98                 ;;
99             "modules/motion/files/motion")
100                 options="profile=server-orga&CN=&SANs=motion.$domain"
101                 ;;
102             *)
103                 echo "Unknown certificate in $line, rejecting"
104                 echo "FAIL" >&${COPROC[1]}
105                 continue;
106                 ;;
107         esac
108         if issue0 "$options" $folder/web.req; then
109             echo "gigi issued successfully"
110             echo "SUCCESS" >&${COPROC[1]}
111             updated="true"
112             cnt=$(grep "BEGIN CERTIFICATE" $folder/cert.crt | wc -l)
113             echo "chain of length $cnt"
114             echo "$cnt" >&${COPROC[1]}
115             cat $folder/cert.crt >&${COPROC[1]}
116             read -r reply <&${COPROC[0]};
117             echo $reply
118         else
119             echo "FAIL" >&${COPROC[1]}
120         fi
121     elif [[ "$line" = "DONE" ]]; then
122         sleep 1
123         break;
124     fi
125 done
126 echo "end process" >&${COPROC[1]}
127 cat <&${COPROC[0]}
128 mscurl logout > /dev/null
129
130 if [[ "$updated" == "true" ]]; then
131     admin_ssh -t "reload certs"
132 fi