]> WPIA git - nre.git/commitdiff
upd: generate drop-in-able configs for gigi
authorFelix Dörre <felix@dogcraft.de>
Sat, 3 Oct 2015 11:40:11 +0000 (13:40 +0200)
committerFelix Dörre <felix@dogcraft.de>
Sat, 3 Oct 2015 12:36:24 +0000 (14:36 +0200)
collectGigiConfig.sh
collectSignerConfig.sh
verify.sh

index af27f02b6e861cd20e707b3c5cc0842a73b824bb..ee8b4f38108cbcfd651d2a32c21773bf042c33b8 100755 (executable)
@@ -7,21 +7,23 @@ year=$1
 . structure
 cd generated
 
-mkdir -p gigi-config/ca
-cp root.ca/key.crt gigi-config/ca/root.crt
+mkdir -p gigi-config/config/ca
+cp root.ca/key.crt gigi-config/config/ca/root.crt
 for ca in $STRUCT_CAS; do
-    cp ${ca}.ca/key.crt gigi-config/ca/${ca}.crt
+    cp ${ca}.ca/key.crt gigi-config/config/ca/${ca}.crt
     [ "$ca" == "env" ] && continue
     for i in $TIME_IDX; do
-       cp ${year}/ca/${ca}_${year}_${i}.crt gigi-config/ca/${ca}_${year}_${i}.crt
+       cp ${year}/ca/${ca}_${year}_${i}.crt gigi-config/config/ca/${ca}_${year}_${i}.crt
     done
 done
 
+cp -R ../profiles gigi-config/config
+
 mkdir -p gigi-config/keys
 for k in ${year}/keys/{api,mail,secure,static,www}.pkcs12; do
    cp $k gigi-config/keys
 done
 
-tar czf gigi-$year.tar.gz -C .. profiles -C generated/gigi-config ca keys
+tar czf gigi-$year.tar.gz -C gigi-config config keys
 
 rm -Rf gigi-config
index 369d1b89560841f097aa5830573ef9e923ce981e..d7c3aa64b70b186f4fd6831ab5d3a35ad00db279 100755 (executable)
@@ -10,7 +10,7 @@ cd generated
 installCommKeys() { # peer (server,client)
     peer="$1"
     mkdir -p signer-config/keys
-    cp ${year}/ca/env_${year}_1.ca/key.crt signer-config/keys/ca.crt
+    cat ${year}/ca/env_${year}_1.ca/key.crt env.ca/key.crt root.ca/key.crt > signer-config/keys/ca.crt
     for file in signer_${peer}.{crt,key}; do
        cp ${year}/keys/$file signer-config/keys/$file
     done
index 3890eb56e2e3aa80d5ed17ddc89a1709b93ab12b..c689eec9db51c832cc473e44f3124a8f9e933bb8 100755 (executable)
--- a/verify.sh
+++ b/verify.sh
@@ -10,6 +10,7 @@ verify(){ # crt, [untrusted], additional
     untrusted="$2"
     [[ "$untrusted" != "" ]] && untrusted="-untrusted $untrusted"
     openssl verify $3 -CAfile root.ca/key.crt $untrusted "$1" || error "$1 did not verify"
+    echo openssl verify $3 -CAfile root.ca/key.crt $untrusted "$1" || error "$1 did not verify"
 }
 
 error() { # message
@@ -71,7 +72,7 @@ done
 # Verify infra keys
 cat env.ca/key.crt $year/ca/env_${year}_1.ca/key.crt > envChain.crt
 
-for key in $SERVER_KEYS; do
+for key in $SERVER_KEYS signer_client signer_server; do
     verify ${year}/keys/$key.crt envChain.crt
     verifyExtlist "$(openssl x509 -in "${year}/keys/$key.crt" -noout -text)" critical "X509v3 Extended Key Usage: 
 "