diff options
author | Endi Sukma Dewata <edewata@redhat.com> | 2012-03-20 19:42:14 -0500 |
---|---|---|
committer | Endi Sukma Dewata <edewata@redhat.com> | 2012-03-20 19:42:14 -0500 |
commit | d06a571b5b0a3e079ee3bcc1927bacae474ce200 (patch) | |
tree | 5a621ae8ad5e0eab2bd7ff28d6981f4ff746a770 /scripts/ca-configure.sh | |
parent | 0bfd291051117ea6af3c2637a764a8f56626f555 (diff) | |
download | pki-dev-d06a571b5b0a3e079ee3bcc1927bacae474ce200.tar.gz pki-dev-d06a571b5b0a3e079ee3bcc1927bacae474ce200.tar.xz pki-dev-d06a571b5b0a3e079ee3bcc1927bacae474ce200.zip |
Added cloning and certificate scripts.
Diffstat (limited to 'scripts/ca-configure.sh')
-rwxr-xr-x | scripts/ca-configure.sh | 24 |
1 files changed, 13 insertions, 11 deletions
diff --git a/scripts/ca-configure.sh b/scripts/ca-configure.sh index 892a94c..bbdf33c 100755 --- a/scripts/ca-configure.sh +++ b/scripts/ca-configure.sh @@ -2,26 +2,28 @@ PKI_DEV_SRC=`cd .. ; pwd` +INSTANCE_NAME=pki-ca PASSWORD=Secret123 -PIN=`grep preop.pin= /var/lib/pki-ca/conf/CS.cfg | awk -F= '{ print $2; }'` +PIN=`grep preop.pin= /var/lib/$INSTANCE_NAME/conf/CS.cfg | awk -F= '{ print $2; }'` +REALM=EXAMPLE-COM CERTS=$PKI_DEV_SRC/certs/ca rm -rf $CERTS mkdir -p $CERTS pkisilent ConfigureCA \ - -cs_hostname `hostname` \ + -cs_hostname $HOSTNAME \ -cs_port 9443 \ -preop_pin $PIN \ -client_certdb_dir "$CERTS" \ -client_certdb_pwd "$PASSWORD" \ -token_name "internal" \ - -domain_name "Example Domain" \ + -domain_name "$REALM" \ -subsystem_name "Certificate Authority" \ -ldap_host "localhost" \ -ldap_port "389" \ -base_dn "ou=ca,dc=example,dc=com" \ - -db_name "example.com-pki-ca" \ + -db_name "example.com-$INSTANCE_NAME" \ -bind_dn "cn=Directory Manager" \ -bind_password "$PASSWORD" \ -remove_data true \ @@ -32,20 +34,20 @@ pkisilent ConfigureCA \ -save_p12 true \ -backup_fname "$CERTS/ca-server-certs.p12" \ -backup_pwd "$PASSWORD" \ - -ca_sign_cert_subject_name "CN=Certificate Authority,OU=pki-ca,O=Example Domain" \ - -ca_ocsp_cert_subject_name "CN=OCSP Signing Certificate,OU=pki-ca,O=Example Domain" \ - -ca_server_cert_subject_name "CN=$HOSTNAME,OU=pki-ca,O=Example Domain" \ - -ca_subsystem_cert_subject_name "CN=CA Subsystem Certificate,OU=pki-ca,O=Example Domain" \ - -ca_audit_signing_cert_subject_name "CN=CA Audit Signing Certificate,OU=pki-ca,O=Example Domain" \ + -ca_sign_cert_subject_name "CN=Certificate Authority,O=$REALM" \ + -ca_ocsp_cert_subject_name "CN=OCSP Signing Certificate,O=$REALM" \ + -ca_server_cert_subject_name "CN=$HOSTNAME,O=$REALM" \ + -ca_subsystem_cert_subject_name "CN=CA Subsystem Certificate,O=$REALM" \ + -ca_audit_signing_cert_subject_name "CN=CA Audit Signing Certificate,O=$REALM" \ -admin_user "caadmin" \ -agent_name "caadmin" \ -admin_email "caadmin@example.com" \ -admin_password "$PASSWORD" \ -agent_key_size 2048 \ -agent_key_type rsa \ - -agent_cert_subject "CN=caadmin,UID=caadmin,E=caadmin@example.com,O=Example Domain" + -agent_cert_subject "CN=caadmin,UID=caadmin,E=caadmin@example.com,O=$REALM" echo $PASSWORD > "$CERTS/password.txt" PKCS12Export -d "$CERTS" -o "$CERTS/ca-client-certs.p12" -p "$CERTS/password.txt" -w "$CERTS/password.txt" -systemctl restart pki-cad@pki-ca.service +systemctl restart pki-cad@$INSTANCE_NAME.service |