summaryrefslogtreecommitdiffstats
path: root/scripts/ca-configure.sh
diff options
context:
space:
mode:
authorEndi Sukma Dewata <edewata@redhat.com>2012-03-20 19:42:14 -0500
committerEndi Sukma Dewata <edewata@redhat.com>2012-03-20 19:42:14 -0500
commitd06a571b5b0a3e079ee3bcc1927bacae474ce200 (patch)
tree5a621ae8ad5e0eab2bd7ff28d6981f4ff746a770 /scripts/ca-configure.sh
parent0bfd291051117ea6af3c2637a764a8f56626f555 (diff)
downloadpki-dev-d06a571b5b0a3e079ee3bcc1927bacae474ce200.tar.gz
pki-dev-d06a571b5b0a3e079ee3bcc1927bacae474ce200.tar.xz
pki-dev-d06a571b5b0a3e079ee3bcc1927bacae474ce200.zip
Added cloning and certificate scripts.
Diffstat (limited to 'scripts/ca-configure.sh')
-rwxr-xr-xscripts/ca-configure.sh24
1 files changed, 13 insertions, 11 deletions
diff --git a/scripts/ca-configure.sh b/scripts/ca-configure.sh
index 892a94c..bbdf33c 100755
--- a/scripts/ca-configure.sh
+++ b/scripts/ca-configure.sh
@@ -2,26 +2,28 @@
PKI_DEV_SRC=`cd .. ; pwd`
+INSTANCE_NAME=pki-ca
PASSWORD=Secret123
-PIN=`grep preop.pin= /var/lib/pki-ca/conf/CS.cfg | awk -F= '{ print $2; }'`
+PIN=`grep preop.pin= /var/lib/$INSTANCE_NAME/conf/CS.cfg | awk -F= '{ print $2; }'`
+REALM=EXAMPLE-COM
CERTS=$PKI_DEV_SRC/certs/ca
rm -rf $CERTS
mkdir -p $CERTS
pkisilent ConfigureCA \
- -cs_hostname `hostname` \
+ -cs_hostname $HOSTNAME \
-cs_port 9443 \
-preop_pin $PIN \
-client_certdb_dir "$CERTS" \
-client_certdb_pwd "$PASSWORD" \
-token_name "internal" \
- -domain_name "Example Domain" \
+ -domain_name "$REALM" \
-subsystem_name "Certificate Authority" \
-ldap_host "localhost" \
-ldap_port "389" \
-base_dn "ou=ca,dc=example,dc=com" \
- -db_name "example.com-pki-ca" \
+ -db_name "example.com-$INSTANCE_NAME" \
-bind_dn "cn=Directory Manager" \
-bind_password "$PASSWORD" \
-remove_data true \
@@ -32,20 +34,20 @@ pkisilent ConfigureCA \
-save_p12 true \
-backup_fname "$CERTS/ca-server-certs.p12" \
-backup_pwd "$PASSWORD" \
- -ca_sign_cert_subject_name "CN=Certificate Authority,OU=pki-ca,O=Example Domain" \
- -ca_ocsp_cert_subject_name "CN=OCSP Signing Certificate,OU=pki-ca,O=Example Domain" \
- -ca_server_cert_subject_name "CN=$HOSTNAME,OU=pki-ca,O=Example Domain" \
- -ca_subsystem_cert_subject_name "CN=CA Subsystem Certificate,OU=pki-ca,O=Example Domain" \
- -ca_audit_signing_cert_subject_name "CN=CA Audit Signing Certificate,OU=pki-ca,O=Example Domain" \
+ -ca_sign_cert_subject_name "CN=Certificate Authority,O=$REALM" \
+ -ca_ocsp_cert_subject_name "CN=OCSP Signing Certificate,O=$REALM" \
+ -ca_server_cert_subject_name "CN=$HOSTNAME,O=$REALM" \
+ -ca_subsystem_cert_subject_name "CN=CA Subsystem Certificate,O=$REALM" \
+ -ca_audit_signing_cert_subject_name "CN=CA Audit Signing Certificate,O=$REALM" \
-admin_user "caadmin" \
-agent_name "caadmin" \
-admin_email "caadmin@example.com" \
-admin_password "$PASSWORD" \
-agent_key_size 2048 \
-agent_key_type rsa \
- -agent_cert_subject "CN=caadmin,UID=caadmin,E=caadmin@example.com,O=Example Domain"
+ -agent_cert_subject "CN=caadmin,UID=caadmin,E=caadmin@example.com,O=$REALM"
echo $PASSWORD > "$CERTS/password.txt"
PKCS12Export -d "$CERTS" -o "$CERTS/ca-client-certs.p12" -p "$CERTS/password.txt" -w "$CERTS/password.txt"
-systemctl restart pki-cad@pki-ca.service
+systemctl restart pki-cad@$INSTANCE_NAME.service