summaryrefslogtreecommitdiffstats
path: root/scripts/kra-standalone-sign.sh
diff options
context:
space:
mode:
authorEndi S. Dewata <edewata@redhat.com>2017-07-12 20:23:28 +0200
committerEndi S. Dewata <edewata@redhat.com>2017-07-12 20:23:28 +0200
commitc23e0e44df69e44cb21c0e564ff1a7e2a7b67fd5 (patch)
tree0250e55b5b488999efab3b2f608d05194ae05a30 /scripts/kra-standalone-sign.sh
parent3190be941ce9bb8b05b1bf9d49aa95480c1ba77b (diff)
downloadpki-dev-c23e0e44df69e44cb21c0e564ff1a7e2a7b67fd5.tar.gz
pki-dev-c23e0e44df69e44cb21c0e564ff1a7e2a7b67fd5.tar.xz
pki-dev-c23e0e44df69e44cb21c0e564ff1a7e2a7b67fd5.zip
Updated KRA scripts.
Diffstat (limited to 'scripts/kra-standalone-sign.sh')
-rwxr-xr-xscripts/kra-standalone-sign.sh75
1 files changed, 75 insertions, 0 deletions
diff --git a/scripts/kra-standalone-sign.sh b/scripts/kra-standalone-sign.sh
new file mode 100755
index 0000000..0c6a569
--- /dev/null
+++ b/scripts/kra-standalone-sign.sh
@@ -0,0 +1,75 @@
+#!/bin/sh
+
+rm -f external_ca.cert
+rm -f kra_admin.cert
+rm -f kra_transport.cert
+rm -f kra_storage.cert
+rm -f kra_sslserver.cert
+rm -f kra_subsystem.cert
+rm -f kra_audit_signing.cert
+
+#### CA Cert ####
+
+pki cert-show --output external_ca.cert 0x1
+#pki cert-show --output external_ca_chain.cert 0x1
+
+#### Admin Cert ####
+
+REQUEST_ID=`pki ca-cert-request-submit --profile caUserCert --csr-file kra_admin.csr --subject uid=kraadmin | grep "Request ID:" | awk -F ': ' '{print $2;}'`
+echo Request ID: $REQUEST_ID
+
+CERT_ID=`pki -d ~/.dogtag/pki-tomcat/ca/alias -c Secret.123 -n caadmin ca-cert-request-review --action approve $REQUEST_ID | grep "Certificate ID:" | awk -F ': ' '{print $2;}'`
+echo Certificate ID: $CERT_ID
+
+pki cert-show --output kra_admin.cert $CERT_ID
+
+#### Transport Cert ####
+
+REQUEST_ID=`pki ca-cert-request-submit --profile caTransportCert --csr-file kra_transport.csr | grep "Request ID:" | awk -F ': ' '{print $2;}'`
+echo Request ID: $REQUEST_ID
+
+CERT_ID=`pki -d ~/.dogtag/pki-tomcat/ca/alias -c Secret.123 -n caadmin ca-cert-request-review --action approve $REQUEST_ID | grep "Certificate ID:" | awk -F ': ' '{print $2;}'`
+echo Certificate ID: $CERT_ID
+
+pki cert-show --output kra_transport.cert $CERT_ID
+
+#### Storage Cert ####
+
+REQUEST_ID=`pki ca-cert-request-submit --profile caStorageCert --csr-file kra_storage.csr | grep "Request ID:" | awk -F ': ' '{print $2;}'`
+echo Request ID: $REQUEST_ID
+
+CERT_ID=`pki -d ~/.dogtag/pki-tomcat/ca/alias -c Secret.123 -n caadmin ca-cert-request-review --action approve $REQUEST_ID | grep "Certificate ID:" | awk -F ': ' '{print $2;}'`
+echo Certificate ID: $CERT_ID
+
+pki cert-show --output kra_storage.cert $CERT_ID
+
+#### Server Cert ####
+
+REQUEST_ID=`pki ca-cert-request-submit --profile caServerCert --csr-file kra_sslserver.csr | grep "Request ID:" | awk -F ': ' '{print $2;}'`
+echo Request ID: $REQUEST_ID
+
+CERT_ID=`pki -d ~/.dogtag/pki-tomcat/ca/alias -c Secret.123 -n caadmin ca-cert-request-review --action approve $REQUEST_ID | grep "Certificate ID:" | awk -F ': ' '{print $2;}'`
+echo Certificate ID: $CERT_ID
+
+pki cert-show --output kra_sslserver.cert $CERT_ID
+
+#### Subsystem Cert ####
+
+REQUEST_ID=`pki ca-cert-request-submit --profile caSubsystemCert --csr-file kra_subsystem.csr | grep "Request ID:" | awk -F ': ' '{print $2;}'`
+echo Request ID: $REQUEST_ID
+
+CERT_ID=`pki -d ~/.dogtag/pki-tomcat/ca/alias -c Secret.123 -n caadmin ca-cert-request-review --action approve $REQUEST_ID | grep "Certificate ID:" | awk -F ': ' '{print $2;}'`
+echo Certificate ID: $CERT_ID
+
+pki cert-show --output kra_subsystem.cert $CERT_ID
+
+#### Audit Signing Cert ####
+
+REQUEST_ID=`pki ca-cert-request-submit --profile caSignedLogCert --csr-file kra_audit_signing.csr | grep "Request ID:" | awk -F ': ' '{print $2;}'`
+echo Request ID: $REQUEST_ID
+
+CERT_ID=`pki -d ~/.dogtag/pki-tomcat/ca/alias -c Secret.123 -n caadmin ca-cert-request-review --action approve $REQUEST_ID | grep "Certificate ID:" | awk -F ': ' '{print $2;}'`
+echo Certificate ID: $CERT_ID
+
+pki cert-show --output kra_audit_signing.cert $CERT_ID
+