blob: eaef0f53e7bfd3fe337eca37bdd7d3e90e1b5b13 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
|
#!/bin/sh -x
mkdir -p tmp
ROOT=`cat tmp/rootca.txt`
cat > tmp/subca.cfg << EOF
[DEFAULT]
pki_pin=Secret.123
#pki_https_port=9443
#pki_http_port=9443
#[Tomcat]
#pki_ajp_port=9009
#pki_tomcat_server_port=9005
[CA]
pki_admin_email=caadmin@example.com
pki_admin_name=caadmin
pki_admin_nickname=caadmin
pki_admin_password=Secret.123
pki_admin_uid=caadmin
pki_subordinate=True
pki_issuing_ca_hostname=$ROOT
pki_issuing_ca_https_port=8443
pki_ca_signing_subject_dn=cn=Subordinate CA Signing Certificate,o=SUBORDINATE
pki_client_database_password=Secret.123
pki_client_database_purge=False
pki_client_pkcs12_password=Secret.123
pki_ds_base_dn=dc=ca,dc=pki,dc=example,dc=com
pki_ds_database=ca
pki_ds_password=Secret.123
pki_security_domain_hostname=$ROOT
pki_security_domain_https_port=8443
pki_security_domain_user=caadmin
pki_security_domain_password=Secret.123
#pki_subordinate_create_new_security_domain=True
#pki_subordinate_security_domain_name=SUBORDINATE
#pki_ca_signing_nickname=edewata/%(pki_instance_name)s/ca_signing
#pki_ocsp_signing_nickname=edewata/%(pki_instance_name)s/ca_ocsp_signing
#pki_audit_signing_nickname=edewata/%(pki_instance_name)s/ca_audit_signing
#pki_sslserver_nickname=edewata/%(pki_instance_name)s/sslserver
#pki_subsystem_nickname=edewata/%(pki_instance_name)s/subsystem
pki_ca_signing_nickname=ca_signing
pki_ocsp_signing_nickname=ca_ocsp_signing
pki_audit_signing_nickname=ca_audit_signing
pki_sslserver_nickname=sslserver
pki_subsystem_nickname=subsystem
EOF
pkispawn -v -f tmp/subca.cfg -s CA
|