blob: eb04e07fa1234e4e757f5b37ba2befff4fc35f06 [file] [log] [blame]
Guillaume Lambert824f9962021-03-09 16:56:08 +01001#!/bin/bash
2
Sylvain Desbureaux16bdf242020-12-07 10:28:24 +01003# Copyright © 2019 Nokia
4#
5# Licensed under the Apache License, Version 2.0 (the "License");
6# you may not use this file except in compliance with the License.
7# You may obtain a copy of the License at
8#
9# http://www.apache.org/licenses/LICENSE-2.0
10#
11# Unless required by applicable law or agreed to in writing, software
12# distributed under the License is distributed on an "AS IS" BASIS,
13# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14# See the License for the specific language governing permissions and
15# limitations under the License.
16
Sylvain Desbureaux16bdf242020-12-07 10:28:24 +010017#
18# Generate HV-VES SSL related certs.
19# Copy the stuff to HV-VES and Robot pods.
20#
21
22
23HVVESPOD=$(kubectl -n $NAMESPACE get pods --no-headers=true -o custom-columns=:metadata.name | grep hv-ves)
24
25
26generate_ca_key_cert () {
guillaume.lambert7bf306e2021-09-08 12:03:22 +020027 openssl genrsa -out $1/ca.key 2048
28 openssl req -new -x509 -days 36500 -key $1/ca.key -out $1/ca.pem -subj /CN=dcae-hv-ves-ca.onap
Sylvain Desbureaux16bdf242020-12-07 10:28:24 +010029}
30
31generate_server_key_csr () {
guillaume.lambert7bf306e2021-09-08 12:03:22 +020032 openssl genrsa -out $1/server.key 2048
33 openssl req -new -key $1/server.key -out $1/server.csr -subj /CN=dcae-hv-ves-collector.onap
Sylvain Desbureaux16bdf242020-12-07 10:28:24 +010034}
35
36generate_client_key_csr () {
guillaume.lambert7bf306e2021-09-08 12:03:22 +020037 openssl genrsa -out $1/client.key 2048
38 openssl req -new -key $1/client.key -out $1/client.csr -subj /CN=dcae-hv-ves-client.onap
Sylvain Desbureaux16bdf242020-12-07 10:28:24 +010039}
40
41sign_server_and_client_cert () {
guillaume.lambert7bf306e2021-09-08 12:03:22 +020042 openssl x509 -req -days 36500 -in $1/server.csr -CA $1/ca.pem -CAkey $1/ca.key -out $1/server.pem -set_serial 00
43 openssl x509 -req -days 36500 -in $1/client.csr -CA $1/ca.pem -CAkey $1/ca.key -out $1/client.pem -set_serial 00
Sylvain Desbureaux16bdf242020-12-07 10:28:24 +010044}
45
46create_pkcs12_ca_and_server () {
guillaume.lambert7bf306e2021-09-08 12:03:22 +020047 openssl pkcs12 -export -out $1/ca.p12 -inkey $1/ca.key -in $1/ca.pem -passout pass:
48 openssl pkcs12 -export -out $1/server.p12 -inkey $1/server.key -in $1/server.pem -passout pass:
Sylvain Desbureaux16bdf242020-12-07 10:28:24 +010049}
50
51copy_server_certs_to_hvves () {
guillaume.lambert7bf306e2021-09-08 12:03:22 +020052 for f in ca.p12 server.p12
53 do
54 kubectl cp $1/$f $2/$3:$4
55 done
Sylvain Desbureaux16bdf242020-12-07 10:28:24 +010056}
57
58copy_client_certs_to_robot () {
guillaume.lambert7bf306e2021-09-08 12:03:22 +020059 for f in ca.pem client.key client.pem
60 do
Sylvain Desbureaux16bdf242020-12-07 10:28:24 +010061 kubectl cp $1/$f $2/$3:$4
62 done
63}
64
65cleanup () {
guillaume.lambert7bf306e2021-09-08 12:03:22 +020066 rm -f $1/ca.??? $1/server.??? s$1/client.???
Sylvain Desbureaux16bdf242020-12-07 10:28:24 +010067}
68
69
70generate_ca_key_cert "$DIR/$SCRIPTDIR"
71generate_server_key_csr "$DIR/$SCRIPTDIR"
72generate_client_key_csr "$DIR/$SCRIPTDIR"
73sign_server_and_client_cert "$DIR/$SCRIPTDIR"
74create_pkcs12_ca_and_server "$DIR/$SCRIPTDIR"
75copy_server_certs_to_hvves "$DIR/$SCRIPTDIR" "$NAMESPACE" "$HVVESPOD" "/tmp"
76copy_client_certs_to_robot "$DIR/$SCRIPTDIR" "$NAMESPACE" "$POD" "/tmp"
77cleanup "$DIR/$SCRIPTDIR"