blob: 9e144221ddf76d783302d27651880fc36afb7dfd [file] [log] [blame]
#!/bin/bash
log-helper level eq trace && set -x
# This tool helps to generate tls certificates with cfssl
# It takes cfssl configuration from environment variable.
# See cfssl-default-env file
PREFIX=$1
CERT_FILE=$2
KEY_FILE=$3
CA_FILE=$4
log-helper debug "cfssl-helper is launched, everybody on the floor!"
# before 0.2.5 retro compatibility, will be removed.
mkdir -p "${CONTAINER_SERVICE_DIR}/:cfssl/assets/default-ca"
ln -sf "${CONTAINER_SERVICE_DIR}/:ssl-tools/assets/default-ca/default-ca.pem" "${CONTAINER_SERVICE_DIR}/:cfssl/assets/default-ca/default-ca.pem"
if [ -z "${PREFIX}" ] || [ -z "${CERT_FILE}" ] || [ -z "${KEY_FILE}" ] || [ -z "${CA_FILE}" ]; then
log-helper error "Usage: cfssl-helper prefix cert_file key_file ca_file"
exit 1
fi
if [ ! -e "${CERT_FILE}" ] && [ ! -e "${KEY_FILE}" ]; then
log-helper info "No certificate file and certificate key provided, generate:"
log-helper info "${CERT_FILE} and ${KEY_FILE}"
LOG_LEVEL_PARAM=""
case ${CONTAINER_LOG_LEVEL} in
0 )
LOG_LEVEL_PARAM="-loglevel 4";;
1 )
LOG_LEVEL_PARAM="-loglevel 3";;
2 )
LOG_LEVEL_PARAM="-loglevel 2";;
3 )
LOG_LEVEL_PARAM="-loglevel 1";;
4 )
LOG_LEVEL_PARAM="-loglevel 0";;
5 )
LOG_LEVEL_PARAM="-loglevel 0";;
esac
# set env vars
PREFIX=${PREFIX^^} # uppercase
# search for prefixed env var first
# set prefix variable name
# example : PREFIX_CFSSL_REMOTE='MARIADB_CFSSL_REMOTE'
PREFIX_CFSSL_REMOTE=${PREFIX}_CFSSL_REMOTE
PREFIX_CFSSL_REMOTE_HTTPS_CA_CERT=${PREFIX}_CFSSL_REMOTE_HTTPS_CA_CERT
PREFIX_CFSSL_CA_CERT=${PREFIX}_CFSSL_CA_CERT
PREFIX_CFSSL_CA_KEY=${PREFIX}_CFSSL_CA_KEY
PREFIX_CFSSL_CSR=${PREFIX}_CFSSL_CSR
PREFIX_CFSSL_CSR_JSON=${PREFIX}_CFSSL_CSR_JSON
PREFIX_CFSSL_CONFIG=${PREFIX}_CFSSL_CONFIG
PREFIX_CFSSL_CONFIG_JSON=${PREFIX}_CFSSL_CONFIG_JSON
PREFIX_CFSSL_HOSTNAME=${PREFIX}_CFSSL_HOSTNAME
PREFIX_CFSSL_PROFILE=${PREFIX}_CFSSL_PROFILE
PREFIX_CFSSL_LABEL=${PREFIX}_CFSSL_LABEL
PREFIX_CFSSL_RETRY=${PREFIX}_CFSSL_RETRY
PREFIX_CFSSL_RETRY_DELAY=${PREFIX}_CFSSL_RETRY_DELAY
# assign CFSSL_REMOTE=${!PREFIX_CFSSL_REMOTE} if value is not empty otherwise CFSSL_REMOTE=CFSSL_REMOTE
CFSSL_REMOTE=${!PREFIX_CFSSL_REMOTE:-$CFSSL_REMOTE}
CFSSL_REMOTE_HTTPS_CA_CERT=${!PREFIX_CFSSL_REMOTE_HTTPS_CA_CERT:-$CFSSL_REMOTE_HTTPS_CA_CERT}
CFSSL_CA_CERT=${!PREFIX_CFSSL_CA_CERT:-$CFSSL_CA_CERT}
CFSSL_CA_KEY=${!PREFIX_CFSSL_CA_KEY:-$CFSSL_CA_KEY}
CFSSL_CSR=${!PREFIX_CFSSL_CSR:-$CFSSL_CSR}
CFSSL_CSR_JSON=${!PREFIX_CFSSL_CSR_JSON:-$CFSSL_CSR_JSON}
CFSSL_CONFIG=${!PREFIX_CFSSL_CONFIG:-$CFSSL_CONFIG}
CFSSL_CONFIG_JSON=${!PREFIX_CFSSL_CONFIG_JSON:-$CFSSL_CONFIG_JSON}
CFSSL_HOSTNAME=${!PREFIX_CFSSL_HOSTNAME:-$CFSSL_HOSTNAME}
CFSSL_PROFILE=${!PREFIX_CFSSL_PROFILE:-$CFSSL_PROFILE}
CFSSL_LABEL=${!PREFIX_CFSSL_LABEL:-$CFSSL_LABEL}
CFSSL_RETRY=${!PREFIX_CFSSL_RETRY:-$CFSSL_RETRY}
CFSSL_RETRY_DELAY=${!PREFIX_CFSSL_RETRY_DELAY:-$CFSSL_RETRY_DELAY}
source "${CONTAINER_SERVICE_DIR}/:ssl-tools/assets/cfssl-default-env"
# set csr file
CSR_FILE="/tmp/csr-file"
if [ -n "${CFSSL_CSR_JSON}" ]; then
log-helper debug "use CFSSL_CSR_JSON value as csr file"
echo "${CFSSL_CSR_JSON}" > "${CSR_FILE}"
elif [ -n "${CFSSL_CSR}" ]; then
log-helper debug "use ${CFSSL_CSR} as csr file"
cp -f "${CFSSL_CSR}" "${CSR_FILE}"
# it's the default csr
if [ "${CFSSL_CSR}" = "${CFSSL_DEFAULT_CSR}" ]; then
sed -i "s|{{ CFSSL_DEFAULT_CA_CSR_CN }}|${CFSSL_DEFAULT_CA_CSR_CN}|g" "${CSR_FILE}"
sed -i "s|{{ CFSSL_DEFAULT_CA_CSR_KEY_ALGO }}|${CFSSL_DEFAULT_CA_CSR_KEY_ALGO}|g" "${CSR_FILE}"
sed -i "s|{{ CFSSL_DEFAULT_CA_CSR_KEY_SIZE }}|${CFSSL_DEFAULT_CA_CSR_KEY_SIZE}|g" "${CSR_FILE}"
sed -i "s|{{ CFSSL_CERT_ORGANIZATION_UNIT }}|${CFSSL_CERT_ORGANIZATION_UNIT}|g" "${CSR_FILE}"
sed -i "s|{{ CFSSL_DEFAULT_CA_CSR_ORGANIZATION }}|${CFSSL_DEFAULT_CA_CSR_ORGANIZATION}|g" "${CSR_FILE}"
sed -i "s|{{ CFSSL_DEFAULT_CA_CSR_ORGANIZATION_UNIT }}|${CFSSL_DEFAULT_CA_CSR_ORGANIZATION_UNIT}|g" "${CSR_FILE}"
sed -i "s|{{ CFSSL_DEFAULT_CA_CSR_LOCATION }}|${CFSSL_DEFAULT_CA_CSR_LOCATION}|g" "${CSR_FILE}"
sed -i "s|{{ CFSSL_DEFAULT_CA_CSR_STATE }}|${CFSSL_DEFAULT_CA_CSR_STATE}|g" "${CSR_FILE}"
sed -i "s|{{ CFSSL_DEFAULT_CA_CSR_COUNTRY }}|${CFSSL_DEFAULT_CA_CSR_COUNTRY}|g" "${CSR_FILE}"
fi
else
log-helper error "error: no csr file provided"
log-helper error "CFSSL_CSR_JSON and CFSSL_CSR are empty"
exit 1
fi
# generate cert
CONFIG_FILE="/tmp/config-file"
CERT_NAME="cert"
REMOTE_PARAM=""
CA_CERT_PARAM=""
CA_KEY_PARAM=""
CONFIG_PARAM=""
HOSTNAME_PARAM=""
PROFILE_PARAM=""
LABEL_PARAM=""
if [ -n "${CFSSL_REMOTE}" ]; then
REMOTE_PARAM="-remote=${CFSSL_REMOTE}"
# add remote https ca cert to known certificates if not empty
if [ -n "${CFSSL_REMOTE_HTTPS_CA_CERT}" ]; then
if [ -e "${CFSSL_REMOTE_HTTPS_CA_CERT}" ]; then
[[ ! -d "/etc/ssl/certs/" ]] && mkdir -p /etc/ssl/certs/
cat "${CFSSL_REMOTE_HTTPS_CA_CERT}" >> /etc/ssl/certs/ca-certificates.crt
else
log-helper error "error: remote https ca cert file ${CFSSL_REMOTE_HTTPS_CA_CERT} not found"
fi
fi
else
# files path with : may cause issue with cfssl tools due to :
# ReadBytes - https://github.com/cloudflare/cfssl/blob/master/helpers/helpers.go#L573
# : is used to split env from file path
# so we copy ca cert and key to tmp
if [ -n "${CFSSL_CA_CERT}" ]; then
CFSSL_CA_CERT_FILE="/tmp/ca-cert-file"
cp -f "${CFSSL_CA_CERT}" "${CFSSL_CA_CERT_FILE}"
chmod 644 "${CFSSL_CA_CERT_FILE}"
CA_CERT_PARAM="-ca ${CFSSL_CA_CERT_FILE}"
fi
if [ -n "${CFSSL_CA_KEY}" ]; then
CFSSL_CA_KEY_FILE="/tmp/ca-key-file"
cp -f "${CFSSL_CA_KEY}" "${CFSSL_CA_KEY_FILE}"
chmod 600 "${CFSSL_CA_CERT_FILE}"
CA_KEY_PARAM="-ca-key ${CFSSL_CA_KEY_FILE}"
fi
fi
if [ -n "${CFSSL_CONFIG_JSON}" ]; then
log-helper debug "use CFSSL_CONFIG_JSON value as config file"
echo "${CFSSL_CONFIG_JSON}" > "${CONFIG_FILE}"
CONFIG_PARAM="-config ${CONFIG_FILE}"
elif [ -n "${CFSSL_CONFIG}" ]; then
log-helper debug "use ${CFSSL_CONFIG} as config file"
cp -f "${CFSSL_CONFIG}" "${CONFIG_FILE}"
CONFIG_PARAM="-config ${CONFIG_FILE}"
fi
if [ -n "$ADDITIONAL_HOSTNAMES" ]; then
log-helper debug "additional hostnames found"
CFSSL_HOSTNAME="${CFSSL_HOSTNAME},${ADDITIONAL_HOSTNAMES}"
fi
[[ -n "${CFSSL_HOSTNAME}" ]] && HOSTNAME_PARAM="-hostname ${CFSSL_HOSTNAME}"
[[ -n "${CFSSL_PROFILE}" ]] && PROFILE_PARAM="-profile ${CFSSL_PROFILE}"
[[ -n "${CFSSL_LABEL}" ]] && LABEL_PARAM="-label ${CFSSL_LABEL}"
retry=0
while [ $retry -lt "${CFSSL_RETRY}" ]; do
log-helper debug "cfssl gencert ${LOG_LEVEL_PARAM} ${REMOTE_PARAM} ${CA_CERT_PARAM} ${CA_KEY_PARAM} ${CONFIG_PARAM} ${HOSTNAME_PARAM} ${PROFILE_PARAM} ${LABEL_PARAM} ${CSR_FILE} | cfssljson -bare /tmp/${CERT_NAME}"
eval cfssl gencert "${LOG_LEVEL_PARAM}" "${REMOTE_PARAM}" "${CA_CERT_PARAM}" "${CA_KEY_PARAM}" "${CONFIG_PARAM}" "${HOSTNAME_PARAM}" "${PROFILE_PARAM}" "${LABEL_PARAM}" "${CSR_FILE}" | cfssljson -bare "/tmp/${CERT_NAME}" && break
sleep "${CFSSL_RETRY_DELAY}"
((retry++))
done
# move generated files
[[ ! -e "/tmp/${CERT_NAME}.pem" ]] && exit 1
log-helper debug "move /tmp/${CERT_NAME}.pem to ${CERT_FILE}"
mv "/tmp/${CERT_NAME}.pem" "${CERT_FILE}"
log-helper debug "move /tmp/${CERT_NAME}-key.pem to ${KEY_FILE}"
mv "/tmp/${CERT_NAME}-key.pem" "${KEY_FILE}"
# if ca file don't exists
if [ ! -e "${CA_FILE}" ]; then
if [ -n "${CFSSL_REMOTE}" ]; then
log-helper debug "Get CA certificate from ${CFSSL_REMOTE}"
retry=0
while [ $retry -lt "${CFSSL_RETRY}" ]; do
log-helper debug "cfssl info ${LOG_LEVEL_PARAM} ${REMOTE_PARAM} ${CONFIG_PARAM} ${PROFILE_PARAM} ${LABEL_PARAM}"
eval cfssl info "${LOG_LEVEL_PARAM}" "${REMOTE_PARAM}" "${CONFIG_PARAM}" "${PROFILE_PARAM}" "${LABEL_PARAM}" | sed -e "s/.*certificate\":\"\(.*-----\)\".*/\1/g" | sed 's/\\n/\n/g' > "${CA_FILE}" && log-helper debug "CA certificate returned save as ${CA_FILE}" && break
sleep "${CFSSL_RETRY_DELAY}"
((retry++))
done
[[ ! -e "${CA_FILE}" ]] && exit 1
elif [ -n "${CFSSL_CA_CERT}" ]; then
log-helper info "Link ${CFSSL_CA_CERT} to ${CA_FILE}"
ln -sf "${CFSSL_CA_CERT}" "${CA_FILE}"
fi
fi
# delete tmp files
rm -f /tmp/${CERT_NAME}.csr ${CONFIG_FILE} "${CSR_FILE}"
[[ -e "${CFSSL_CA_CERT_FILE}" ]] && rm "${CFSSL_CA_CERT_FILE}"
[[ -e "${CFSSL_CA_KEY_FILE}" ]] && rm "${CFSSL_CA_KEY_FILE}"
log-helper debug "done :)"
elif [ ! -e "${KEY_FILE}" ]; then
log-helper error "Certificate file ${CERT_FILE} exists but not key file ${KEY_FILE}"
exit 1
elif [ ! -e "${CERT_FILE}" ]; then
log-helper error "Key file ${KEY_FILE} exists but not certificate file ${CERT_FILE}"
exit 1
else
log-helper debug "Files ${CERT_FILE} and ${KEY_FILE} exists, fix files permissions"
chmod 644 "${CERT_FILE}"
chmod 600 "${KEY_FILE}"
fi