|
@@ -91,6 +91,7 @@ case $key in
|
91
|
91
|
;;
|
92
|
92
|
--ca)
|
93
|
93
|
EXTENSIONS="-extensions v3_ca"
|
|
94
|
+ ORGANISATION="Freedombone-CA"
|
94
|
95
|
;;
|
95
|
96
|
--nodh)
|
96
|
97
|
NODH="true"
|
|
@@ -112,13 +113,21 @@ if ! which openssl > /dev/null ;then
|
112
|
113
|
exit 5689
|
113
|
114
|
fi
|
114
|
115
|
|
115
|
|
-openssl req -x509 $EXTENSIONS -nodes -days 3650 -sha256 -subj "/O=$ORGANISATION/OU=$UNIT/C=$COUNTRY_CODE/ST=$AREA/L=$LOCATION/CN=$HOSTNAME" -newkey rsa:4096 -keyout /etc/ssl/private/$HOSTNAME.key -out /etc/ssl/certs/$HOSTNAME.crt
|
|
116
|
+CERTFILE=$HOSTNAME
|
|
117
|
+if [[ $EXTENSIONS != "" ]]; then
|
|
118
|
+ CERTFILE="ca-$HOSTNAME"
|
|
119
|
+fi
|
|
120
|
+
|
|
121
|
+openssl req -x509 $EXTENSIONS -nodes -days 3650 -sha256 \
|
|
122
|
+ -subj "/O=$ORGANISATION/OU=$UNIT/C=$COUNTRY_CODE/ST=$AREA/L=$LOCATION/CN=$HOSTNAME" \
|
|
123
|
+ -newkey rsa:4096 -keyout /etc/ssl/private/$CERTFILE.key \
|
|
124
|
+ -out /etc/ssl/certs/$HOSTNAME.crt
|
116
|
125
|
if [ ! $NODH ]; then
|
117
|
|
- openssl dhparam -check -text -5 1024 -out /etc/ssl/certs/$HOSTNAME.dhparam
|
|
126
|
+ openssl dhparam -check -text -5 1024 -out /etc/ssl/certs/$CERTFILE.dhparam
|
118
|
127
|
fi
|
119
|
|
-chmod 400 /etc/ssl/private/$HOSTNAME.key
|
120
|
|
-chmod 640 /etc/ssl/certs/$HOSTNAME.crt
|
121
|
|
-chmod 640 /etc/ssl/certs/$HOSTNAME.dhparam
|
|
128
|
+chmod 400 /etc/ssl/private/$CERTFILE.key
|
|
129
|
+chmod 640 /etc/ssl/certs/$CERTFILE.crt
|
|
130
|
+chmod 640 /etc/ssl/certs/$CERTFILE.dhparam
|
122
|
131
|
|
123
|
132
|
if [ -f /etc/init.d/nginx ]; then
|
124
|
133
|
/etc/init.d/nginx reload
|
|
@@ -129,7 +138,7 @@ fi
|
129
|
138
|
if [ ! -d /etc/ssl/mycerts ]; then
|
130
|
139
|
mkdir /etc/ssl/mycerts
|
131
|
140
|
fi
|
132
|
|
-cp /etc/ssl/certs/$HOSTNAME.crt /etc/ssl/mycerts
|
|
141
|
+cp /etc/ssl/certs/$CERTFILE.crt /etc/ssl/mycerts
|
133
|
142
|
|
134
|
143
|
# Create a bundle of your certificates
|
135
|
144
|
cat /etc/ssl/mycerts/*.crt > /etc/ssl/freedombone-bundle.crt
|