Subversion Repositories ALCASAR

Rev

Rev 1934 | Rev 1961 | Go to most recent revision | Only display areas with differences | Ignore whitespace | Details | Blame | Last modification | View Log

Rev 1934 Rev 1941
1
#!/bin/sh
1
#!/bin/sh
2
 
2
 
3
# alcasar-importcert.sh
3
# alcasar-importcert.sh
4
# by Raphaël, Hugo, Clément, Bettyna & rexy
4
# by Raphaël, Hugo, Clément, Bettyna & rexy
5
 
5
 
6
# This script is distributed under the Gnu General Public License (GPL)
6
# This script is distributed under the Gnu General Public License (GPL)
7
 
7
 
8
# Script permettant
8
# Script permettant
9
# - d'importer des certificats sur Alcasar
9
# - d'importer des certificats sur Alcasar
10
# - de revenir au certificat par default
10
# - de revenir au certificat par default
11
 
11
 
12
# This script allows
12
# This script allows
13
# - to import a certificate in Alcasar
13
# - to import a certificate in Alcasar
14
# - to go back to the default certificate
14
# - to go back to the default certificate
15
 
15
 
16
SED="/bin/sed -ri"
16
SED="/bin/sed -ri"
17
DIR_CERT="/etc/pki/tls"
17
DIR_CERT="/etc/pki/tls"
18
CONF_FILE="/usr/local/etc/alcasar.conf"
18
CONF_FILE="/usr/local/etc/alcasar.conf"
19
PRIVATE_IP_MASK=`grep PRIVATE_IP $CONF_FILE|cut -d"=" -f2`
19
PRIVATE_IP_MASK=`grep PRIVATE_IP $CONF_FILE|cut -d"=" -f2`
20
PRIVATE_IP=`echo $PRIVATE_IP_MASK | cut -d"/" -f1`
20
PRIVATE_IP=`echo $PRIVATE_IP_MASK | cut -d"/" -f1`
21
DEFAULT_FQDN='alcasar.localdomain'
21
DEFAULT_FQDN='alcasar.localdomain'
22
 
22
 
23
usage="Usage: alcasar-importcert.sh -i /path/to/certificate.crt -k /path/to/privatekey.key (-c /path/to/serverchain.crt) || alcasar-importcert.sh -d (Cette utilisation permet de revenir au certificat par default)"
23
usage="Usage: alcasar-importcert.sh -i /path/to/certificate.crt -k /path/to/privatekey.key (-c /path/to/serverchain.crt) || alcasar-importcert.sh -d (Cette utilisation permet de revenir au certificat par default)"
24
nb_args=$#
24
nb_args=$#
25
arg1=$1
25
arg1=$1
26
 
26
 
27
 
27
 
28
function defaultNdd()
28
function defaultNdd()
29
{
29
{
30
	$SED "s/^HOSTNAME=.*/HOSTNAME=alcasar/g" /usr/local/etc/alcasar.conf
30
	$SED "s/^HOSTNAME=.*/HOSTNAME=alcasar/g" /usr/local/etc/alcasar.conf
31
	$SED "s/^DOMAIN=.*/DOMAIN=localdomain/g" /usr/local/etc/alcasar.conf
31
	$SED "s/^DOMAIN=.*/DOMAIN=localdomain/g" /usr/local/etc/alcasar.conf
32
	$SED "s/\.([a-zA-Z][a-zA-Z0-9-]+(\.[a-z]{2,4})?)/.localdomain/g" /etc/hosts
32
	$SED "s/\.([a-zA-Z][a-zA-Z0-9-]+(\.[a-z]{2,4})?)/.localdomain/g" /etc/hosts
33
	$SED "s/alcasar\.([a-zA-Z0-9-]+(\.[a-z]{2,4})?)/alcasar.localdomain/g" /etc/chilli.conf
33
	$SED "s/alcasar\.([a-zA-Z0-9-]+(\.[a-z]{2,4})?)/alcasar.localdomain/g" /etc/chilli.conf
34
	$SED "s/^domain.*/domain\t\tlocaldomain/g" /etc/chilli.conf
34
	$SED "s/^domain.*/domain\t\tlocaldomain/g" /etc/chilli.conf
35
	$SED "s/^ServerName.*/ServerName alcasar.localdomain/g" /etc/httpd/conf/httpd.conf
35
	$SED "s/^ServerName.*/ServerName alcasar.localdomain/g" /etc/httpd/conf/httpd.conf
36
	$SED "s/^domain=.*/domain=localdomain/g" /etc/dnsmasq.conf /etc/dnsmasq-blackhole.conf /etc/dnsmasq-blacklist.conf /etc/dnsmasq-whitelist.conf
36
	$SED "s/^domain=.*/domain=localdomain/g" /etc/dnsmasq.conf /etc/dnsmasq-blackhole.conf /etc/dnsmasq-blacklist.conf /etc/dnsmasq-whitelist.conf
37
	hostnamectl set-hostname alcasar.localdomain
37
	hostnamectl set-hostname alcasar.localdomain
38
	$SED "s/^\tErrorDocument.*/\tErrorDocument 404 https:\/\/alcasar.localdomain\//g" /etc/httpd/conf/webapps.d/alcasar.conf
38
	$SED "s/^\tErrorDocument.*/\tErrorDocument 404 https:\/\/alcasar.localdomain\//g" /etc/httpd/conf/webapps.d/alcasar.conf
39
	$SED "s/^\tAuthDigestDomain.*/\tAuthDigestDomain alcasar.localdomain/g" /etc/httpd/conf/webapps.d/alcasar.conf
39
	$SED "s/^\tAuthDigestDomain.*/\tAuthDigestDomain alcasar.localdomain/g" /etc/httpd/conf/webapps.d/alcasar.conf
40
	$SED "s/^    ServerName.*/    ServerName alcasar.localdomain/g" /etc/httpd/conf/sites.d/00_default_vhosts.conf /etc/httpd/conf/sites.d/00_default_ssl_vhost.conf
40
	$SED "s/^    ServerName.*/    ServerName alcasar.localdomain/g" /etc/httpd/conf/sites.d/00_default_vhosts.conf /etc/httpd/conf/sites.d/00_default_ssl_vhost.conf
41
}
41
}
42
 
42
 
43
function defaultCert()
43
function defaultCert()
44
{
44
{
45
	mv -f $DIR_CERT/certs/alcasar.crt.old $DIR_CERT/certs/alcasar.crt
45
	mv -f $DIR_CERT/certs/alcasar.crt.old $DIR_CERT/certs/alcasar.crt
46
	mv -f $DIR_CERT/private/alcasar.key.old $DIR_CERT/private/alcasar.key
46
	mv -f $DIR_CERT/private/alcasar.key.old $DIR_CERT/private/alcasar.key
47
	if [ -f $DIR_CERT/certs/server-chain.crt.old ]
47
	if [ -f $DIR_CERT/certs/server-chain.crt.old ]
48
	then
48
	then
49
		mv $DIR_CERT/certs/server-chain.crt.old $DIR_CERT/certs/server-chain.crt
49
		mv $DIR_CERT/certs/server-chain.crt.old $DIR_CERT/certs/server-chain.crt
50
	#else 
50
	#else 
51
	#	rm -f $DIR_CERT/certs/server-chain.crt
51
	#	rm -f $DIR_CERT/certs/server-chain.crt
52
	fi
52
	fi
53
}
53
}
54
 
54
 
55
function domainName() # change the domain name in the conf files
55
function domainName() # change the domain name in the conf files
56
{
56
{
57
 
-
 
58
	fqdn=$(openssl x509 -noout -subject -in $cert | sed -n '/^subject/s/^.*CN=//p' | cut -d'/' -f 1)
57
	fqdn=$(openssl x509 -noout -subject -in $cert | sed -n '/^subject/s/^.*CN=//p' | cut -d'/' -f 1)
59
 
58
 
60
        #check if there is a wildcard in $fqdn
59
        #check if there is a wildcard in $fqdn
61
        mystar='*'
-
 
62
        if [[ $fqdn == *"${mystar}"* ]];
60
        if [[ $fqdn == *"*"* ]];
63
        then
61
        then
64
                hostname="alcasar"
62
                hostname="alcasar"
65
                fqdn=${fqdn/$mystar/$hostname}
63
                fqdn=${fqdn/"*"/$hostname}
66
        else
64
        else
67
                hostname=`echo $fqdn | awk -F'.' '{ print $1 }'`
65
                hostname=`echo $fqdn | awk -F'.' '{ print $1 }'`
68
        fi
66
        fi
69
        domain=`echo $fqdn | awk -F'.' '{$1="";OFS=".";print $0}' |sed 's/^.//'`
67
        domain=`echo $fqdn | awk -F'.' '{$1="";OFS=".";print $0}' |sed 's/^.//'`
70
        echo "fqdn=$fqdn hostname=$hostname domain=$domain"
68
        echo "fqdn=$fqdn hostname=$hostname domain=$domain"
71
 
69
 
72
        #check fqdn format      
70
        #check fqdn format      
73
        if [[ "$fqdn" != "" && "$domain" != "" && "$hostname" == "alcasar" ]];
71
        if [[ "$fqdn" != "" && "$domain" != "" && "$hostname" == "alcasar" ]];
74
	then
72
	then
75
		$SED "s/^HOSTNAME=.*/HOSTNAME=$hostname/g" /usr/local/etc/alcasar.conf
73
		$SED "s/^HOSTNAME=.*/HOSTNAME=$hostname/g" /usr/local/etc/alcasar.conf
76
		$SED "s/^DOMAIN=.*/DOMAIN=$domain/g" /usr/local/etc/alcasar.conf
74
		$SED "s/^DOMAIN=.*/DOMAIN=$domain/g" /usr/local/etc/alcasar.conf
77
		cat <<EOF > /etc/hosts
75
		cat <<EOF > /etc/hosts
78
127.0.0.1	localhost
76
127.0.0.1	localhost
79
$PRIVATE_IP	$fqdn $hostname
77
$PRIVATE_IP	$fqdn $hostname
80
EOF
78
EOF
81
		$SED "s/^domain.*/domain\t\t$domain/g" /etc/chilli.conf
79
		$SED "s/^domain.*/domain\t\t$domain/g" /etc/chilli.conf
82
		$SED "s/^locationname.*/locationname\t$fqdn/g" /etc/chilli.conf
80
		$SED "s/^locationname.*/locationname\t$fqdn/g" /etc/chilli.conf
83
		$SED "s/^uamserver.*/uamserver\thttps:\/\/$fqdn\/intercept.php/g" /etc/chilli.conf
81
		$SED "s/^uamserver.*/uamserver\thttps:\/\/$fqdn\/intercept.php/g" /etc/chilli.conf
84
		$SED "s/^radiusnasid.*/radiusnasid\t$fqdn/g" /etc/chilli.conf
82
		$SED "s/^radiusnasid.*/radiusnasid\t$fqdn/g" /etc/chilli.conf
85
		$SED "s/^uamallowed.*/uamallowed\t$hostname,$fqdn/g" /etc/chilli.conf
83
		$SED "s/^uamallowed.*/uamallowed\t$hostname,$fqdn/g" /etc/chilli.conf
86
		$SED "s/^ServerName.*/ServerName $fqdn/g" /etc/httpd/conf/httpd.conf
84
		$SED "s/^ServerName.*/ServerName $fqdn/g" /etc/httpd/conf/httpd.conf
87
		$SED "s/^domain=.*/domain=$domain/g" /etc/dnsmasq.conf /etc/dnsmasq-blackhole.conf /etc/dnsmasq-blacklist.conf /etc/dnsmasq-whitelist.conf
85
		$SED "s/^domain=.*/domain=$domain/g" /etc/dnsmasq.conf /etc/dnsmasq-blackhole.conf /etc/dnsmasq-blacklist.conf /etc/dnsmasq-whitelist.conf
88
		hostnamectl set-hostname $fqdn
86
		hostnamectl set-hostname $fqdn
89
		$SED "s/^\tErrorDocument.*/\tErrorDocument 404 https:\/\/$fqdn\//g" /etc/httpd/conf/webapps.d/alcasar.conf
87
		$SED "s/^\tErrorDocument.*/\tErrorDocument 404 https:\/\/$fqdn\//g" /etc/httpd/conf/webapps.d/alcasar.conf
90
		$SED "s/^\tAuthDigestDomain.*/\tAuthDigestDomain $fqdn/g" /etc/httpd/conf/webapps.d/alcasar.conf
88
		$SED "s/^\tAuthDigestDomain.*/\tAuthDigestDomain $fqdn/g" /etc/httpd/conf/webapps.d/alcasar.conf
91
		$SED "s/^    ServerName.*/    ServerName $fqdn/g" /etc/httpd/conf/sites.d/00_default_vhosts.conf /etc/httpd/conf/sites.d/00_default_ssl_vhost.conf /etc/httpd/conf/vhosts-ssl.default
89
		$SED "s/^    ServerName.*/    ServerName $fqdn/g" /etc/httpd/conf/sites.d/00_default_vhosts.conf /etc/httpd/conf/sites.d/00_default_ssl_vhost.conf /etc/httpd/conf/vhosts-ssl.default
92
	fi
90
	fi
93
}
91
}
94
 
92
 
95
function certImport()
93
function certImport()
96
{
94
{
97
	if [ ! -f "$DIR_CERT/certs/alcasar.crt.old" ]
95
	if [ ! -f "$DIR_CERT/certs/alcasar.crt.old" ]
98
	then
96
	then
99
		echo "Backup of old cert (alcasar.crt)"
97
		echo "Backup of old cert (alcasar.crt)"
100
		mv $DIR_CERT/certs/alcasar.crt $DIR_CERT/certs/alcasar.crt.old
98
		mv $DIR_CERT/certs/alcasar.crt $DIR_CERT/certs/alcasar.crt.old
101
	fi
99
	fi
102
	if [ ! -f "$DIR_CERT/private/alcasar.key.old" ]
100
	if [ ! -f "$DIR_CERT/private/alcasar.key.old" ]
103
	then
101
	then
104
		echo "Backup of old private key (alcasar.key)"
102
		echo "Backup of old private key (alcasar.key)"
105
		mv $DIR_CERT/private/alcasar.key $DIR_CERT/private/alcasar.key.old
103
		mv $DIR_CERT/private/alcasar.key $DIR_CERT/private/alcasar.key.old
106
	fi
104
	fi
107
	cp $cert $DIR_CERT/certs/alcasar.crt
105
	cp $cert $DIR_CERT/certs/alcasar.crt
108
	cp $key $DIR_CERT/private/alcasar.key
106
	cp $key $DIR_CERT/private/alcasar.key
109
 
107
 
110
	rm $cert $key
108
	rm $cert $key
111
 
109
 
112
	chown root:apache $DIR_CERT/certs/alcasar.crt
110
	chown root:apache $DIR_CERT/certs/alcasar.crt
113
	chown root:apache $DIR_CERT/private/alcasar.key
111
	chown root:apache $DIR_CERT/private/alcasar.key
114
 
112
 
115
	chmod 750 $DIR_CERT/certs/alcasar.crt
113
	chmod 750 $DIR_CERT/certs/alcasar.crt
116
	chmod 750 $DIR_CERT/private/alcasar.key
114
	chmod 750 $DIR_CERT/private/alcasar.key
117
	if [ "$sc" != "" ]
115
	if [ "$sc" != "" ]
118
	then
116
	then
119
		echo "cert-chain exists"
117
		echo "cert-chain exists"
120
		if [ ! -f "$DIR_CERT/certs/server-chain.crt.old" ]
118
		if [ ! -f "$DIR_CERT/certs/server-chain.crt.old" ]
121
		then
119
		then
122
			echo "Backup of old cert-chain (server-chain.crt)"
120
			echo "Backup of old cert-chain (server-chain.crt)"
123
			mv $DIR_CERT/certs/server-chain.crt $DIR_CERT/certs/server-chain.crt.old
121
			mv $DIR_CERT/certs/server-chain.crt $DIR_CERT/certs/server-chain.crt.old
124
		fi
122
		fi
125
		cp $sc $DIR_CERT/certs/server-chain.crt
123
		cp $sc $DIR_CERT/certs/server-chain.crt
126
		rm $sc
124
		rm $sc
127
		chown root:apache $DIR_CERT/certs/server-chain.crt
125
		chown root:apache $DIR_CERT/certs/server-chain.crt
128
		chmod 750 $DIR_CERT/certs/server-chain.crt
126
		chmod 750 $DIR_CERT/certs/server-chain.crt
129
	fi
127
	fi
130
}
128
}
131
 
129
 
132
 
130
 
133
if [ $nb_args -eq 0 ]
131
if [ $nb_args -eq 0 ]
134
then
132
then
135
	echo "$usage"
133
	echo "$usage"
136
	exit 1
134
	exit 1
137
fi
135
fi
138
 
136
 
139
case $arg1 in
137
case $arg1 in
140
	-\? | -h* | --h*)
138
	-\? | -h* | --h*)
141
		echo "$usage"
139
		echo "$usage"
142
		exit 0
140
		exit 0
143
		;;
141
		;;
144
	-i)
142
	-i)
145
		arg3=$3
143
		arg3=$3
146
		arg5=$5
144
		arg5=$5
147
		cert=$2
145
		cert=$2
148
		key=$4
146
		key=$4
149
		sc=$6
147
		sc=$6
150
 
148
 
151
		if [ "$cert" == "" ] || [ "$key" == "" ]
149
		if [ "$cert" == "" ] || [ "$key" == "" ]
152
		then
150
		then
153
			echo "$usage"
151
			echo "$usage"
154
			exit 1
152
			exit 1
155
		fi
153
		fi
156
 
154
 
157
		if [ ! -f "$cert" -o ! -f "$key" ]
155
		if [ ! -f "$cert" -o ! -f "$key" ]
158
		then
156
		then
159
			echo "Certificate and/or private key not found"
157
			echo "Certificate and/or private key not found"
160
			exit 1
158
			exit 1
161
		fi
159
		fi
162
 
160
 
163
		if [ ${cert: -4} != ".crt" ]
161
		if [ ${cert: -4} != ".crt" ]
164
		then
162
		then
165
			echo "Invalid certificate file"
163
			echo "Invalid certificate file"
166
			exit 1
164
			exit 1
167
		fi
165
		fi
168
 
166
 
169
		if [ ${key: -4} != ".key" ]
167
		if [ ${key: -4} != ".key" ]
170
		then
168
		then
171
			echo "Invalid private key"
169
			echo "Invalid private key"
172
			exit 1
170
			exit 1
173
		fi
171
		fi
174
 
172
 
175
		if [ "$arg5" != "-c" ] || [ ! -f "$sc" ]
173
		if [ "$arg5" != "-c" ] || [ ! -f "$sc" ]
176
		then
174
		then
177
			echo "No server-chain given"
175
			echo "No server-chain given"
178
			echo "Importing certificate $cert with private key $key"
176
			echo "Importing certificate $cert with private key $key"
179
			sc=""
177
			sc=""
180
		else
178
		else
181
			echo "Importing certificate $cert with private key $key and server-chain $sc"
179
			echo "Importing certificate $cert with private key $key and server-chain $sc"
182
		fi
180
		fi
183
		domainName $cert
181
		domainName $cert
184
		certImport $cert $key $sc
182
		certImport $cert $key $sc
185
		for services in chilli dnsmasq dnsmasq-blackhole dnsmasq-blacklist dnsmasq-whitelist httpd
183
		for services in chilli dnsmasq dnsmasq-blackhole dnsmasq-blacklist dnsmasq-whitelist httpd
186
		do
184
		do
187
			echo "restarting $services"; systemctl restart $services; sleep 1
185
			echo "restarting $services"; systemctl restart $services; sleep 1
188
		done
186
		done
189
		;;
187
		;;
190
	-d)
188
	-d)
191
		if [ -f "/etc/pki/tls/certs/alcasar.crt.old" -a -f "/etc/pki/tls/private/alcasar.key.old" ]
189
		if [ -f "/etc/pki/tls/certs/alcasar.crt.old" -a -f "/etc/pki/tls/private/alcasar.key.old" ]
192
		then
190
		then
193
			echo "Restoring default certificate"
191
			echo "Restoring default certificate"
194
			defaultCert
192
			defaultCert
195
			defaultNdd
193
			defaultNdd
196
			for services in chilli dnsmasq dnsmasq-blackhole dnsmasq-blacklist dnsmasq-whitelist httpd
194
			for services in chilli dnsmasq dnsmasq-blackhole dnsmasq-blacklist dnsmasq-whitelist httpd
197
			do
195
			do
198
				echo "restarting $services"; systemctl restart $services; sleep 1
196
				echo "restarting $services"; systemctl restart $services; sleep 1
199
			done
197
			done
200
		fi
198
		fi
201
		;;
199
		;;
202
	*)
200
	*)
203
		echo "$usage"
201
		echo "$usage"
204
		;;
202
		;;
205
esac
203
esac
206
 
204