Subversion Repositories ALCASAR

Rev

Rev 2260 | Rev 2295 | Go to most recent revision | Only display areas with differences | Ignore whitespace | Details | Blame | Last modification | View Log

Rev 2260 Rev 2261
1
#!/bin/bash
1
#!/bin/bash
2
#
2
#
3
# $Id: alcasar-importcert.sh 2260 2017-05-29 19:46:00Z tom.houdayer $
3
# $Id: alcasar-importcert.sh 2261 2017-05-29 20:04:37Z tom.houdayer $
4
#
4
#
5
# alcasar-importcert.sh
5
# alcasar-importcert.sh
6
# by Raphaël, Hugo, Clément, Bettyna & rexy
6
# by Raphaël, Hugo, Clément, Bettyna & rexy
7
#
7
#
8
# This script is distributed under the Gnu General Public License (GPL)
8
# This script is distributed under the Gnu General Public License (GPL)
9
#
9
#
10
# Script permettant
10
# Script permettant
11
# - d'importer des certificats sur Alcasar
11
# - d'importer des certificats sur Alcasar
12
# - de revenir au certificat par default
12
# - de revenir au certificat par default
13
#
13
#
14
# This script allows
14
# This script allows
15
# - to import a certificate in Alcasar
15
# - to import a certificate in Alcasar
16
# - to go back to the default certificate
16
# - to go back to the default certificate
17
 
17
 
18
SED="/bin/sed -ri"
18
SED="/bin/sed -ri"
19
DIR_CERT="/etc/pki/tls"
19
DIR_CERT="/etc/pki/tls"
20
CONF_FILE="/usr/local/etc/alcasar.conf"
20
CONF_FILE="/usr/local/etc/alcasar.conf"
21
PRIVATE_IP_MASK=`grep ^PRIVATE_IP= $CONF_FILE|cut -d"=" -f2`
21
PRIVATE_IP_MASK=`grep ^PRIVATE_IP= $CONF_FILE|cut -d"=" -f2`
22
PRIVATE_IP=`echo $PRIVATE_IP_MASK | cut -d"/" -f1`
22
PRIVATE_IP=`echo $PRIVATE_IP_MASK | cut -d"/" -f1`
23
 
23
 
24
usage="Usage: alcasar-importcert.sh -i /path/to/certificate.crt -k /path/to/privatekey.key [-c /path/to/serverchain.crt]\n       alcasar-importcert.sh -d (restore default certificate)"
24
usage="Usage: alcasar-importcert.sh -i /path/to/certificate.crt -k /path/to/privatekey.key [-c /path/to/serverchain.crt]\n       alcasar-importcert.sh -d (restore default certificate)"
25
nb_args=$#
25
nb_args=$#
26
arg1=$1
26
arg1=$1
27
 
27
 
28
function defaultNdd()
28
function defaultNdd()
29
{
29
{
30
	$SED "s/^HOSTNAME=.*/HOSTNAME=alcasar/g" /usr/local/etc/alcasar.conf
30
	$SED "s/^HOSTNAME=.*/HOSTNAME=alcasar/g" /usr/local/etc/alcasar.conf
31
	$SED "s/^DOMAIN=.*/DOMAIN=localdomain/g" /usr/local/etc/alcasar.conf
31
	$SED "s/^DOMAIN=.*/DOMAIN=localdomain/g" /usr/local/etc/alcasar.conf
32
	cat <<EOF > /etc/hosts
32
	cat <<EOF > /etc/hosts
33
127.0.0.1	localhost
33
127.0.0.1	localhost
34
$PRIVATE_IP	alcasar alcasar.localdomain
34
$PRIVATE_IP	alcasar alcasar.localdomain
35
EOF
35
EOF
36
	$SED "s/^locationname.*/locationname\talcasar.localdomain/g" /etc/chilli.conf
36
	$SED "s/^locationname.*/locationname\talcasar.localdomain/g" /etc/chilli.conf
37
	$SED "s/^uamserver.*/uamserver\thttps:\/\/alcasar.localdomain\/intercept.php/g" /etc/chilli.conf
37
	$SED "s/^uamserver.*/uamserver\thttps:\/\/alcasar.localdomain\/intercept.php/g" /etc/chilli.conf
38
	$SED "s/^radiusnasid.*/radiusnasid\talcasar.localdomain/g" /etc/chilli.conf
38
	$SED "s/^radiusnasid.*/radiusnasid\talcasar.localdomain/g" /etc/chilli.conf
39
	$SED "s/^uamallowed.*/uamallowed\talcasar,alcasar.localdomain/g" /etc/chilli.conf
39
	$SED "s/^uamallowed.*/uamallowed\talcasar,alcasar.localdomain/g" /etc/chilli.conf
40
	$SED "s/^ServerName.*/ServerName alcasar.localdomain/g" /etc/httpd/conf/httpd.conf
40
	$SED "s/^ServerName.*/ServerName alcasar.localdomain/g" /etc/httpd/conf/httpd.conf
41
	hostnamectl set-hostname alcasar.localdomain
41
	hostnamectl set-hostname alcasar.localdomain
42
	$SED "s/^\tErrorDocument.*/\tErrorDocument 404 https:\/\/alcasar.localdomain\//g" /etc/httpd/conf/webapps.d/alcasar.conf
42
	$SED "s/^\tErrorDocument.*/\tErrorDocument 404 https:\/\/alcasar.localdomain\//g" /etc/httpd/conf/webapps.d/alcasar.conf
43
	$SED "s/^\tAuthDigestDomain.*/\tAuthDigestDomain alcasar.localdomain/g" /etc/httpd/conf/webapps.d/alcasar.conf
43
	$SED "s/^\tAuthDigestDomain.*/\tAuthDigestDomain alcasar.localdomain/g" /etc/httpd/conf/webapps.d/alcasar.conf
44
	$SED "s/^    ServerName.*/    ServerName alcasar.localdomain/g" /etc/httpd/conf/sites.d/00_default_vhosts.conf /etc/httpd/conf/sites.d/00_default_ssl_vhost.conf
44
	$SED "s/^    ServerName.*/    ServerName alcasar.localdomain/g" /etc/httpd/conf/sites.d/00_default_vhosts.conf /etc/httpd/conf/sites.d/00_default_ssl_vhost.conf
45
}
45
}
46
 
46
 
47
function defaultCert()
47
function defaultCert()
48
{
48
{
49
	mv -f $DIR_CERT/certs/alcasar.crt.old $DIR_CERT/certs/alcasar.crt
49
	mv -f $DIR_CERT/certs/alcasar.crt.old $DIR_CERT/certs/alcasar.crt
50
	mv -f $DIR_CERT/private/alcasar.key.old $DIR_CERT/private/alcasar.key
50
	mv -f $DIR_CERT/private/alcasar.key.old $DIR_CERT/private/alcasar.key
51
	if [ -f $DIR_CERT/certs/server-chain.crt.old ]
51
	if [ -f $DIR_CERT/certs/server-chain.crt.old ]
52
	then
52
	then
53
		mv $DIR_CERT/certs/server-chain.crt.old $DIR_CERT/certs/server-chain.crt
53
		mv $DIR_CERT/certs/server-chain.crt.old $DIR_CERT/certs/server-chain.crt
54
	fi
54
	fi
55
}
55
}
56
 
56
 
57
function domainName() # change the domain name in the conf files
57
function domainName() # change the domain name in the conf files
58
{
58
{
59
	fqdn=$(openssl x509 -noout -subject -in $cert | sed -n '/^subject/s/^.*CN=//p' | cut -d'/' -f 1)
59
	fqdn=$(openssl x509 -noout -subject -in $cert | sed -n '/^subject/s/^.*CN=//p' | cut -d'/' -f 1)
60
 
60
 
61
	#check if there is a wildcard in $fqdn
61
	#check if there is a wildcard in $fqdn
62
	if [[ $fqdn == *"*"* ]];
62
	if [[ $fqdn == *"*"* ]];
63
	then
63
	then
64
		hostname="alcasar"
64
		hostname="alcasar"
65
		fqdn=${fqdn/"*"/$hostname}
65
		fqdn=${fqdn/"*"/$hostname}
66
	else
66
	else
67
		hostname=`echo $fqdn | awk -F'.' '{ print $1 }'`
67
		hostname=`echo $fqdn | awk -F'.' '{ print $1 }'`
68
	fi
68
	fi
69
	domain=`echo $fqdn | awk -F'.' '{$1="";OFS=".";print $0}' | sed 's/^.//'`
69
	domain=`echo $fqdn | awk -F'.' '{$1="";OFS=".";print $0}' | sed 's/^.//'`
70
	echo "fqdn=$fqdn hostname=$hostname domain=$domain"
70
	echo "fqdn=$fqdn hostname=$hostname domain=$domain"
71
 
71
 
72
	#check fqdn format      
72
	#check fqdn format      
73
	if [[ "$fqdn" != "" && "$domain" != "" && "$hostname" == "alcasar" ]];
73
	if [[ "$fqdn" != "" && "$domain" != "" && "$hostname" == "alcasar" ]];
74
	then
74
	then
75
		$SED "s/^HOSTNAME=.*/HOSTNAME=$hostname/g" /usr/local/etc/alcasar.conf
75
		$SED "s/^HOSTNAME=.*/HOSTNAME=$hostname/g" /usr/local/etc/alcasar.conf
76
		$SED "s/^DOMAIN=.*/DOMAIN=$domain/g" /usr/local/etc/alcasar.conf
76
		$SED "s/^DOMAIN=.*/DOMAIN=$domain/g" /usr/local/etc/alcasar.conf
77
		cat <<EOF > /etc/hosts
77
		cat <<EOF > /etc/hosts
78
127.0.0.1	localhost
78
127.0.0.1	localhost
79
$PRIVATE_IP	$hostname $hostname.localdomain $fqdn
79
$PRIVATE_IP	$hostname $hostname.localdomain $fqdn
80
EOF
80
EOF
81
		$SED "s/^locationname.*/locationname\t$fqdn/g" /etc/chilli.conf
81
		$SED "s/^locationname.*/locationname\t$fqdn/g" /etc/chilli.conf
82
		$SED "s/^uamserver.*/uamserver\thttps:\/\/$fqdn\/intercept.php/g" /etc/chilli.conf
82
		$SED "s/^uamserver.*/uamserver\thttps:\/\/$fqdn\/intercept.php/g" /etc/chilli.conf
83
		$SED "s/^radiusnasid.*/radiusnasid\t$fqdn/g" /etc/chilli.conf
83
		$SED "s/^radiusnasid.*/radiusnasid\t$fqdn/g" /etc/chilli.conf
84
		$SED "s/^uamallowed.*/uamallowed\t$hostname,$fqdn/g" /etc/chilli.conf
84
		$SED "s/^uamallowed.*/uamallowed\t$hostname,$fqdn/g" /etc/chilli.conf
85
		$SED "s/^ServerName.*/ServerName $fqdn/g" /etc/httpd/conf/httpd.conf
85
		$SED "s/^ServerName.*/ServerName $fqdn/g" /etc/httpd/conf/httpd.conf
86
		hostnamectl set-hostname $fqdn
86
		hostnamectl set-hostname $fqdn
87
		$SED "s/^\tErrorDocument.*/\tErrorDocument 404 https:\/\/$fqdn\//g" /etc/httpd/conf/webapps.d/alcasar.conf
87
		$SED "s/^\tErrorDocument.*/\tErrorDocument 404 https:\/\/$fqdn\//g" /etc/httpd/conf/webapps.d/alcasar.conf
88
		$SED "s/^\tAuthDigestDomain.*/\tAuthDigestDomain $fqdn/g" /etc/httpd/conf/webapps.d/alcasar.conf
88
		$SED "s/^\tAuthDigestDomain.*/\tAuthDigestDomain $fqdn/g" /etc/httpd/conf/webapps.d/alcasar.conf
89
		$SED "s/^    ServerName.*/    ServerName $fqdn/g" /etc/httpd/conf/sites.d/00_default_vhosts.conf /etc/httpd/conf/sites.d/00_default_ssl_vhost.conf /etc/httpd/conf/vhosts-ssl.default
89
		$SED "s/^    ServerName.*/    ServerName $fqdn/g" /etc/httpd/conf/sites.d/00_default_vhosts.conf /etc/httpd/conf/sites.d/00_default_ssl_vhost.conf /etc/httpd/conf/vhosts-ssl.default
90
	fi
90
	fi
91
}
91
}
92
 
92
 
93
function certImport()
93
function certImport()
94
{
94
{
95
	if [ ! -f "$DIR_CERT/certs/alcasar.crt.old" ]
95
	if [ ! -f "$DIR_CERT/certs/alcasar.crt.old" ]
96
	then
96
	then
97
		echo "Backup of old cert (alcasar.crt)"
97
		echo "Backup of old cert (alcasar.crt)"
98
		mv $DIR_CERT/certs/alcasar.crt $DIR_CERT/certs/alcasar.crt.old
98
		mv $DIR_CERT/certs/alcasar.crt $DIR_CERT/certs/alcasar.crt.old
99
	fi
99
	fi
100
	if [ ! -f "$DIR_CERT/private/alcasar.key.old" ]
100
	if [ ! -f "$DIR_CERT/private/alcasar.key.old" ]
101
	then
101
	then
102
		echo "Backup of old private key (alcasar.key)"
102
		echo "Backup of old private key (alcasar.key)"
103
		mv $DIR_CERT/private/alcasar.key $DIR_CERT/private/alcasar.key.old
103
		mv $DIR_CERT/private/alcasar.key $DIR_CERT/private/alcasar.key.old
104
	fi
104
	fi
105
 
105
 
106
	cp $cert $DIR_CERT/certs/alcasar.crt
106
	cp $cert $DIR_CERT/certs/alcasar.crt
107
	cp $key $DIR_CERT/private/alcasar.key
107
	cp $key $DIR_CERT/private/alcasar.key
108
 
108
 
109
	chown root:apache $DIR_CERT/certs/alcasar.crt
109
	chown root:apache $DIR_CERT/certs/alcasar.crt
110
	chown root:apache $DIR_CERT/private/alcasar.key
110
	chown root:apache $DIR_CERT/private/alcasar.key
111
 
111
 
112
	chmod 750 $DIR_CERT/certs/alcasar.crt
112
	chmod 750 $DIR_CERT/certs/alcasar.crt
113
	chmod 750 $DIR_CERT/private/alcasar.key
113
	chmod 750 $DIR_CERT/private/alcasar.key
114
 
114
 
115
	if [ "$sc" != "" ]
115
	if [ "$sc" != "" ]
116
	then
116
	then
117
		echo "cert-chain exists"
117
		echo "cert-chain exists"
118
		if [ ! -f "$DIR_CERT/certs/server-chain.crt.old" ]
118
		if [ ! -f "$DIR_CERT/certs/server-chain.crt.old" ]
119
		then
119
		then
120
			echo "Backup of old cert-chain (server-chain.crt)"
120
			echo "Backup of old cert-chain (server-chain.crt)"
121
			mv $DIR_CERT/certs/server-chain.crt $DIR_CERT/certs/server-chain.crt.old
121
			mv $DIR_CERT/certs/server-chain.crt $DIR_CERT/certs/server-chain.crt.old
122
		fi
122
		fi
123
		cp $sc $DIR_CERT/certs/server-chain.crt
123
		cp $sc $DIR_CERT/certs/server-chain.crt
124
		chown root:apache $DIR_CERT/certs/server-chain.crt
124
		chown root:apache $DIR_CERT/certs/server-chain.crt
125
		chmod 750 $DIR_CERT/certs/server-chain.crt
125
		chmod 750 $DIR_CERT/certs/server-chain.crt
126
	fi
126
	fi
127
}
127
}
128
 
128
 
129
 
129
 
130
if [ $nb_args -eq 0 ]
130
if [ $nb_args -eq 0 ]
131
then
131
then
132
	echo -e "$usage"
132
	echo -e "$usage"
133
	exit 1
133
	exit 1
134
fi
134
fi
135
 
135
 
136
case $arg1 in
136
case $arg1 in
137
	-\? | -h* | --h*)
137
	-\? | -h* | --h*)
138
		echo -e "$usage"
138
		echo -e "$usage"
139
		exit 0
139
		exit 0
140
		;;
140
		;;
141
	-i)
141
	-i)
142
		arg3=$3
142
		arg3=$3
143
		arg5=$5
143
		arg5=$5
144
		cert=$2
144
		cert=$2
145
		key=$4
145
		key=$4
146
		sc=$6
146
		sc=$6
147
 
147
 
148
		if [ "$cert" == "" ] || [ "$key" == "" ]
148
		if [ "$cert" == "" ] || [ "$key" == "" ]
149
		then
149
		then
150
			echo -e "$usage"
150
			echo -e "$usage"
151
			exit 1
151
			exit 1
152
		fi
152
		fi
153
 
153
 
154
		if [ ! -f "$cert" ] || [ ! -f "$key" ]
154
		if [ ! -f "$cert" ] || [ ! -f "$key" ]
155
		then
155
		then
156
			echo "Certificate and/or private key not found"
156
			echo "Certificate and/or private key not found"
157
			exit 1
157
			exit 1
158
		fi
158
		fi
159
 
159
 
160
		if [ ${cert: -4} != ".crt" ]
160
		if [ ${cert: -4} != ".crt" ] && [ ${cert: -4} != ".cer" ]
161
		then
161
		then
162
			echo "Invalid certificate file"
162
			echo "Invalid certificate file"
163
			exit 1
163
			exit 1
164
		fi
164
		fi
165
 
165
 
166
		if [ ${key: -4} != ".key" ]
166
		if [ ${key: -4} != ".key" ]
167
		then
167
		then
168
			echo "Invalid private key"
168
			echo "Invalid private key"
169
			exit 1
169
			exit 1
170
		fi
170
		fi
171
 
171
 
172
		if [ "$arg5" != "-c" ] || [ ! -f "$sc" ]
172
		if [ "$arg5" != "-c" ] || [ -z "$sc" ]
173
		then
173
		then
174
			echo "No server-chain given"
174
			echo "No server-chain given"
175
			echo "Importing certificate $cert with private key $key"
175
			echo "Importing certificate $cert with private key $key"
176
			sc=""
176
			sc=""
177
		else
177
		else
-
 
178
			if [ ! -f "$sc" ]
-
 
179
			then
-
 
180
				echo "Server-chain certificate not found"
-
 
181
				exit 1
-
 
182
			fi
-
 
183
			if [ ${sc: -4} != ".crt" ] && [ ${sc: -4} != ".cer" ]
-
 
184
			then
-
 
185
				echo "Invalid server-chain certificate file"
-
 
186
				exit 1
-
 
187
			fi
178
			echo "Importing certificate $cert with private key $key and server-chain $sc"
188
			echo "Importing certificate $cert with private key $key and server-chain $sc"
179
		fi
189
		fi
180
		domainName $cert
190
		domainName $cert
181
		certImport $cert $key $sc
191
		certImport $cert $key $sc
182
		for services in chilli dnsmasq dnsmasq-blackhole dnsmasq-blacklist dnsmasq-whitelist httpd
192
		for services in chilli dnsmasq dnsmasq-blackhole dnsmasq-blacklist dnsmasq-whitelist httpd
183
		do
193
		do
184
			echo "restarting $services"; systemctl restart $services; sleep 1
194
			echo "restarting $services"; systemctl restart $services; sleep 1
185
		done
195
		done
186
		;;
196
		;;
187
	-d)
197
	-d)
188
		if [ -f "/etc/pki/tls/certs/alcasar.crt.old" -a -f "/etc/pki/tls/private/alcasar.key.old" ]
198
		if [ -f "/etc/pki/tls/certs/alcasar.crt.old" -a -f "/etc/pki/tls/private/alcasar.key.old" ]
189
		then
199
		then
190
			echo "Restoring default certificate"
200
			echo "Restoring default certificate"
191
			defaultCert
201
			defaultCert
192
			defaultNdd
202
			defaultNdd
193
			for services in chilli dnsmasq dnsmasq-blackhole dnsmasq-blacklist dnsmasq-whitelist httpd
203
			for services in chilli dnsmasq dnsmasq-blackhole dnsmasq-blacklist dnsmasq-whitelist httpd
194
			do
204
			do
195
				echo "restarting $services"; systemctl restart $services; sleep 1
205
				echo "restarting $services"; systemctl restart $services; sleep 1
196
			done
206
			done
197
		fi
207
		fi
198
		;;
208
		;;
199
	*)
209
	*)
200
		echo -e "$usage"
210
		echo -e "$usage"
201
		;;
211
		;;
202
esac
212
esac
203
 
213