#!/usr/bin/env bash # These certs file is only for Harbor testing. IP='127.0.0.1' if [ ! -z "$1" ]; then IP=$1; fi OPENSSLCNF= DATA_VOL='/data' CUR_DIR="$( cd "$( dirname "${BASH_SOURCE[0]}" )" && pwd )" for path in /etc/openssl/openssl.cnf /etc/ssl/openssl.cnf /usr/local/etc/openssl/openssl.cnf; do if [[ -e ${path} ]]; then OPENSSLCNF=${path} fi done if [[ -z ${OPENSSLCNF} ]]; then printf "Could not find openssl.cnf" exit 1 fi # Create CA certificate # openssl req \ # -newkey rsa:4096 -nodes -sha256 -keyout $CUR_DIR/harbor_ca.key \ # -x509 -days 365 -out $CUR_DIR/harbor_ca.crt -subj '/C=CN/ST=PEK/L=Bei Jing/O=VMware/CN=HarborCA' # Generate a Certificate Signing Request if echo $IP|grep -E '^([0-9]+\.){3}[0-9]+$' ; then openssl req \ -newkey rsa:4096 -nodes -sha256 -keyout $IP.key \ -out $IP.csr -subj "/C=CN/ST=PEK/L=Bei Jing/O=VMware/CN=HarborManager" echo subjectAltName = IP:$IP > extfile.cnf else openssl req \ -newkey rsa:4096 -nodes -sha256 -keyout $IP.key \ -out $IP.csr -subj "/C=CN/ST=PEK/L=Bei Jing/O=VMware/CN=$IP" echo subjectAltName = DNS.1:$IP > extfile.cnf fi # Generate the certificate of local registry host openssl x509 -req -days 365 -sha256 -in $IP.csr -CA $CUR_DIR/harbor_ca.crt \ -CAkey $CUR_DIR/harbor_ca.key -CAcreateserial -extfile extfile.cnf -out $IP.crt # Copy to harbor default location mkdir -p $DATA_VOL/cert cp $IP.crt $DATA_VOL/cert/server.crt cp $IP.key $DATA_VOL/cert/server.key