mirror of
https://github.com/goharbor/harbor.git
synced 2024-11-22 18:25:56 +01:00
376929d58e
This commit refresh the harbor_ca.crt and revert the changes to generate a new CA each time in the test script. Signed-off-by: Daniel Jiang <jiangd@vmware.com>
46 lines
1.4 KiB
Bash
Executable File
46 lines
1.4 KiB
Bash
Executable File
#!/usr/bin/env bash
|
|
|
|
# These certs file is only for Harbor testing.
|
|
IP='127.0.0.1'
|
|
if [ ! -z "$1" ]; then IP=$1; fi
|
|
OPENSSLCNF=
|
|
DATA_VOL='/data'
|
|
CUR_DIR="$( cd "$( dirname "${BASH_SOURCE[0]}" )" && pwd )"
|
|
|
|
for path in /etc/openssl/openssl.cnf /etc/ssl/openssl.cnf /usr/local/etc/openssl/openssl.cnf; do
|
|
if [[ -e ${path} ]]; then
|
|
OPENSSLCNF=${path}
|
|
fi
|
|
done
|
|
if [[ -z ${OPENSSLCNF} ]]; then
|
|
printf "Could not find openssl.cnf"
|
|
exit 1
|
|
fi
|
|
|
|
# Create CA certificate
|
|
# openssl req \
|
|
# -newkey rsa:4096 -nodes -sha256 -keyout $CUR_DIR/harbor_ca.key \
|
|
# -x509 -days 365 -out $CUR_DIR/harbor_ca.crt -subj '/C=CN/ST=PEK/L=Bei Jing/O=VMware/CN=HarborCA'
|
|
|
|
# Generate a Certificate Signing Request
|
|
if echo $IP|grep -E '^([0-9]+\.){3}[0-9]+$' ; then
|
|
openssl req \
|
|
-newkey rsa:4096 -nodes -sha256 -keyout $IP.key \
|
|
-out $IP.csr -subj "/C=CN/ST=PEK/L=Bei Jing/O=VMware/CN=HarborManager"
|
|
echo subjectAltName = IP:$IP > extfile.cnf
|
|
else
|
|
openssl req \
|
|
-newkey rsa:4096 -nodes -sha256 -keyout $IP.key \
|
|
-out $IP.csr -subj "/C=CN/ST=PEK/L=Bei Jing/O=VMware/CN=$IP"
|
|
echo subjectAltName = DNS.1:$IP > extfile.cnf
|
|
fi
|
|
|
|
# Generate the certificate of local registry host
|
|
openssl x509 -req -days 365 -sha256 -in $IP.csr -CA $CUR_DIR/harbor_ca.crt \
|
|
-CAkey $CUR_DIR/harbor_ca.key -CAcreateserial -extfile extfile.cnf -out $IP.crt
|
|
|
|
# Copy to harbor default location
|
|
mkdir -p $DATA_VOL/cert
|
|
cp $IP.crt $DATA_VOL/cert/server.crt
|
|
cp $IP.key $DATA_VOL/cert/server.key
|