mirror of
https://gitlab.archlinux.org/archlinux/aurweb.git
synced 2025-02-03 10:43:03 +01:00
fix(Docker): use cert chain for nginx
Additionally, simplify some of the certificate generation scripts and rename `ca.ext` to `localhost.ext`. Certificates should be regenerated as of this commit. Users can run `rm -rf ./cache/*` to clear out any existing certs, which will cause the `ca` service to regenerate them. Additionally, since Docker infrastructure has been modified, a new `aurweb:latest` image will need to be built. See https://gitlab.archlinux.org/archlinux/aurweb/-/wikis/Docker Signed-off-by: Kevin Morris <kevr@0cost.org>
This commit is contained in:
parent
ab8a44cede
commit
3ea515d705
3 changed files with 47 additions and 24 deletions
|
@ -1,36 +1,58 @@
|
|||
#!/bin/bash
|
||||
set -eou pipefail
|
||||
|
||||
if [ -f /cache/localhost.cert.pem ] && \
|
||||
[ -f /cache/localhost.key.pem ] && \
|
||||
[ -f /cache/ca.root.pem ]; then
|
||||
if [ -f /cache/ca.root.pem ]; then
|
||||
echo "Already have certs, skipping."
|
||||
exec "$@"
|
||||
exit 0
|
||||
fi
|
||||
|
||||
openssl genrsa -des3 -out ca.key \
|
||||
-passout pass:devca 2048
|
||||
# Generate a new 2048-bit RSA key for the Root CA.
|
||||
openssl genrsa -des3 -out /cache/ca.key -passout pass:devca 2048
|
||||
|
||||
openssl req -x509 -new -nodes \
|
||||
-key ca.key -sha256 -days 1825 \
|
||||
-out /cache/ca.root.pem \
|
||||
-subj "/C=US/ST=California/L=Nowhere/O=aurweb/CN=localhost" \
|
||||
--passin pass:devca
|
||||
# Request and self-sign a new Root CA certificate, using
|
||||
# the RSA key. Output Root CA PEM-format certificate and key:
|
||||
# /cache/ca.root.pem and /cache/ca.key.pem
|
||||
openssl req -x509 -new -nodes -sha256 -days 1825 \
|
||||
-passin pass:devca \
|
||||
-subj "/C=US/ST=California/L=Authority/O=aurweb/CN=localhost" \
|
||||
-in /cache/ca.key -out /cache/ca.root.pem -keyout /cache/ca.key.pem
|
||||
|
||||
# Generate keys for aurweb.
|
||||
openssl req -nodes -newkey rsa:2048 -keyout /cache/localhost.key.pem \
|
||||
-out localhost.csr \
|
||||
-subj "/C=US/ST=California/L=Nowhere/O=aurweb/CN=localhost"
|
||||
# Generate a new 2048-bit RSA key for a localhost server.
|
||||
openssl genrsa -out /cache/localhost.key 2048
|
||||
|
||||
echo "$(hexdump -n 16 -e '4/4 "%08X" 1 "\n"' /dev/random)" \
|
||||
> /cache/ca.root.srl
|
||||
openssl x509 -req -in localhost.csr -CA /cache/ca.root.pem \
|
||||
-CAkey ca.key -CAserial /cache/ca.root.srl \
|
||||
# Generate a Certificate Signing Request (CSR) for the localhost server
|
||||
# using the RSA key we generated above.
|
||||
openssl req -new -key /cache/localhost.key -passout pass:devca \
|
||||
-subj "/C=US/ST=California/L=Server/O=aurweb/CN=localhost" \
|
||||
-out /cache/localhost.csr
|
||||
|
||||
# Get our CSR signed by our Root CA PEM-formatted certificate and key
|
||||
# to produce a fresh /cache/localhost.cert.pem PEM-formatted certificate.
|
||||
openssl x509 -req -in /cache/localhost.csr \
|
||||
-CA /cache/ca.root.pem -CAkey /cache/ca.key.pem \
|
||||
-CAcreateserial \
|
||||
-out /cache/localhost.cert.pem \
|
||||
-days 825 -sha256 -extfile /docker/ca.ext \
|
||||
--passin pass:devca
|
||||
-days 825 -sha256 \
|
||||
-passin pass:devca \
|
||||
-extfile /docker/localhost.ext
|
||||
|
||||
chmod 666 /cache/localhost.{key,cert}.pem
|
||||
chmod 666 /cache/ca.root.pem
|
||||
# Convert RSA key to a PEM-formatted key: /cache/localhost.key.pem
|
||||
openssl rsa -in /cache/localhost.key -text > /cache/localhost.key.pem
|
||||
|
||||
# At the end here, our notable certificates and keys are:
|
||||
# - /cache/ca.root.pem
|
||||
# - /cache/ca.key.pem
|
||||
# - /cache/localhost.key.pem
|
||||
# - /cache/localhost.cert.pem
|
||||
#
|
||||
# When running a server which uses the localhost certificate, a chain
|
||||
# should be used, starting with localhost.cert.pem:
|
||||
# - cat /cache/localhost.cert.pem /cache/ca.root.pem > localhost.chain.pem
|
||||
#
|
||||
# The Root CA (ca.root.pem) should be imported into browsers or
|
||||
# ca-certificates on machines wishing to verify localhost.
|
||||
#
|
||||
|
||||
chmod 666 /cache/*
|
||||
|
||||
exec "$@"
|
||||
|
|
|
@ -12,7 +12,8 @@ sed -ri 's/^;?(password) = .+/\1 = aur/' conf/config
|
|||
sed -ri "s|^(aur_location) = .+|\1 = https://localhost:8444|" conf/config
|
||||
sed -ri 's/^(disable_http_login) = .+/\1 = 1/' conf/config
|
||||
|
||||
cp -vf /cache/localhost.cert.pem /etc/ssl/certs/localhost.cert.pem
|
||||
cat /cache/localhost.cert.pem /cache/ca.root.pem \
|
||||
> /etc/ssl/certs/localhost.cert.pem
|
||||
cp -vf /cache/localhost.key.pem /etc/ssl/private/localhost.key.pem
|
||||
|
||||
cp -vf /docker/config/nginx.conf /etc/nginx/nginx.conf
|
||||
|
|
Loading…
Add table
Reference in a new issue