summaryrefslogtreecommitdiffstats
path: root/Makefile
blob: 56e0e9359e932b3d2879a784115aa7bb2cce01bd (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
all: build start-backend run-client stop-backend
start-with-client: start-backend run-client
.PHONY: build

CA_NAME=RA

build:
	@echo "##### Build Cert Service images locally #####"
	mvn clean install -P docker
	@echo "##### DONE #####"

start-backend:
	@echo "##### Start Cert Service #####"
	docker-compose up -d
	@echo "## Configure ejbca ##"
	docker exec oomcert-ejbca /opt/primekey/scripts/ejbca-configuration.sh
	@echo "##### DONE #####"

run-client:
	@echo "##### Create Cert Service Client volume folder: `pwd`/compose-resources/client-volume/ #####"
	mkdir -p `pwd`/compose-resources/client-volume/
	@echo "##### Start Cert Service Client #####"
	docker run \
	    --rm \
	    --name oomcert-client \
	    --env-file ./compose-resources/client-configuration.env \
	    --network cert-service_certservice \
	    --mount type=bind,src=`pwd`/compose-resources/client-volume/,dst=/var/certs \
	    --volume `pwd`/certs/truststore.jks:/etc/onap/oom/certservice/certs/truststore.jks \
	    --volume `pwd`/certs/certServiceClient-keystore.jks:/etc/onap/oom/certservice/certs/certServiceClient-keystore.jks \
	    nexus3.onap.org:10001/onap/org.onap.oom.platform.cert-service.oom-certservice-client:2.3.3

stop-backend:
	@echo "##### Stop Cert Service #####"
	docker-compose down
	@echo "##### DONE #####"

send-initialization-request:
	@echo "##### Create folder for certificates from curl: `pwd`/compose-resources/certs-from-curl/ #####"
	mkdir -p `pwd`/compose-resources/certs-from-curl/
	@echo "##### Generate CSR and Key #####"
	openssl req -new -newkey rsa:2048 -nodes -keyout `pwd`/compose-resources/certs-from-curl/ir.key \
	    -out `pwd`/compose-resources/certs-from-curl/ir.csr \
	    -subj "/C=US/ST=California/L=San-Francisco/OU=ONAP/O=Linux-Foundation/CN=onap.org" \
	    -addext "subjectAltName = DNS.1:test.onap.org,DNS.2:onap.org,IP.1:127.0.0.1,URI.1:ftp://test.org,email.1:test@onap.org"
	@echo "##### Send Initialization Request #####"
	curl -sN https://localhost:8443/v1/certificate/${CA_NAME} -H "PK: $$(cat ./compose-resources/certs-from-curl/ir.key | base64 | tr -d \\n)" \
	    -H "CSR: $$(cat ./compose-resources/certs-from-curl/ir.csr | base64 | tr -d \\n)" \
	    --cert `pwd`/certs/cmpv2Issuer-cert.pem \
	    --key `pwd`/certs/cmpv2Issuer-key.pem \
	    --cacert `pwd`/certs/cacert.pem | `pwd`/parseCertServiceResponse.sh "ir"

send-key-update-request: verify-initialization-request-files-exist
	@echo "##### Generate CSR and Key #####"
	openssl req -new -newkey rsa:2048 -nodes -keyout `pwd`/compose-resources/certs-from-curl/kur.key \
	    -out `pwd`/compose-resources/certs-from-curl/kur.csr \
	    -subj "/C=US/ST=California/L=San-Francisco/OU=ONAP/O=Linux-Foundation/CN=onap.org" \
	    -addext "subjectAltName = DNS.1:test.onap.org,DNS.2:onap.org,IP.1:127.0.0.1,URI.1:ftp://test.org,email.1:test@onap.org"
	@echo "##### Send Key Update Request #####"
	curl -sN https://localhost:8443/v1/certificate-update/${CA_NAME} -H "PK: $$(cat ./compose-resources/certs-from-curl/kur.key | base64 | tr -d \\n)" \
	    -H "CSR: $$(cat ./compose-resources/certs-from-curl/kur.csr | base64 | tr -d \\n)" \
	    -H "OLD_PK: $$(cat ./compose-resources/certs-from-curl/ir.key | base64 | tr -d \\n)" \
	    -H "OLD_CERT: $$(cat ./compose-resources/certs-from-curl/ir-cert.pem | base64 | tr -d \\n)" \
	    --cert `pwd`/certs/cmpv2Issuer-cert.pem \
	    --key `pwd`/certs/cmpv2Issuer-key.pem \
	    --cacert `pwd`/certs/cacert.pem | `pwd`/parseCertServiceResponse.sh "kur"

send-certification-request: verify-initialization-request-files-exist
	@echo "##### Generate CSR and Key #####"
	openssl req -new -newkey rsa:2048 -nodes -keyout `pwd`/compose-resources/certs-from-curl/cr.key \
	    -out `pwd`/compose-resources/certs-from-curl/cr.csr \
	    -subj "/C=US/ST=California/L=San-Francisco/OU=ONAP/O=Linux-Foundation/CN=new-onap.org" \
	    -addext "subjectAltName = DNS.1:test.onap.org,DNS.2:onap.org,IP.1:127.0.0.1,URI.1:ftp://test.org,email.1:test@onap.org"
	@echo "##### Send Certification Request #####"
	curl -sN https://localhost:8443/v1/certificate-update/${CA_NAME} -H "PK: $$(cat ./compose-resources/certs-from-curl/cr.key | base64 | tr -d \\n)" \
	    -H "CSR: $$(cat ./compose-resources/certs-from-curl/cr.csr | base64 | tr -d \\n)" \
	    -H "OLD_PK: $$(cat ./compose-resources/certs-from-curl/ir.key | base64 | tr -d \\n)" \
	    -H "OLD_CERT: $$(cat ./compose-resources/certs-from-curl/ir-cert.pem | base64 | tr -d \\n)" \
	    --cert `pwd`/certs/cmpv2Issuer-cert.pem \
	    --key `pwd`/certs/cmpv2Issuer-key.pem \
	    --cacert `pwd`/certs/cacert.pem | `pwd`/parseCertServiceResponse.sh "cr"

verify-initialization-request-files-exist:
  ifeq (,$(wildcard compose-resources/certs-from-curl/ir.key))
  ifeq (,$(wildcard compose-resources/certs-from-curl/ir-cert.pem))
			$(error Execute send-initialization-request first)
  endif
  endif