aboutsummaryrefslogtreecommitdiffstats
path: root/kubernetes/common/cert-wrapper/resources/import-custom-certs.sh
blob: 96b0c0c0c8f8168b530de2eda64b624ec9c2d7bf (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
.highlight .hll { background-color: #ffffcc }
.highlight .c { color: #888888 } /* Comment */
.highlight .err { color: #a61717; background-color: #e3d2d2 } /* Error */
.highlight .k { color: #008800; font-weight: bold } /* Keyword */
.highlight .ch { color: #888888 } /* Comment.Hashbang */
.highlight .cm { color: #888888 } /* Comment.Multiline */
.highlight .cp { color: #cc0000; font-weight: bold } /* Comment.Preproc */
.highlight .cpf { color: #888888 } /* Comment.PreprocFile */
.highlight .c1 { color: #888888 } /* Comment.Single */
.highlight .cs { color: #cc0000; font-weight: bold; background-color: #fff0f0 } /* Comment.Special */
.highlight .gd { color: #000000; background-color: #ffdddd } /* Generic.Deleted */
.highlight .ge { font-style: italic } /* Generic.Emph */
.highlight .gr { color: #aa0000 } /* Generic.Error */
.highlight .gh { color: #333333 } /* Generic.Heading */
.highlight .gi { color: #000000; background-color: #ddffdd } /* Generic.Inserted */
.highlight .go { color: #888888 } /* Generic.Output */
.highlight .gp { color: #555555 } /* Generic.Prompt */
.highlight .gs { font-weight: bold } /* Generic.Strong */
.highlight .gu { color: #666666 } /* Generic.Subheading */
.highlight .gt { color: #aa0000 } /* Generic.Traceback */
.highlight .kc { color: #008800; font-weight: bold } /* Keyword.Constant */
.highlight .kd { color: #008800; font-weight: bold } /* Keyword.Declaration */
.highlight .kn { color: #008800; font-weight: bold } /* Keyword.Namespace */
.highlight .kp { color: #008800 } /* Keyword.Pseudo */
.highlight .kr { color: #008800; font-weight: bold } /* Keyword.Reserved */
.highlight .kt { color: #888888; font-weight: bold } /* Keyword.Type */
.highlight .m { color: #0000DD; font-weight: bold } /* Literal.Number */
.highlight .s { color: #dd2200; background-color: #fff0f0 } /* Literal.String */
.highlight .na { color: #336699 } /* Name.Attribute */
.highlight .nb { color: #003388 } /* Name.Builtin */
.highlight .nc { color: #bb0066; font-weight: bold } /* Name.Class */
.highlight .no { color: #003366; font-weight: bold } /* Name.Constant */
.highlight .nd { color: #555555 } /* Name.Decorator */
.highlight .ne { color: #bb0066; font-weight: bold } /* Name.Exception */
.highlight .nf { color: #0066bb; font-weight: bold } /* Name.Function */
.highlight
#!/bin/sh
{{/*

# Copyright © 2020-2021 Bell Canada
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#       http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
*/}}

CERTS_DIR=${CERTS_DIR:-/certs}
MORE_CERTS_DIR=${MORE_CERTS_DIR:-/more_certs}
WORK_DIR=${WORK_DIR:-/updatedTruststore}
ONAP_TRUSTSTORE=${ONAP_TRUSTSTORE:-truststoreONAPall.jks}
JRE_TRUSTSTORE=${JRE_TRUSTSTORE:-$JAVA_HOME/lib/security/cacerts}
TRUSTSTORE_OUTPUT_FILENAME=${TRUSTSTORE_OUTPUT_FILENAME:-truststore.jks}
SSL_WORKDIR=${SSL_WORKDIR:-/usr/local/share/ca-certificates}

mkdir -p $WORK_DIR

# Decrypt and move relevant files to WORK_DIR
for f in $CERTS_DIR/*; do
  export canonical_name_nob64=$(echo $f | sed 's/.*\/\([^\/]*\)/\1/')
  export canonical_name_b64=$(echo $f | sed 's/.*\/\([^\/]*\)\(\.b64\)/\1/')
  if [ "$AAF_ENABLED" = "false" ] && [ "$canonical_name_b64" = "$ONAP_TRUSTSTORE" ]; then
    # Dont use onap truststore when aaf is disabled
    continue
  fi
  if [ "$AAF_ENABLED" = "false" ] && [ "$canonical_name_nob64" = "$ONAP_TRUSTSTORE" ]; then
    # Dont use onap truststore when aaf is disabled
    continue
  fi
  if echo $f | grep '\.sh$' >/dev/null; then
    continue
  fi
  if echo $f | grep '\.b64$' >/dev/null
    then
      base64 -d $f > $WORK_DIR/`basename $f .b64`
    else
      cp $f $WORK_DIR/.
  fi
done

for f in $MORE_CERTS_DIR/*; do
  if echo $f | grep '\.pem$' >/dev/null; then
      cp $f $WORK_DIR/.
  fi
done

# Prepare truststore output file
if [ "$AAF_ENABLED" = "true" ]
  then
    echo "AAF is enabled, use 'AAF' truststore"
    export TRUSTSTORE_OUTPUT_FILENAME=${ONAP_TRUSTSTORE}
  else
    echo "AAF is disabled, using JRE truststore"
    cp $JRE_TRUSTSTORE $WORK_DIR/$TRUSTSTORE_OUTPUT_FILENAME
fi

# Import Custom Certificates
for f in $WORK_DIR/*; do
  if echo $f | grep '\.pem$' >/dev/null; then
    echo "importing certificate: $f"
    keytool -import -file $f -alias `basename $f` -keystore $WORK_DIR/$TRUSTSTORE_OUTPUT_FILENAME -storepass $TRUSTSTORE_PASSWORD -noprompt
    if [ $? != 0 ]; then
      echo "failed importing certificate: $f"
      exit 1
    fi
  fi
done

# Import certificates to Linux SSL Truststore
cp $CERTS_DIR/*.crt $SSL_WORKDIR/.
cp $MORE_CERTS_DIR/*.crt $SSL_WORKDIR/.
update-ca-certificates
if [ $? != 0 ]
  then
    echo "failed importing certificates"
    exit 1
  else
    cp /etc/ssl/certs/ca-certificates.crt $WORK_DIR/.
fi