-
-
Save gcaaa31928/62b181314c44c46e5f9ff0e0d12f3e24 to your computer and use it in GitHub Desktop.
Revisions
-
adamrunner created this gist
Mar 31, 2016 .There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -0,0 +1,63 @@ #!/bin/bash # Bash shell script for generating self-signed certs. Run this in a folder, as it # generates a few files. Large portions of this script were taken from the # following artcile: # # http://usrportage.de/archives/919-Batch-generating-SSL-certificates.html # # Additional alterations by: Brad Landers # Date: 2012-01-27 # usage: ./gen_cert.sh example.com # Script accepts a single argument, the fqdn for the cert DOMAIN="$1" if [ -z "$DOMAIN" ]; then echo "Usage: $(basename $0) <domain>" exit 11 fi fail_if_error() { [ $1 != 0 ] && { unset PASSPHRASE exit 10 } } # Generate a passphrase export PASSPHRASE=$(head -c 500 /dev/urandom | tr -dc a-z0-9A-Z | head -c 128; echo) # Certificate details; replace items in angle brackets with your own info subj=" C=US ST=OR O=Blah localityName=Portland commonName=$DOMAIN organizationalUnitName=Blah Blah [email protected] " # Generate the server private key openssl genrsa -des3 -out $DOMAIN.key -passout env:PASSPHRASE 2048 fail_if_error $? # Generate the CSR openssl req \ -new \ -batch \ -subj "$(echo -n "$subj" | tr "\n" "/")" \ -key $DOMAIN.key \ -out $DOMAIN.csr \ -passin env:PASSPHRASE fail_if_error $? cp $DOMAIN.key $DOMAIN.key.org fail_if_error $? # Strip the password so we don't have to type it every time we restart Apache openssl rsa -in $DOMAIN.key.org -out $DOMAIN.key -passin env:PASSPHRASE fail_if_error $? # Generate the cert (good for 10 years) openssl x509 -req -days 3650 -in $DOMAIN.csr -signkey $DOMAIN.key -out $DOMAIN.crt fail_if_error $?