2017-01-20 21:00:43 -05:00
|
|
|
#!/bin/bash
|
2017-01-08 20:16:52 -05:00
|
|
|
#
|
2017-01-11 18:01:08 -05:00
|
|
|
# Copyright © 2016-2017 The Thingsboard Authors
|
2017-01-08 20:16:52 -05:00
|
|
|
#
|
|
|
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
|
# you may not use this file except in compliance with the License.
|
|
|
|
|
# You may obtain a copy of the License at
|
|
|
|
|
#
|
|
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
#
|
|
|
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
|
# See the License for the specific language governing permissions and
|
|
|
|
|
# limitations under the License.
|
|
|
|
|
#
|
|
|
|
|
|
2017-01-16 22:08:51 -05:00
|
|
|
usage() {
|
|
|
|
|
echo "This script generates client public/private rey pair, extracts them to a no-password RSA pem file,"
|
2017-01-20 21:00:43 -05:00
|
|
|
echo "and imports server public key to client keystore"
|
2017-01-16 22:08:51 -05:00
|
|
|
echo "usage: ./securemqttclient.keygen.sh [-p file]"
|
|
|
|
|
echo " -p | --props | --properties file Properties file. default value is ./keygen.properties"
|
|
|
|
|
echo " -h | --help | ? Show this message"
|
|
|
|
|
}
|
2017-01-08 20:16:52 -05:00
|
|
|
|
2017-01-16 22:08:51 -05:00
|
|
|
PROPERTIES_FILE=keygen.properties
|
|
|
|
|
|
|
|
|
|
while true; do
|
|
|
|
|
case "$1" in
|
|
|
|
|
-p | --props | --properties) PROPERTIES_FILE=$2 ;
|
|
|
|
|
shift
|
|
|
|
|
;;
|
|
|
|
|
-h | --help | ?) usage
|
|
|
|
|
exit 0
|
|
|
|
|
;;
|
|
|
|
|
-- ) shift;
|
|
|
|
|
break
|
|
|
|
|
;;
|
|
|
|
|
* ) break
|
|
|
|
|
;;
|
|
|
|
|
esac
|
|
|
|
|
shift
|
|
|
|
|
done
|
|
|
|
|
|
|
|
|
|
. $PROPERTIES_FILE
|
2017-01-08 20:16:52 -05:00
|
|
|
|
2017-01-20 21:00:43 -05:00
|
|
|
if [ -f $CLIENT_FILE_PREFIX.jks ] || [ -f $CLIENT_FILE_PREFIX.pub.pem ] || [ -f $CLIENT_FILE_PREFIX.nopass.pem ] || [ -f $CLIENT_FILE_PREFIX.pem ] || [ -f $CLIENT_FILE_PREFIX.p12 ];
|
|
|
|
|
then
|
|
|
|
|
while :
|
|
|
|
|
do
|
|
|
|
|
read -p "Output files from previous server.keygen.sh script run found. Overwrite?[yes]" response
|
|
|
|
|
case $response in
|
|
|
|
|
[nN]|[nN][oO])
|
|
|
|
|
echo "Skipping"
|
|
|
|
|
echo "Done"
|
|
|
|
|
exit 0
|
|
|
|
|
;;
|
|
|
|
|
[yY]|[yY][eE]|[yY][eE]|[sS]|[yY]|"")
|
|
|
|
|
echo "Cleaning up files"
|
|
|
|
|
rm -rf $CLIENT_FILE_PREFIX.jks
|
|
|
|
|
rm -rf $CLIENT_FILE_PREFIX.pub.pem
|
|
|
|
|
rm -rf $CLIENT_FILE_PREFIX.nopass.pem
|
|
|
|
|
rm -rf $CLIENT_FILE_PREFIX.pem
|
|
|
|
|
rm -rf $CLIENT_FILE_PREFIX.p12
|
|
|
|
|
break;
|
|
|
|
|
;;
|
|
|
|
|
*) echo "Please reply 'yes' or 'no'"
|
|
|
|
|
;;
|
|
|
|
|
esac
|
|
|
|
|
done
|
|
|
|
|
fi
|
|
|
|
|
|
2017-01-08 20:16:52 -05:00
|
|
|
echo "Generating SSL Key Pair..."
|
|
|
|
|
|
|
|
|
|
keytool -genkeypair -v \
|
|
|
|
|
-alias $CLIENT_KEY_ALIAS \
|
2017-01-18 00:48:07 -05:00
|
|
|
-dname "CN=$DOMAIN_SUFFIX, OU=Thingsboard, O=Thingsboard, L=Piscataway, ST=NJ, C=US" \
|
2017-01-08 20:16:52 -05:00
|
|
|
-keystore $CLIENT_FILE_PREFIX.jks \
|
2017-01-20 21:00:43 -05:00
|
|
|
-keypass $CLIENT_KEY_PASSWORD \
|
|
|
|
|
-storepass $CLIENT_KEYSTORE_PASSWORD \
|
2017-01-08 20:16:52 -05:00
|
|
|
-keyalg RSA \
|
|
|
|
|
-keysize 2048 \
|
|
|
|
|
-validity 9999
|
2017-01-20 21:00:43 -05:00
|
|
|
|
2017-01-08 20:16:52 -05:00
|
|
|
echo "Converting keystore to pkcs12"
|
|
|
|
|
keytool -importkeystore \
|
|
|
|
|
-srckeystore $CLIENT_FILE_PREFIX.jks \
|
|
|
|
|
-destkeystore $CLIENT_FILE_PREFIX.p12 \
|
|
|
|
|
-srcalias $CLIENT_KEY_ALIAS \
|
|
|
|
|
-srcstoretype jks \
|
|
|
|
|
-deststoretype pkcs12 \
|
2017-01-20 21:00:43 -05:00
|
|
|
-srcstorepass $CLIENT_KEYSTORE_PASSWORD \
|
|
|
|
|
-deststorepass $CLIENT_KEY_PASSWORD \
|
|
|
|
|
-srckeypass $CLIENT_KEY_PASSWORD \
|
|
|
|
|
-destkeypass $CLIENT_KEY_PASSWORD
|
2017-01-08 20:16:52 -05:00
|
|
|
|
|
|
|
|
echo "Converting pkcs12 to pem"
|
|
|
|
|
openssl pkcs12 -in $CLIENT_FILE_PREFIX.p12 \
|
|
|
|
|
-out $CLIENT_FILE_PREFIX.pem \
|
2017-01-20 21:00:43 -05:00
|
|
|
-passin pass:$CLIENT_KEY_PASSWORD \
|
|
|
|
|
-passout pass:$CLIENT_KEY_PASSWORD \
|
2017-01-08 20:16:52 -05:00
|
|
|
|
2017-01-20 21:00:43 -05:00
|
|
|
echo "Importing server public key to $CLIENT_FILE_PREFIX.jks"
|
|
|
|
|
keytool --importcert \
|
|
|
|
|
-file $SERVER_FILE_PREFIX.cer \
|
|
|
|
|
-keystore $CLIENT_FILE_PREFIX.jks \
|
|
|
|
|
-alias $SERVER_KEY_ALIAS \
|
|
|
|
|
-keypass $SERVER_KEY_PASSWORD \
|
|
|
|
|
-storepass $CLIENT_KEYSTORE_PASSWORD \
|
|
|
|
|
-noprompt
|
2017-01-08 20:16:52 -05:00
|
|
|
|
|
|
|
|
echo "Exporting no-password pem certificate"
|
2017-01-20 21:00:43 -05:00
|
|
|
openssl rsa -in $CLIENT_FILE_PREFIX.pem -out $CLIENT_FILE_PREFIX.nopass.pem -passin pass:$CLIENT_KEY_PASSWORD
|
2017-01-08 20:16:52 -05:00
|
|
|
tail -n +$(($(grep -m1 -n -e '-----BEGIN CERTIFICATE' $CLIENT_FILE_PREFIX.pem | cut -d: -f1) )) \
|
|
|
|
|
$CLIENT_FILE_PREFIX.pem >> $CLIENT_FILE_PREFIX.nopass.pem
|
|
|
|
|
|
2017-01-20 21:00:43 -05:00
|
|
|
echo "Exporting client public key"
|
|
|
|
|
tail -n +$(($(grep -m1 -n -e '-----BEGIN CERTIFICATE' $CLIENT_FILE_PREFIX.pem | cut -d: -f1) )) \
|
|
|
|
|
$CLIENT_FILE_PREFIX.pem >> $CLIENT_FILE_PREFIX.pub.pem
|
|
|
|
|
|
2017-01-08 20:16:52 -05:00
|
|
|
echo "Done."
|