This commit is contained in:
Josh Harvey 2016-10-24 19:44:50 +03:00
parent d79a931f02
commit a49fac6cc8
3 changed files with 42 additions and 5 deletions

40
certs.sh Normal file
View file

@ -0,0 +1,40 @@
# make directories to work from
mkdir -p certs
# Create your very own Root Certificate Authority
openssl genrsa \
-out certs/root-ca.key.pem \
4096
# Self-sign your Root Certificate Authority
# Since this is private, the details can be as bogus as you like
openssl req \
-x509 \
-new \
-nodes \
-key certs/root-ca.key.pem \
-days 3560 \
-out certs/root-ca.crt.pem \
-subj "/C=IS/ST=/L=Reykjavik/O=Lamassu Operator CA/CN=lamassu-operator.is"
# Create a Device Certificate for each domain,
# such as example.com, *.example.com, awesome.example.com
# NOTE: You MUST match CN to the domain name or ip address you want to use
openssl genrsa \
-out certs/server.key.pem \
4096
# Create a request from your Device, which your Root CA will sign
openssl req -new \
-key certs/server.key.pem \
-out certs/server.csr.pem \
-subj "/C=IS/ST=/L=Reykjavik/O=Lamassu Operator/CN=localhost"
# Sign the request from Device with your Root CA
openssl x509 \
-req -in certs/server.csr.pem \
-CA certs/root-ca.crt.pem \
-CAkey certs/root-ca.key.pem \
-CAcreateserial \
-out certs/server.crt.pem \
-days 3650