#!/bin/bash # Licensed to the Apache Software Foundation (ASF) under one # or more contributor license agreements. See the NOTICE file # distributed with this work for additional information # regarding copyright ownership. The ASF licenses this file # to you under the Apache License, Version 2.0 (the # "License"); you may not use this file except in compliance # with the License. You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, # software distributed under the License is distributed on an # "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY # KIND, either express or implied. See the License for the # specific language governing permissions and limitations # under the License. PROPS_FILE="$1" KS_FILE="$2" KS_PASS="$3" KS_VALIDITY="$4" CSR_FILE="$5" ALIAS="cloud" LIBVIRTD_FILE="/etc/libvirt/libvirtd.conf" if type -p logger > /dev/null; then LOGGER_CMD="$(type -p logger) -t cloudstack-keystore-setup" else LOG_FILE="/var/log/cloudstack/agent/cloudstack-keystore-setup.log" log() { if [ "${1}" != "" ]; then __log_line="${1}" else read -r __log_line fi echo "${__log_line}" >> "${LOG_FILE}" echo "${__log_line}" } LOGGER_CMD=log fi $LOGGER_CMD "$(date) - starting keystore-setup" # Re-use existing password or use the one provided if [ -f "$PROPS_FILE" ]; then $LOGGER_CMD "Previous props file exists, trying to extract password" OLD_PASS=$(sed -n '/^keystore.passphrase/p' "$PROPS_FILE" | sed 's/^keystore.passphrase=//g') if [ -n "${OLD_PASS// }" ]; then KS_PASS="$OLD_PASS" $LOGGER_CMD "Password extraction successful" else sed -i "/^keystore.passphrase.*/d" "$PROPS_FILE" 2>&1 | $LOGGER_CMD || true echo "keystore.passphrase=$KS_PASS" >> "$PROPS_FILE" if [ $? != 0 ]; then $LOGGER_CMD "Could not add new password to agent.properties" else $LOGGER_CMD "New keystore password set" fi fi fi if [ -f "$KS_FILE" ]; then $LOGGER_CMD "keystore file exists. Deleting current entries" keytool -delete -noprompt -alias "$ALIAS" -keystore "$KS_FILE" -storepass "$KS_PASS" 2>&1 | $LOGGER_CMD [ $? -ne 0 ] && $LOGGER_CMD "Failed to delete current entries" fi $LOGGER_CMD "Generating new key" CN=$(hostname --fqdn) keytool -genkey -storepass "$KS_PASS" -keypass "$KS_PASS" -alias "$ALIAS" -keyalg RSA -validity "$KS_VALIDITY" -dname cn="$CN",ou="cloudstack",o="cloudstack",c="cloudstack" -keystore "$KS_FILE" 2>&1 | $LOGGER_CMD # Generate CSR $LOGGER_CMD "Generating CSR" [ -f "$CSR_FILE" ] && rm -f "$CSR_FILE" addresses=$(ip address | grep inet | awk '{print $2}' | sed 's/\/.*//g' | grep -v '^169.254.' | grep -v '^127.0.0.1' | egrep -v '^::1|^fe80' | grep -v '^::1' | sed 's/^/ip:/g' | tr '\r\n' ',') $LOGGER_CMD "Found following SAN addresses to add to CSR: ${addresses}" keytool -certreq -storepass "$KS_PASS" -alias "$ALIAS" -file "$CSR_FILE" -keystore "$KS_FILE" -ext san="$addresses" 2>&1 | $LOGGER_CMD if [ $? -ne 0 ];then $LOGGER_CMD "Failed to generate CSR file, retrying after removing existing settings" if [ -f "$LIBVIRTD_FILE" ]; then $LOGGER_CMD "Reverting libvirtd to not listen on TLS" sed -i "s,^listen_tls=1,listen_tls=0,g" $LIBVIRTD_FILE systemctl restart libvirtd fi $LOGGER_CMD "Removing cloud.* files in /etc/cloudstack/agent" rm -f /etc/cloudstack/agent/cloud.* || $LOGGER_CMD "Could not remove /etc/cloudstack/agent/cloud.*" $LOGGER_CMD "Retrying to generate CSR file" keytool -certreq -storepass "$KS_PASS" -alias "$ALIAS" -file "$CSR_FILE" -keystore "$KS_FILE" -ext san="$addresses" 2>&1 | $LOGGER_CMD if [ $? -ne 0 ];then $LOGGER_CMD "Failed to generate CSR file while retrying" exit 1 fi fi cat "$CSR_FILE" # Fix file permissions chmod 600 "$KS_FILE" || $LOGGER_CMD "Cannot chmod $KS_FILE" chmod 600 "$PROPS_FILE" || $LOGGER_CMD "Cannot chmod $PROPS_FILE" chmod 600 "$CSR_FILE" || $LOGGER_CMD "Cannot chmod $CSR_FILE"