-
-
Save shaunthomas999/77d769a25c62f06b8dfe to your computer and use it in GitHub Desktop.
Generate a self-signed SSL cert. This script has to be used with openssl that comes with Nginx installation. Note: Run the script with `sudo`.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# Bash shell script for generating self-signed certs. Run this in a folder, as it | |
# generates a few files. Large portions of this script were taken from the | |
# following artcile: | |
# | |
# http://usrportage.de/archives/919-Batch-generating-SSL-certificates.html | |
# | |
# Additional alterations by: Brad Landers | |
# Date: 2012-01-27 | |
# | |
# Improvments added by: Shaun Thomas | |
# Date: 2016-03-29 | |
# Create a directory to store this certificate | |
sslDir=/etc/nginx/ssl | |
mkdir $sslDir | |
cd $sslDir | |
# Script accepts a single argument, the fqdn for the cert | |
DOMAIN="$1" | |
if [ -z "$DOMAIN" ]; then | |
echo "Usage: $(basename $0) <domain>" | |
exit 11 | |
fi | |
fail_if_error() { | |
[ $1 != 0 ] && { | |
unset PASSPHRASE | |
exit 10 | |
} | |
} | |
# Generate a passphrase | |
export PASSPHRASE=$(head -c 500 /dev/urandom | tr -dc a-z0-9A-Z | head -c 128; echo) | |
# Certificate details; replace items in angle brackets with your own info | |
subj=" | |
C=<COUNTRY> | |
ST=<STATE> | |
O=<COMPANY_NAME> | |
localityName=<CITY> | |
commonName=$DOMAIN | |
organizationalUnitName=<DEPARTMENT_NAME> | |
emailAddress=<ADMIN_EMAIL> | |
" | |
# Generate the server private key | |
openssl genrsa -des3 -out $DOMAIN.key -passout env:PASSPHRASE 2048 | |
fail_if_error $? | |
# Generate the CSR | |
openssl req \ | |
-new \ | |
-batch \ | |
-subj "$(echo -n "$subj" | tr "\n" "/")" \ | |
-key $DOMAIN.key \ | |
-out $DOMAIN.csr \ | |
-passin env:PASSPHRASE | |
fail_if_error $? | |
cp $DOMAIN.key $DOMAIN.key.org | |
fail_if_error $? | |
# Strip the password so we don't have to type it every time we restart Apache | |
openssl rsa -in $DOMAIN.key.org -out $DOMAIN.key -passin env:PASSPHRASE | |
fail_if_error $? | |
# Remove the temporary file which is not required anymore | |
rm $DOMAIN.key.org | |
# Generate the cert (good for 10 years) | |
openssl x509 -req -days 3650 -in $DOMAIN.csr -signkey $DOMAIN.key -out $DOMAIN.crt | |
fail_if_error $? | |
echo "Certificates are stored in the location: ${sslDir}" |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment