|
@@ -0,0 +1,37 @@
|
|
1
|
+#!/bin/bash
|
|
2
|
+# скрипт автодобавления сертификатов минцифры в Debian
|
|
3
|
+# author V.Koshuba - 2023(c)
|
|
4
|
+#
|
|
5
|
+
|
|
6
|
+# script path
|
|
7
|
+path_script="$(dirname $(readlink --canonicalize-existing "$0"))";
|
|
8
|
+# хост хранения сертификатов - откуда скачиваем
|
|
9
|
+url_gov="https://gu-st.ru/content/lending/";
|
|
10
|
+# сертификаты
|
|
11
|
+cert_gov=( "russian_trusted_sub_ca_pem.crt"
|
|
12
|
+ "russian_trusted_root_ca_pem.crt"
|
|
13
|
+ );
|
|
14
|
+
|
|
15
|
+# certs pool
|
|
16
|
+path_ssl="/etc/ssl/certs";
|
|
17
|
+
|
|
18
|
+function addCerts(){
|
|
19
|
+for ((ix = 0; ix != ${#cert_gov[@]}; ix++)); do
|
|
20
|
+ if sudo wget -c -t 1 --inet4-only -c -O $path_script/${cert_gov[$ix]} $url_gov/${cert_gov[$ix]}; then
|
|
21
|
+ echo "сертификат скачан успешно!";
|
|
22
|
+ else
|
|
23
|
+ echo "ошибка - сертификат не скачан!..";
|
|
24
|
+ exit
|
|
25
|
+ fi
|
|
26
|
+ sudo openssl x509 -in $path_script/${cert_gov[$ix]} -out $path_ssl/$(echo -e ${cert_gov[$ix]}|sed 's/\_pem.crt//g').pem -outform PEM;
|
|
27
|
+ sudo chmod 600 $path_ssl/$(echo -e ${cert_gov[$ix]}|sed 's/\_pem.crt//g').pem;
|
|
28
|
+ sudo chown root:root $path_ssl/$(echo -e ${cert_gov[$ix]}|sed 's/\_pem.crt//g').pem;
|
|
29
|
+ cd $path_ssl;
|
|
30
|
+ sudo ln -sf $(echo -e ${cert_gov[$ix]}|sed 's/\_pem.crt//g').pem `openssl x509 -noout -hash < $(echo -e ${cert_gov[$ix]}|sed 's/\_pem.crt//g').pem`.0
|
|
31
|
+ cd $HOME;
|
|
32
|
+done
|
|
33
|
+sudo update-ca-certificates;
|
|
34
|
+sudo update-ca-certificates --fresh;
|
|
35
|
+}
|
|
36
|
+
|
|
37
|
+addCerts;
|