-
Notifications
You must be signed in to change notification settings - Fork 16
Expand file tree
/
Copy pathgenerate_cert.py
More file actions
100 lines (93 loc) · 3.41 KB
/
generate_cert.py
File metadata and controls
100 lines (93 loc) · 3.41 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
import datetime
import pathlib
import sys
from cryptography import x509
from cryptography.x509.oid import NameOID, ExtendedKeyUsageOID
from cryptography.hazmat.primitives import hashes
from cryptography.hazmat.backends import default_backend
from cryptography.hazmat.primitives import serialization
from cryptography.hazmat.primitives.asymmetric import rsa
# From https://stackoverflow.com/a/56292132
root_key = rsa.generate_private_key(
public_exponent=65537,
key_size=2048,
backend=default_backend()
)
subject = issuer = x509.Name([
x509.NameAttribute(NameOID.COUNTRY_NAME, u"US"),
x509.NameAttribute(NameOID.STATE_OR_PROVINCE_NAME, u"NA"),
x509.NameAttribute(NameOID.LOCALITY_NAME, u"NA"),
x509.NameAttribute(NameOID.ORGANIZATION_NAME, u"NA"),
x509.NameAttribute(NameOID.COMMON_NAME, u"MagiReCA"),
])
root_cert = x509.CertificateBuilder().subject_name(
subject
).issuer_name(
issuer
).public_key(
root_key.public_key()
).serial_number(
x509.random_serial_number()
).not_valid_before(
datetime.datetime.utcnow()
).not_valid_after(
datetime.datetime.utcnow() + datetime.timedelta(days=3650)
).add_extension(
x509.BasicConstraints(ca=True, path_length=None), critical=True
).sign(root_key, hashes.SHA256(), default_backend())
# Now we want to generate a cert from that root
cert_key = rsa.generate_private_key(
public_exponent=65537,
key_size=2048,
backend=default_backend()
)
new_subject = x509.Name([
x509.NameAttribute(NameOID.COUNTRY_NAME, u"US"),
x509.NameAttribute(NameOID.STATE_OR_PROVINCE_NAME, u"NA"),
x509.NameAttribute(NameOID.LOCALITY_NAME, u"NA"),
x509.NameAttribute(NameOID.ORGANIZATION_NAME, u"NA"),
x509.NameAttribute(NameOID.COMMON_NAME, u"*.magica-us.com")
])
cert = x509.CertificateBuilder().subject_name(
new_subject
).issuer_name(
root_cert.issuer
).public_key(
cert_key.public_key()
).serial_number(
x509.random_serial_number()
).not_valid_before(
datetime.datetime.utcnow()
).not_valid_after(
datetime.datetime.utcnow() + datetime.timedelta(days=2 * 365)
).add_extension(
x509.SubjectAlternativeName([
x509.DNSName(u"*.magica-us.com"),
x509.DNSName(u"magica-us.com"),
x509.DNSName(u"*.snaa.services"),
x509.DNSName(u"snaa.services")
]),
critical=False,
).add_extension(
x509.ExtendedKeyUsage([
ExtendedKeyUsageOID.SERVER_AUTH
]),
critical=True,
).sign(root_key, hashes.SHA256(), default_backend())
path = 'windows/nginx_windows/nginx/conf/cert'
if len(sys.argv) > 1:
path = sys.argv[-1]
print("writing cert to", path)
pathlib.Path(path).mkdir(parents=False, exist_ok=True)
with open(path + '/ca.crt', 'bw+') as f:
f.write(root_cert.public_bytes(encoding=serialization.Encoding.PEM))
with open(path + '/ca.key', 'bw+') as f:
f.write(root_key.private_bytes(encoding=serialization.Encoding.PEM,
format=serialization.PrivateFormat.TraditionalOpenSSL,
encryption_algorithm=serialization.NoEncryption()))
with open(path + '/site.key', 'bw+') as f:
f.write(cert_key.private_bytes(encoding=serialization.Encoding.PEM,
format=serialization.PrivateFormat.TraditionalOpenSSL,
encryption_algorithm=serialization.NoEncryption()))
with open(path + '/site.crt', 'bw+') as f:
f.write(cert.public_bytes(encoding=serialization.Encoding.PEM))