Hello community,

here is the log from the commit of package opensuse-openldap-image for 
openSUSE:Factory checked in at 2020-11-11 20:46:57
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/opensuse-openldap-image (Old)
 and      /work/SRC/openSUSE:Factory/.opensuse-openldap-image.new.26437 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "opensuse-openldap-image"

Wed Nov 11 20:46:57 2020 rev:3 rq:847721 version:1.0.0

Changes:
--------
--- 
/work/SRC/openSUSE:Factory/opensuse-openldap-image/opensuse-openldap-image.changes
  2020-10-26 16:23:30.847282636 +0100
+++ 
/work/SRC/openSUSE:Factory/.opensuse-openldap-image.new.26437/opensuse-openldap-image.changes
       2020-11-11 20:47:04.307685291 +0100
@@ -1,0 +2,5 @@
+Wed Nov  4 17:52:32 UTC 2020 - Thorsten Kukuk <[email protected]>
+
+- Add common scripts tar archive now containing ssl-helper
+
+-------------------------------------------------------------------

New:
----
  common-scripts.tar.gz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ opensuse-openldap-image.kiwi ++++++
--- /var/tmp/diff_new_pack.Sj0p6O/_old  2020-11-11 20:47:05.103686039 +0100
+++ /var/tmp/diff_new_pack.Sj0p6O/_new  2020-11-11 20:47:05.103686039 +0100
@@ -61,5 +61,6 @@
     <package name="-busybox-findutils"/>
     <package name="-busybox-man"/>
     <archive name="entrypoint.tar.gz"/>
+    <archive name="common-scripts.tar.gz"/>
   </packages>
 </image>

++++++ README.md ++++++
--- /var/tmp/diff_new_pack.Sj0p6O/_old  2020-11-11 20:47:05.151686084 +0100
+++ /var/tmp/diff_new_pack.Sj0p6O/_new  2020-11-11 20:47:05.155686087 +0100
@@ -90,7 +90,7 @@
 certificates into the container and adjusting the following environment 
variables:
 
 ```sh
-podman run --hostname ldap.example.org -v 
/srv/openldap/certs:/etc/openldap/certs:Z \
+podman run -v /srv/openldap/certs:/etc/openldap/certs:Z \
        -e LDAP_TLS_CRT=/etc/openldap/certs/ldap.crt \
        -e LDAP_TLS_KEY=/etc/openldap/certs/ldap.key \
        -e LDAP_TLS_CA_CRT=/etc/openldap/certs/ca.crt \

++++++ _service ++++++
--- /var/tmp/diff_new_pack.Sj0p6O/_old  2020-11-11 20:47:05.175686106 +0100
+++ /var/tmp/diff_new_pack.Sj0p6O/_new  2020-11-11 20:47:05.179686110 +0100
@@ -14,11 +14,15 @@
         <param name="subdir">openldap</param>
         <param name="filename">entrypoint</param>
         <param name="include">entrypoint.sh</param>
-        <param name="include">ssl-helper</param>
         <param name="include">slapd.init.ldif</param>
         <param name="include">ldif</param>
         <param name="include">tls</param>
     </service>
+    <service name="tar" mode="disabled">
+        <param name="subdir">common</param>
+        <param name="filename">common-scripts</param>
+        <param name="include">ssl-helper</param>
+    </service>
     <service name="recompress" mode="disabled">
         <param name="file">*.tar</param>
         <param name="compression">gz</param>

++++++ entrypoint.tar.gz ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/entrypoint/entrypoint.sh new/entrypoint/entrypoint.sh
--- old/entrypoint/entrypoint.sh        2020-10-26 13:40:28.000000000 +0100
+++ new/entrypoint/entrypoint.sh        2020-11-04 18:53:45.000000000 +0100
@@ -275,7 +275,7 @@
        echo "Add TLS config..."
 
        mkdir -p /etc/openldap/certs
-       /entrypoint/ssl-helper "$LDAP_TLS_CRT" "$LDAP_TLS_KEY" 
"$LDAP_TLS_CA_CRT" "$LDAP_TLS_CA_KEY"
+       /common-scripts/ssl-helper "$LDAP_TLS_CRT" "$LDAP_TLS_KEY" 
"$LDAP_TLS_CA_CRT" "$LDAP_TLS_CA_KEY"
        # make sure slapd is allowed to read it the files
        chown ldap:ldap "$LDAP_TLS_CRT" "$LDAP_TLS_KEY"
 
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/entrypoint/ssl-helper new/entrypoint/ssl-helper
--- old/entrypoint/ssl-helper   2020-10-26 13:40:28.000000000 +0100
+++ new/entrypoint/ssl-helper   1970-01-01 01:00:00.000000000 +0100
@@ -1,89 +0,0 @@
-#!/bin/bash
-
-# This tool helps to generate tls certificates
-
-CERT_FILE=$1
-KEY_FILE=$2
-CA_CERT_FILE=$3
-CA_KEY_FILE=$4
-
-# Some defaults
-SSL_CA_CSR_COUNTRY=${SSL_CA_CSR_COUNTRY:-"DE"}
-SSL_CA_CSR_STATE=${SSL_CA_CSR_STATE:-"Bavaria"}
-SSL_CA_CSR_ORGANIZATION_UNIT=${SSL_CA_CSR_ORGANIZATION_UNIT:-"Dummy CA"}
-SSL_CA_CSR_CN=${SSL_CA_CSR_CN:-"$(hostname -f)"}
-SSL_ORGANIZATION_UNIT=${SSL_ORGANIZATION_UNIT:-"Server Certificate"}
-
-if [ -z "${CERT_FILE}" ] || [ -z "${KEY_FILE}" ] || [ -z "${CA_CERT_FILE}" ] 
|| [ -z "${CA_KEY_FILE}" ]; then
-    echo "Usage: ssl-helper cert_file key_file ca_cert_file ca_key_file" >&2
-    exit 1
-fi
-
-if [ ! -e "${CA_CERT_FILE}" ]; then
-    echo "No CA cert file found, generating one"
-
-    if [ ! -e "${CA_KEY_FILE}" ]; then
-        echo "Generating private CA key..."
-       # RSA: openssl genrsa -out "${CA_KEY_FILE}" 4096
-       # ecdsa 384:
-       openssl ecparam -genkey -name secp384r1 -noout -out "${CA_KEY_FILE}"
-       chmod 600 "${CA_KEY_FILE}"
-    fi
-
-    echo "Generating CA certificate..."
-    openssl req -x509 -new -nodes -key "${CA_KEY_FILE}" -sha256 -days 1024 \
-           -subj 
"/C=${SSL_CA_CSR_COUNTRY}/ST=${SSL_CA_CSR_STATE}/O=${SSL_CA_CSR_ORGANIZATION_UNIT}/CN=${SSL_CA_CSR_CN}"
 \
-           -out "${CA_CERT_FILE}"
-fi
-
-if [ ! -e "${CERT_FILE}" ] && [ ! -e "${KEY_FILE}" ]; then
-
-    function buildExtCnf() {
-       cat << EOF > "${WORKDIR}/v3.ext"
-authorityKeyIdentifier=keyid,issuer
-basicConstraints=CA:FALSE
-keyUsage = digitalSignature, nonRepudiation, keyEncipherment, dataEncipherment
-subjectAltName = @alt_names
-[alt_names]
-DNS.1 = localhost
-EOF
-
-       if [ -n "${HOSTNAME}" ]; then
-           echo "DNS.2 = ${HOSTNAME}" >> "${WORKDIR}/v3.ext"
-       else
-           echo "DNS.2 = $(hostname -f)" >> "${WORKDIR}/v3.ext"
-           echo "DNS.3 = $(hostname)" >> "${WORKDIR}/v3.ext"
-       fi
-    }
-
-    echo "No certificate file and certificate key provided, generate:"
-    echo "${CERT_FILE} and ${KEY_FILE}"
-
-    WORKDIR="$(mktemp -d)"
-
-    buildExtCnf
-
-    echo "Generating certificate key..."
-    openssl genrsa -out "${KEY_FILE}" 2048
-    echo "Generating sign request..."
-    openssl req -new -sha256 -key "${KEY_FILE}" \
-           -subj "/O=${SSL_ORGANIZATION_UNIT}/CN=${HOSTNAME}" \
-           -out "${WORKDIR}/cert.csr"
-
-    echo "Generating certificate..."
-    openssl x509 -req -in "${WORKDIR}/cert.csr" -CA "${CA_CERT_FILE}" \
-           -CAkey "${CA_KEY_FILE}" -CAcreateserial -days 365 -sha256 \
-           -extfile "${WORKDIR}/v3.ext" \
-           -out "${CERT_FILE}"
-
-    rm -rf "${WORKDIR}"
-
-elif [ ! -e "${KEY_FILE}" ]; then
-    echo "ERROR: Certificate file ${CERT_FILE} exists but not key file 
${KEY_FILE}" >&2
-    exit 1
-elif [ ! -e "${CERT_FILE}" ]; then
-    echo "ERROR: Key file ${KEY_FILE} exists but not certificate file 
${CERT_FILE}" >&2
-    exit 1
-else
-    echo "Files ${CERT_FILE} and ${KEY_FILE} exists, do nothing..."
-fi
_______________________________________________
openSUSE Commits mailing list -- [email protected]
To unsubscribe, email [email protected]
List Netiquette: https://en.opensuse.org/openSUSE:Mailing_list_netiquette
List Archives: 
https://lists.opensuse.org/archives/list/[email protected]

Reply via email to