Skip to content

Commit

Permalink
Merge pull request #82 from Mahesh-Binayak/release-1.2.0.1
Browse files Browse the repository at this point in the history
Added expected name changes and convert.sh.
  • Loading branch information
ckm007 authored Feb 6, 2024
2 parents f9c9141 + d3956ab commit 57fb7dc
Show file tree
Hide file tree
Showing 6 changed files with 39 additions and 7 deletions.
35 changes: 35 additions & 0 deletions certs/convert.sh
Original file line number Diff line number Diff line change
@@ -0,0 +1,35 @@
#!/bin/bash
path=$1
partner_name=$( printenv PARTNER_KC_USERNAME )
cert_path=$path/certs/$partner_name


keystore_file=$cert_path/keystore.p12

# Prompt for keystore password
keystore_password=$(cat key.pwd)


openssl pkcs12 -in "$keystore_file" -clcerts -nokeys -out temp.pem -passin pass:"$keystore_password"
openssl x509 -in temp.pem -out output.cer
rm temp.pem

echo "User certificate exported successfully to output.cer"

# Convert newline escape sequences to actual newlines
sed 's/\\n/\n/g' output.cer > input.pem

# Extract the public key from the certificate in PEM format
CERTIFICATE_FILE=./input.pem
openssl x509 -in "${CERTIFICATE_FILE}" -pubkey -noout > pubkey.pem

# Convert the PEM public key to JWK format using the pem-jwk tool
#npm install -g pem-jwk
pem-jwk pubkey.pem > ./publickey.jwk
cat publickey.jwk
mv ./publickey.jwk $cert_path/publickey.jwk

# Clean up temporary files
rm input.pem pubkey.pem

echo "Public key converted to JWK format and saved as pubkey.jwk"
3 changes: 0 additions & 3 deletions demo-oidc-policy.json → default-demo-oidc-policy.json
Original file line number Diff line number Diff line change
Expand Up @@ -31,9 +31,6 @@
},
{
"attributeName": "addressLine1"
},
{
"attributeName": "individual_id"
}
],
"allowedAuthTypes": [
Expand Down
File renamed without changes.
File renamed without changes.
File renamed without changes.
8 changes: 4 additions & 4 deletions default.sh
Original file line number Diff line number Diff line change
Expand Up @@ -233,7 +233,7 @@ onboard_esignet_partner() {
--folder login-to-keycloak-as-admin \
--folder delete-user \
$ADD_SSL_NEWMAN \
--export-environment ./config-secrets.json -d ./default-misp-policy.json -r cli,htmlextra --reporter-htmlextra-export ./reports/e-signet.html --reporter-htmlextra-showEnvironmentData
--export-environment ./config-secrets.json -d ./default-esignet-misp-policy.json -r cli,htmlextra --reporter-htmlextra-export ./reports/e-signet.html --reporter-htmlextra-showEnvironmentData
MISP_LICENSE_KEY=$(jq -r '.values[] | select(.key == "mpartner-default-esignet-misp-license-key") | .value' config-secrets.json)

if [ -z "$MISP_LICENSE_KEY" ]; then
Expand Down Expand Up @@ -286,7 +286,7 @@ onboard_relying_party_with_demo_oidc_client(){
--folder create-oidc-client \
--folder delete-user \
$ADD_SSL_NEWMAN \
--export-environment ./config-secrets.json -d ./demo-oidc-policy.json -r cli,htmlextra --reporter-htmlextra-export ./reports/demo-oidc.html --reporter-htmlextra-showEnvironmentData
--export-environment ./config-secrets.json -d ./default-demo-oidc-policy.json -r cli,htmlextra --reporter-htmlextra-export ./reports/demo-oidc.html --reporter-htmlextra-showEnvironmentData
privateandpublickeypair=$(jq -r '.values[] | select(.key == "privateandpublickeypair") | .value' config-secrets.json)
privateandpublickeypair=$(echo -n "$privateandpublickeypair" | base64)
mpartnerdefaultdemooidcclientID=$(jq -r '.values[] | select(.key == "mpartner-default-demo-oidc-clientID") | .value' "config-secrets.json")
Expand Down Expand Up @@ -344,7 +344,7 @@ echo "Onboarding resident oidc client"
--folder create-oidc-client \
--folder delete-user \
$ADD_SSL_NEWMAN \
--export-environment ./config-secrets.json -d ./oidc-policy.json -r cli,htmlextra --reporter-htmlextra-export ./reports/resident-oidc.html --reporter-htmlextra-showEnvironmentData
--export-environment ./config-secrets.json -d ./default-resident-oidc-policy.json -r cli,htmlextra --reporter-htmlextra-export ./reports/resident-oidc.html --reporter-htmlextra-showEnvironmentData
mpartnerdefaultresidentoidcclientID=$(jq -r '.values[] | select(.key == "mpartner-default-resident-oidc-clientID") | .value' "config-secrets.json")
}
onboard_mimoto_keybinding_partner(){
Expand Down Expand Up @@ -446,7 +446,7 @@ onboard_mimoto_oidc_partner(){
--folder create-oidc-client \
--folder delete-user \
$ADD_SSL_NEWMAN \
--export-environment ./config-secrets.json -d ./mimoto-oidc-policy.json -r cli,htmlextra --reporter-htmlextra-export ./reports/mimoto-oidc.html --reporter-htmlextra-showEnvironmentData
--export-environment ./config-secrets.json -d ./default-mimoto-oidc-policy.json -r cli,htmlextra --reporter-htmlextra-export ./reports/mimoto-oidc.html --reporter-htmlextra-showEnvironmentData
mpartnerdefaultmimotooidcclientID=$(jq -r '.values[] | select(.key == "mpartner-default-mimotooidc-clientID") | .value' "config-secrets.json")
}

Expand Down

0 comments on commit 57fb7dc

Please sign in to comment.