get_cert 1.6 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647
  1. #!/bin/sh
  2. # This script will take an https URL as an argument. It will do the following:
  3. #
  4. # It will find whether this URL is the "effective URL", or whether it redirects
  5. # (possibly multiple times) to something else. It will output this "effective URL".
  6. #
  7. # It will then take the host part of that URL, connect to port 443 on it, and get the
  8. # certificate chain. It will take the last certificate on the chain (the root cert)
  9. # and obtain the issuer details as well as the notAfter date.
  10. #
  11. # The certicate is then saved in a format that can be included in an Arduino sketch
  12. # or any C/C++ environment to provide a "const char * root_cert" variable to hold
  13. # the entire root certificate.
  14. URL=`curl -w "%{url_effective}\n" -I -L -s -S $1 -o /dev/null`
  15. HOST=`echo $URL | awk -F[/:] '{print $4}'`
  16. FILENAME=`echo $HOST | sed -e 's/\./_/g'`.h
  17. TMPFILE=/tmp/cert.get_cert
  18. openssl s_client -showcerts -connect $HOST:443 < /dev/null 2>/dev/null| sed -n 'H; /^-----BEGIN CERTIFICATE-----/h; ${g;p;}' |sed -e '/-----END CERTIFICATE-----/q' > $TMPFILE
  19. NOTAFTER=`cat $TMPFILE | openssl x509 -noout -dates | grep 'notAfter'`
  20. ISSUER=`cat $TMPFILE | openssl x509 -noout -issuer`
  21. echo "The effective download URL (after resolving forwards) is:"
  22. echo " $URL"
  23. cat > $FILENAME <<EOF
  24. // This is the root certificate include file for $HOST
  25. // as obtained by the get_cert script on: `date`
  26. //
  27. //
  28. // Certificate info:
  29. // $ISSUER
  30. // $NOTAFTER
  31. //
  32. const char* root_cert = \\
  33. EOF
  34. cat $TMPFILE | sed 's/^/ "/g' | sed 's/$/\\n" \\/g' | sed '$ s/..$/;/' >> $FILENAME
  35. rm $TMPFILE
  36. echo ""
  37. echo "The root certificate include file is saved as:"
  38. echo " $FILENAME"