#!/usr/bin/env bash # vim:ts=4:sts=4:sw=4:et # args: hari-test-cli-cert ~/Downloads/test.p12 "" "" "" "My Cert Keystore" # # Author: Hari Sekhon # Date: 2022-06-28 18:34:34 +0100 (Tue, 28 Jun 2022) # # https://github.com/HariSekhon/DevOps-Bash-tools # # License: see accompanying Hari Sekhon LICENSE file # # If you're using my code you're welcome to connect with me on LinkedIn and optionally send me feedback to help steer this or other code I publish # # https://www.linkedin.com/in/HariSekhon # set -euo pipefail [ -n "${DEBUG:-}" ] && set -x srcdir="$(cd "$(dirname "${BASH_SOURCE[0]}")" && pwd)" # shellcheck disable=SC1090 . "$srcdir/lib/utils.sh" # shellcheck disable=SC2034,SC2154 usage_description=" Creates or Updates a Jenkins Certificate Credential in the given credential store and domain Defaults to the 'system::system::jenkins' provider store and global domain '_' If credential id and PKCS#12 keystore file aren't given as arguments, then reads from stdin, reading in 'ID=/path/to/keystore Description' or standard shell export format - useful for shell piping In cases where you are reading secrets from stdin, you can set the store and domain via the environment variables \$JENKINS_SECRET_STORE and \$JENKINS_SECRET_DOMAIN Tested on Jenkins 2.319 with Credentials plugin 2.5 Uses the adjacent jenkins_cli.sh - see there for authentication details Examples: # If you want to create a sample p12 file, you can do it like this: openssl req -x509 -nodes -newkey rsa:2048 -keyout test.key -out test.crt -subj '/CN=test.com' openssl pkcs12 -export -inkey test.key -in test.crt -passout pass: -out test.p12 # create a credential with id 'aws-access-key-csv', and file ~/.aws/keys/jenkins_accessKeys.csv: ${0##*/} my-certificate-keystore ~/Downloads/test.p12 # with a description, leaving the store and domain as the default global one: ${0##*/} my-certificate-keystore ~/Downloads/test.p12 '' '' 'My Certificate Keystore' # or piped from standard input: # export KEYSTORE_PASSWORD, JENKINS_SECRET_STORE and JENKINS_SECRET_DOMAIN if using stdin but not using system global store echo my-certificate-keystore=~/Downloads/test.p12 | ${0##*/} " # used by usage() in lib/utils.sh # shellcheck disable=SC2034 usage_args="[ ]" help_usage "$@" id="${1:-}" keystore="${2:-}" keystore_password="${3:-${KEYSTORE_PASSWORD:-}}" store="${4:-${JENKINS_SECRET_STORE:-system::system::jenkins}}" domain="${5:-${JENKINS_SECRET_DOMAIN:-_}}" description="${6:-}" set_credential(){ local key_value="$1" local description="${2:-}" parse_export_key_value "$key_value" # key/value are exported by above function # shellcheck disable=SC2154 local id="$key" # shellcheck disable=SC2154 local keystore="$value" if "$srcdir/jenkins_cli.sh" get-credentials-as-xml "$store" "$domain" "$id" &>/dev/null; then "$srcdir/jenkins_cred_cli_update_cert.sh" "$id" "$keystore" "$keystore_password" "$store" "$domain" "$description" else "$srcdir/jenkins_cred_cli_add_cert.sh" "$id" "$keystore" "$keystore_password" "$store" "$domain" "$description" fi } if [ -n "$keystore" ]; then set_credential "$id"="$keystore" "$description" else while read -r id_keystore description; do set_credential "$id_keystore" "$description" done < <(sed 's/^[[:space:]]*export[[:space:]]*//; /^[[:space:]]*$/d') fi