Merge branch 'main' into dev
commit
e67d07d05f
@ -0,0 +1,10 @@
|
|||||||
|
@echo off
|
||||||
|
|
||||||
|
echo ===========================================
|
||||||
|
echo [ Description ]
|
||||||
|
echo 환경변수(사용자변수)에 추가합니다.
|
||||||
|
echo [ Use ]
|
||||||
|
echo environment-add.bat [변수] [값]
|
||||||
|
echo ===========================================
|
||||||
|
|
||||||
|
reg add HKCU\Environment /v %1 /d %2
|
@ -0,0 +1,10 @@
|
|||||||
|
@echo off
|
||||||
|
|
||||||
|
echo ===========================================
|
||||||
|
echo [ Description ]
|
||||||
|
echo 등록된 환경변수(사용자변수)를 삭제합니다.
|
||||||
|
echo [ Use ]
|
||||||
|
echo environment-delete.bat [변수]
|
||||||
|
echo ===========================================
|
||||||
|
|
||||||
|
reg delete HKCU\Environment /v %1
|
@ -0,0 +1,5 @@
|
|||||||
|
@echo off
|
||||||
|
|
||||||
|
|
||||||
|
rem Real Time Logging...(Windows: Get-Content [파일명] -Wait -Tail 10, Linux: tail -f [파일명])
|
||||||
|
powershell.exe -Command "Get-Content ./logs/logback.log -Wait -Tail 10"
|
Binary file not shown.
@ -0,0 +1,12 @@
|
|||||||
|
@echo off
|
||||||
|
|
||||||
|
setlocal
|
||||||
|
|
||||||
|
call %~dp0/setenv.bat
|
||||||
|
|
||||||
|
echo Service Delete...
|
||||||
|
echo nssm remove %NTRI_SERVICE_NAME% confirm
|
||||||
|
%~dp0/nssm remove %NTRI_SERVICE_NAME% confirm
|
||||||
|
|
||||||
|
echo.
|
||||||
|
pause
|
@ -0,0 +1,9 @@
|
|||||||
|
@echo off
|
||||||
|
|
||||||
|
setlocal
|
||||||
|
|
||||||
|
call %~dp0/setenv.bat
|
||||||
|
|
||||||
|
echo Service Modify...
|
||||||
|
echo nssm edit %NTRI_SERVICE_NAME%
|
||||||
|
%~dp0/nssm edit %NTRI_SERVICE_NAME%
|
@ -0,0 +1,6 @@
|
|||||||
|
@echo off
|
||||||
|
|
||||||
|
call %~dp0/setenv.bat
|
||||||
|
|
||||||
|
rem Real Time Logging...(Windows: Get-Content [파일명] -Wait -Tail 10, Linux: tail -f [파일명])
|
||||||
|
powershell.exe -Command "Get-Content "%NTRI_LOG_PATH%/stdout.log" -Wait -Tail 10"
|
@ -0,0 +1,33 @@
|
|||||||
|
@echo off
|
||||||
|
|
||||||
|
setlocal
|
||||||
|
|
||||||
|
call %~dp0/setenv.bat
|
||||||
|
|
||||||
|
echo Service Add...
|
||||||
|
%~dp0/nssm install %NTRI_SERVICE_NAME% "%NTRI_APP_BIN_DIR%/startup.bat"
|
||||||
|
|
||||||
|
|
||||||
|
%~dp0/nssm set %NTRI_SERVICE_NAME% AppDirectory %NTRI_APP_DIR%
|
||||||
|
|
||||||
|
%~dp0/nssm set %NTRI_SERVICE_NAME% Description %NTRI_SERVICE_DESCRIPTION%
|
||||||
|
|
||||||
|
%~dp0/nssm set %NTRI_SERVICE_NAME% AppStdin %NTRI_LOG_PATH%/stdin.log
|
||||||
|
%~dp0/nssm set %NTRI_SERVICE_NAME% AppStdout %NTRI_LOG_PATH%/stdout.log
|
||||||
|
%~dp0/nssm set %NTRI_SERVICE_NAME% AppStderr %NTRI_LOG_PATH%/stderr.log
|
||||||
|
|
||||||
|
%~dp0/nssm set %NTRI_SERVICE_NAME% AppStdoutCreationDisposition 4
|
||||||
|
%~dp0/nssm set %NTRI_SERVICE_NAME% AppStderrCreationDisposition 4
|
||||||
|
|
||||||
|
%~dp0/nssm set %NTRI_SERVICE_NAME% AppRotateFiles 1
|
||||||
|
%~dp0/nssm set %NTRI_SERVICE_NAME% AppRotateOnline 1
|
||||||
|
%~dp0/nssm set %NTRI_SERVICE_NAME% AppRotateSeconds 2592000
|
||||||
|
%~dp0/nssm set %NTRI_SERVICE_NAME% AppRotateBytes 104857600
|
||||||
|
|
||||||
|
%~dp0/nssm set %NTRI_SERVICE_NAME% Start SERVICE_AUTO_START
|
||||||
|
rem %~dp0/nssm start %NTRI_SERVICE_NAME%
|
||||||
|
|
||||||
|
echo.
|
||||||
|
pause
|
||||||
|
|
||||||
|
|
@ -0,0 +1,12 @@
|
|||||||
|
@echo off
|
||||||
|
|
||||||
|
setlocal
|
||||||
|
|
||||||
|
call %~dp0/setenv.bat
|
||||||
|
|
||||||
|
echo Service Starting...
|
||||||
|
echo nssm start %NTRI_SERVICE_NAME%
|
||||||
|
%~dp0/nssm start %NTRI_SERVICE_NAME%
|
||||||
|
|
||||||
|
echo.
|
||||||
|
pause
|
@ -0,0 +1,12 @@
|
|||||||
|
@echo off
|
||||||
|
|
||||||
|
setlocal
|
||||||
|
|
||||||
|
call %~dp0/setenv.bat
|
||||||
|
|
||||||
|
echo Service Status...
|
||||||
|
echo nssm status %NTRI_SERVICE_NAME%
|
||||||
|
%~dp0/nssm status %NTRI_SERVICE_NAME%
|
||||||
|
|
||||||
|
echo.
|
||||||
|
pause
|
@ -0,0 +1,12 @@
|
|||||||
|
@echo off
|
||||||
|
|
||||||
|
setlocal
|
||||||
|
|
||||||
|
call %~dp0/setenv.bat
|
||||||
|
|
||||||
|
echo Service Stop...
|
||||||
|
echo nssm stop %NTRI_SERVICE_NAME%
|
||||||
|
%~dp0/nssm stop %NTRI_SERVICE_NAME%
|
||||||
|
|
||||||
|
echo.
|
||||||
|
pause
|
@ -0,0 +1,69 @@
|
|||||||
|
@echo off
|
||||||
|
|
||||||
|
|
||||||
|
rem ===========================================================
|
||||||
|
rem Application 설정
|
||||||
|
rem [ 연계대상코드(NTRI_APP_LINKTRGTCD) 환경변수 설명 ]
|
||||||
|
rem 세외수입에서 부여한 시스템코드 조합 15자리.
|
||||||
|
rem -. Format: 연계기관코드(7)+연계시스템코드(3)+연계일련번호(5)
|
||||||
|
rem -. ex) 3990000PVM00001 //남양주(3990000)+주정차과태료시스템(PVM)+연계일련번호(00001)
|
||||||
|
rem ===========================================================
|
||||||
|
set NTRI_APP_HOME=%~dp0..
|
||||||
|
set NTRI_APP_BIN_DIR=%NTRI_APP_HOME%\bin
|
||||||
|
set NTRI_APP_DIR=%NTRI_APP_HOME%\webapp
|
||||||
|
set NTRI_APP=ntri-0.0.1-SNAPSHOT.jar
|
||||||
|
set NTRI_APP_PORT=18080
|
||||||
|
set NTRI_APP_LINKTRGTCD=
|
||||||
|
|
||||||
|
|
||||||
|
rem ===========================================================
|
||||||
|
rem SERVICE 등록정보
|
||||||
|
rem ===========================================================
|
||||||
|
set NTRI_SERVICE_NAME="Apache Tomcat - NTRI"
|
||||||
|
set NTRI_SERVICE_DESCRIPTION="XIT 세외수입 개별시스템 연계 API 입니다"
|
||||||
|
set NTRI_LOG_PATH=%NTRI_APP_HOME%/logs
|
||||||
|
|
||||||
|
rem ===========================================================
|
||||||
|
rem JDK 설정
|
||||||
|
rem ===========================================================
|
||||||
|
rem set NTRI_JAVA_HOME=%JAVA_HOME%
|
||||||
|
set NTRI_JAVA_HOME=C:\XIT\ntri\java\corretto-11.0.15
|
||||||
|
set NTRI_JAVA_BIN_DIR=%NTRI_JAVA_HOME%/bin
|
||||||
|
|
||||||
|
rem ===========================================================
|
||||||
|
rem SSL 설정
|
||||||
|
rem ===========================================================
|
||||||
|
set NTRI_SSL_ENABLED=true
|
||||||
|
rem set NTRI_SSL_KEY_AS="alias_name"
|
||||||
|
rem set NTRI_SSL_KEY_STORE=%NTRI_APP_HOME%/ssl/cert/certificate.p12
|
||||||
|
rem set NTRI_SSL_KEY_STORE_TYPE="PKCS12"
|
||||||
|
rem set NTRI_SSL_KEY_STORE_PASSWORD="xit5811807"
|
||||||
|
set NTRI_SSL_PRIVATE_KEY=%NTRI_APP_HOME%\ssl\cert\server.key
|
||||||
|
set NTRI_SSL_CERT=%NTRI_APP_HOME%\ssl\cert\server.crt
|
||||||
|
|
||||||
|
rem ===========================================================
|
||||||
|
rem DB 설정
|
||||||
|
rem [ NTRI_DB_DIALECT 입력값 목록]
|
||||||
|
rem Dialect는 DBMS 버전별 상이할 수 있으므로 안될 경우 인터넷 검색
|
||||||
|
rem -. Oracle: Oracle10gDialect
|
||||||
|
rem -. Maria: MariaDB106Dialect
|
||||||
|
rem -. Mysql: MySQL5InnoDBDialect
|
||||||
|
rem ===========================================================
|
||||||
|
set NTRI_DB_DIALECT=Oracle10gDialect
|
||||||
|
set NTRI_DB_DRIVER=oracle.jdbc.OracleDriver
|
||||||
|
set NTRI_DB_URL=jdbc:oracle:thin:@105.13.2.40:1521:ora11g
|
||||||
|
set NTRI_DB_USER=xit_traffic
|
||||||
|
set NTRI_DB_PASSWD=traffic5
|
||||||
|
|
||||||
|
rem ===========================================================
|
||||||
|
rem VM 옵션
|
||||||
|
rem ===========================================================
|
||||||
|
rem set NTRI_VM_OPTIONS=-Dspring.profiles.active=prod -Dapp.server.port=%NTRI_APP_PORT% -Dapp.datasource.platform=%NTRI_DB_DIALECT% -Dapp.datasource.driver=%NTRI_DB_DRIVER% -Dapp.datasource.url=%NTRI_DB_URL% -Dapp.datasource.username=%NTRI_DB_USER% -Dapp.datasource.password=%NTRI_DB_PASSWD% -Dapp.ssl.enabled=%NTRI_SSL_ENABLED% -Dapp.ssl.key-alias=%NTRI_SSL_KEY_AS% -Dapp.ssl.key-store=%NTRI_SSL_KEY_STORE% -Dapp.ssl.key-store-type=%NTRI_SSL_KEY_STORE_TYPE% -Dapp.ssl.key-tore-password=%NTRI_SSL_KEY_STORE_PASSWORD%
|
||||||
|
set NTRI_VM_OPTIONS=-Dspring.profiles.active=prod -Dapp.server.port=%NTRI_APP_PORT% -Dapp.datasource.platform=%NTRI_DB_DIALECT% -Dapp.datasource.driver=%NTRI_DB_DRIVER% -Dapp.datasource.url=%NTRI_DB_URL% -Dapp.datasource.username=%NTRI_DB_USER% -Dapp.datasource.password=%NTRI_DB_PASSWD% -Dapp.ssl.enabled=%NTRI_SSL_ENABLED% -Dapp.ssl.private-key=%NTRI_SSL_PRIVATE_KEY% -Dapp.ssl.cert=%NTRI_SSL_CERT%
|
||||||
|
set NTRI_VM_OPTIONS=%NTRI_VM_OPTIONS% -Dapp.resp.linkTrgtCd=%NTRI_APP_LINKTRGTCD%
|
||||||
|
|
||||||
|
|
||||||
|
rem ===========================================================
|
||||||
|
rem CURL 파일 경로
|
||||||
|
rem ===========================================================
|
||||||
|
set NTRI_CURL_PATH=%NTRI_APP_HOME%\bin\test\curl_7_53_1_openssl_nghttp2_x64
|
@ -0,0 +1,4 @@
|
|||||||
|
@echo off
|
||||||
|
|
||||||
|
for /F "delims=" %%i in (mdpost.pid) do set "PROC_ID=%%i"
|
||||||
|
taskkill /F /PID %PROC_ID%
|
@ -0,0 +1,4 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
|
||||||
|
ENS_PID=$(<./mdpost.pid)
|
||||||
|
kill -15 $ENS_PID
|
@ -0,0 +1,8 @@
|
|||||||
|
@echo off
|
||||||
|
|
||||||
|
setlocal
|
||||||
|
|
||||||
|
call %~dp0/setenv.bat
|
||||||
|
|
||||||
|
echo Start...
|
||||||
|
call "%NTRI_JAVA_BIN_DIR%/java" -jar %NTRI_VM_OPTIONS% "%NTRI_APP_DIR%/%NTRI_APP%"
|
@ -0,0 +1,7 @@
|
|||||||
|
#@echo off
|
||||||
|
|
||||||
|
echo Stoped background...
|
||||||
|
./shutdown.sh
|
||||||
|
|
||||||
|
echo Started background...
|
||||||
|
java -jar "-Dspring.profiles.active=prod-xxxxxx" .\webapp\module-post-0.0.1-SNAPSHOT.war
|
@ -0,0 +1,11 @@
|
|||||||
|
@echo off
|
||||||
|
|
||||||
|
call ../setenv.bat
|
||||||
|
|
||||||
|
echo 부과취소수신 API 호출
|
||||||
|
echo curl -X POST -H "Content-Type: application/json" https://localhost:18080/recv/levy/cancel -k -d @levyCancel.json
|
||||||
|
%NTRI_CURL_PATH%/curl -X POST -H "Content-Type: application/json" http://localhost:18080/recv/levy/cancel -k -d @levyCancel.json
|
||||||
|
|
||||||
|
echo.
|
||||||
|
echo.
|
||||||
|
pause
|
@ -0,0 +1,11 @@
|
|||||||
|
@echo off
|
||||||
|
|
||||||
|
call ../setenv.bat
|
||||||
|
|
||||||
|
echo 부과결과수신 API 호출
|
||||||
|
echo curl -X POST -H "Content-Type: application/json" https://localhost:18080/recv/levy/result -k -d @levyResult.json
|
||||||
|
%NTRI_CURL_PATH%/curl -X POST -H "Content-Type: application/json" https://localhost:18080/recv/levy/result -k -d @levyResult.json
|
||||||
|
|
||||||
|
echo.
|
||||||
|
echo.
|
||||||
|
pause
|
@ -0,0 +1,11 @@
|
|||||||
|
@echo off
|
||||||
|
|
||||||
|
call ../setenv.bat
|
||||||
|
|
||||||
|
echo 수납정보수신 API 호출
|
||||||
|
echo curl -X POST -H "Content-Type: application/json" https://localhost:18080/recv/rciv/info -k -d @rcivInfo.json
|
||||||
|
%NTRI_CURL_PATH%/curl -X POST -H "Content-Type: application/json" https://localhost:18080/recv/rciv/info -k -d @rcivInfo.json
|
||||||
|
|
||||||
|
echo.
|
||||||
|
echo.
|
||||||
|
pause
|
@ -0,0 +1,11 @@
|
|||||||
|
@echo off
|
||||||
|
|
||||||
|
call ../setenv.bat
|
||||||
|
|
||||||
|
echo 감액정보수신 API 호출
|
||||||
|
echo curl -X POST -H "Content-Type: application/json" https://localhost:18080/recv/rdcamt/info -k -d @rdcamtInfo.json
|
||||||
|
%NTRI_CURL_PATH%/curl -X POST -H "Content-Type: application/json" https://localhost:18080/recv/rdcamt/info -k -d @rdcamtInfo.json
|
||||||
|
|
||||||
|
echo.
|
||||||
|
echo.
|
||||||
|
pause
|
@ -0,0 +1,25 @@
|
|||||||
|
@echo off
|
||||||
|
|
||||||
|
call ../setenv.bat
|
||||||
|
|
||||||
|
|
||||||
|
call
|
||||||
|
echo 부과결과 API 호출
|
||||||
|
echo curl -X POST -H "Content-Type: application/json" https://localhost:18080/recv -k -d @levyResult.json
|
||||||
|
%NTRI_CURL_PATH%/curl -X POST -H "Content-Type: application/json" https://localhost:18080/recv -k -d @levyResult.json
|
||||||
|
echo.
|
||||||
|
echo 부과취소 API 호출
|
||||||
|
echo curl -X POST -H "Content-Type: application/json" https://localhost:18080/recv -k -d @levyCancel.json
|
||||||
|
%NTRI_CURL_PATH%/curl -X POST -H "Content-Type: application/json" https://localhost:18080/recv -k -d @levyCancel.json
|
||||||
|
echo.
|
||||||
|
echo 수납결과 API 호출
|
||||||
|
echo curl -X POST -H "Content-Type: application/json" https://localhost:18080/recv -k -d @rcivInfo.json
|
||||||
|
%NTRI_CURL_PATH%/curl -X POST -H "Content-Type: application/json" https://localhost:18080/recv -k -d @rcivInfo.json
|
||||||
|
echo.
|
||||||
|
echo 감액정보 API 호출
|
||||||
|
echo curl -X POST -H "Content-Type: application/json" https://localhost:18080/recv -k -d @rdcamtInfo.json
|
||||||
|
%NTRI_CURL_PATH%/curl -X POST -H "Content-Type: application/json" https://localhost:18080/recv -k -d @rdcamtInfo.json
|
||||||
|
|
||||||
|
echo.
|
||||||
|
echo.
|
||||||
|
pause
|
File diff suppressed because it is too large
Load Diff
Binary file not shown.
@ -0,0 +1 @@
|
|||||||
|
{"header":{"ifDate":"20210412103022","ifMsgKey":"Z211103155123435-e7def4c1652a478e9c77525ab5b3ebda","ifId":"ERR_Z000001DCP_1741000NIS_0002","source":"3820000DCP","target":"1741000NIS","ifType":"S","ifFormat":"J","retName":"","retCode":""},"body":{"reqVo":[{"registDt":null,"lastUpdtDt":null,"rspSgbCd":null,"rspLinkTrgtCd":null,"rspLinkMngKey":null,"rspLinkRstCd":null,"rspLinkRstMsg":null,"id":null,"sgbCd":null,"linkMngKey":null,"taxnNo":null,"lvyRtrcnYmd":null,"delRsnCn":null,"rsveItem1":null,"rsveItem2":null,"rsveItem3":null,"rsveItem4":null,"rsveItem5":null}]}}
|
@ -0,0 +1 @@
|
|||||||
|
{"header":{"ifDate":"20210412103022","ifMsgKey":"Z211103155123435-e7def4c1652a478e9c77525ab5b3ebda","ifId":"ERR_Z000001DCP_1741000NIS_0001","source":"3820000DCP","target":"1741000NIS","ifType":"S","ifFormat":"J","retName":"","retCode":""},"body":{"reqVo":[{"registDt":null,"lastUpdtDt":null,"rspSgbCd":null,"rspLinkTrgtCd":null,"rspLinkMngKey":null,"rspLinkRstCd":null,"rspLinkRstMsg":null,"id":null,"sgbCd":null,"linkMngKey":null,"taxnNo":null,"untyTaxnNo":null,"dptCd":null,"spclFisBizCd":null,"fyr":null,"actSeCd":null,"rprsTxmCd":null,"operItemCd":null,"lvyNo":null,"itmNo":null,"epayNo":null,"vtlacBankNm1":null,"vtlacBankNm2":null,"vtlacBankNm3":null,"vtlacBankNm4":null,"vtlacBankNm5":null,"vtlacBankNm6":null,"vtlacBankNm7":null,"vtlacBankNm8":null,"vtlacBankNm9":null,"vtlacBankNm10":null,"vtlacBankNm11":null,"vtlacBankNm12":null,"vtlacBankNm13":null,"vtlacBankNm14":null,"vtlacBankNm15":null,"vtlacBankNm16":null,"vtlacBankNm17":null,"vtlacBankNm18":null,"vtlacBankNm19":null,"vtlacBankNm20":null,"vrActno1":null,"vrActno2":null,"vrActno3":null,"vrActno4":null,"vrActno5":null,"vrActno6":null,"vrActno7":null,"vrActno8":null,"vrActno9":null,"vrActno10":null,"vrActno11":null,"vrActno12":null,"vrActno13":null,"vrActno14":null,"vrActno15":null,"vrActno16":null,"vrActno17":null,"vrActno18":null,"vrActno19":null,"vrActno20":null,"rsveItem1":null,"rsveItem2":null,"rsveItem3":null,"rsveItem4":null,"rsveItem5":null}]}}
|
@ -0,0 +1 @@
|
|||||||
|
{"header":{"ifDate":"20210412103022","ifMsgKey":"Z211103155123435-e7def4c1652a478e9c77525ab5b3ebda","ifId":"ERR_Z000001DCP_1741000NIS_0003","source":"3820000DCP","target":"1741000NIS","ifType":"S","ifFormat":"J","retName":"","retCode":""},"body":{"reqVo":[{"registDt":null,"lastUpdtDt":null,"rspSgbCd":null,"rspLinkTrgtCd":null,"rspLinkMngKey":null,"rspLinkRstCd":null,"rspLinkRstMsg":null,"id":null,"sgbCd":null,"sgbNm":null,"linkMngKey":null,"taxnNo":null,"untyTaxnNo":null,"dptCd":null,"dptNm":null,"spclFisBizCd":null,"spclFisBizNm":null,"fyr":null,"actSeCd":null,"actSeNm":null,"rprsTxmCd":null,"rprsTxmNm":null,"operItemCd":null,"operItemNm":null,"lvyNo":null,"itmNo":null,"epayNo":null,"rcvmtNo":null,"rcvmtSeCd":null,"rcvmtSeNm":null,"rcvmtYmd":null,"actYmd":null,"tsfYmd":null,"rcvmtPctAmt":null,"rcvmtAdtnAmt":null,"rcvmtIntrAmt":null,"bankNm":null,"rcvmtTyCd":null,"rcvmtTy":null,"rsveItem1":null,"rsveItem2":null,"rsveItem3":null,"rsveItem4":null,"rsveItem5":null}]}}
|
@ -0,0 +1 @@
|
|||||||
|
{"header":{"ifDate":"20210412103022","ifMsgKey":"Z211103155123435-e7def4c1652a478e9c77525ab5b3ebda","ifId":"ERR_Z000001DCP_1741000NIS_0004","source":"3820000DCP","target":"1741000NIS","ifType":"S","ifFormat":"J","retName":"","retCode":""},"body":{"reqVo":[{"registDt":null,"lastUpdtDt":null,"rspSgbCd":null,"rspLinkTrgtCd":null,"rspLinkMngKey":null,"rspLinkRstCd":null,"rspLinkRstMsg":null,"id":null,"sgbCd":null,"sgbNm":null,"linkMngKey":null,"taxnNo":null,"untyTaxnNo":null,"dptCd":null,"dptNm":null,"spclFisBizCd":null,"spclFisBizNm":null,"fyr":null,"actSeCd":null,"actSeNm":null,"rprsTxmCd":null,"rprsTxmNm":null,"operItemCd":null,"operItemNm":null,"lvyNo":null,"itmNo":null,"rdcYmd":null,"rdcPctAmt":null,"rdcAdtnAmt":null,"rdcIntrAmt":null,"rdcAmt":null,"rdcRsnCn":null,"rsveItem1":null,"rsveItem2":null,"rsveItem3":null,"rsveItem4":null,"rsveItem5":null}]}}
|
@ -0,0 +1,367 @@
|
|||||||
|
#
|
||||||
|
# OpenSSL example configuration file.
|
||||||
|
# This is mostly being used for generation of certificate requests.
|
||||||
|
#
|
||||||
|
|
||||||
|
# This definition stops the following lines choking if HOME isn't
|
||||||
|
# defined.
|
||||||
|
HOME = .
|
||||||
|
RANDFILE = $ENV::HOME/.rnd
|
||||||
|
|
||||||
|
# Extra OBJECT IDENTIFIER info:
|
||||||
|
#oid_file = $ENV::HOME/.oid
|
||||||
|
oid_section = new_oids
|
||||||
|
|
||||||
|
# To use this configuration file with the "-extfile" option of the
|
||||||
|
# "openssl x509" utility, name here the section containing the
|
||||||
|
# X.509v3 extensions to use:
|
||||||
|
# extensions =
|
||||||
|
# (Alternatively, use a configuration file that has only
|
||||||
|
# X.509v3 extensions in its main [= default] section.)
|
||||||
|
|
||||||
|
[ new_oids ]
|
||||||
|
|
||||||
|
# We can add new OIDs in here for use by 'ca', 'req' and 'ts'.
|
||||||
|
# Add a simple OID like this:
|
||||||
|
# testoid1=1.2.3.4
|
||||||
|
# Or use config file substitution like this:
|
||||||
|
# testoid2=${testoid1}.5.6
|
||||||
|
|
||||||
|
# Policies used by the TSA examples.
|
||||||
|
tsa_policy1 = 1.2.3.4.1
|
||||||
|
tsa_policy2 = 1.2.3.4.5.6
|
||||||
|
tsa_policy3 = 1.2.3.4.5.7
|
||||||
|
|
||||||
|
####################################################################
|
||||||
|
[ ca ]
|
||||||
|
default_ca = CA_default # The default ca section
|
||||||
|
|
||||||
|
####################################################################
|
||||||
|
[ CA_default ]
|
||||||
|
|
||||||
|
dir = ./demoCA # Where everything is kept
|
||||||
|
certs = $dir/certs # Where the issued certs are kept
|
||||||
|
crl_dir = $dir/crl # Where the issued crl are kept
|
||||||
|
database = $dir/index.txt # database index file.
|
||||||
|
#unique_subject = no # Set to 'no' to allow creation of
|
||||||
|
# several ctificates with same subject.
|
||||||
|
new_certs_dir = $dir/newcerts # default place for new certs.
|
||||||
|
|
||||||
|
certificate = $dir/cacert.pem # The CA certificate
|
||||||
|
serial = $dir/serial # The current serial number
|
||||||
|
crlnumber = $dir/crlnumber # the current crl number
|
||||||
|
# must be commented out to leave a V1 CRL
|
||||||
|
crl = $dir/crl.pem # The current CRL
|
||||||
|
private_key = $dir/private/cakey.pem# The private key
|
||||||
|
RANDFILE = $dir/private/.rand # private random number file
|
||||||
|
|
||||||
|
x509_extensions = usr_cert # The extentions to add to the cert
|
||||||
|
|
||||||
|
# Comment out the following two lines for the "traditional"
|
||||||
|
# (and highly broken) format.
|
||||||
|
name_opt = ca_default # Subject Name options
|
||||||
|
cert_opt = ca_default # Certificate field options
|
||||||
|
|
||||||
|
# Extension copying option: use with caution.
|
||||||
|
# copy_extensions = copy
|
||||||
|
|
||||||
|
# Extensions to add to a CRL. Note: Netscape communicator chokes on V2 CRLs
|
||||||
|
# so this is commented out by default to leave a V1 CRL.
|
||||||
|
# crlnumber must also be commented out to leave a V1 CRL.
|
||||||
|
# crl_extensions = crl_ext
|
||||||
|
|
||||||
|
default_days = 365 # how long to certify for
|
||||||
|
default_crl_days= 30 # how long before next CRL
|
||||||
|
default_md = default # use public key default MD
|
||||||
|
preserve = no # keep passed DN ordering
|
||||||
|
|
||||||
|
# A few difference way of specifying how similar the request should look
|
||||||
|
# For type CA, the listed attributes must be the same, and the optional
|
||||||
|
# and supplied fields are just that :-)
|
||||||
|
policy = policy_match
|
||||||
|
|
||||||
|
# For the CA policy
|
||||||
|
[ policy_match ]
|
||||||
|
countryName = match
|
||||||
|
stateOrProvinceName = match
|
||||||
|
organizationName = match
|
||||||
|
organizationalUnitName = optional
|
||||||
|
commonName = supplied
|
||||||
|
emailAddress = optional
|
||||||
|
|
||||||
|
# For the 'anything' policy
|
||||||
|
# At this point in time, you must list all acceptable 'object'
|
||||||
|
# types.
|
||||||
|
[ policy_anything ]
|
||||||
|
countryName = optional
|
||||||
|
stateOrProvinceName = optional
|
||||||
|
localityName = optional
|
||||||
|
organizationName = optional
|
||||||
|
organizationalUnitName = optional
|
||||||
|
commonName = supplied
|
||||||
|
emailAddress = optional
|
||||||
|
|
||||||
|
####################################################################
|
||||||
|
[ req ]
|
||||||
|
default_bits = 2048
|
||||||
|
#default_keyfile = privkey.pem
|
||||||
|
######### TODO: custom START
|
||||||
|
default_keyfile = server.key
|
||||||
|
######### TODO: custom END
|
||||||
|
distinguished_name = req_distinguished_name
|
||||||
|
attributes = req_attributes
|
||||||
|
x509_extensions = v3_ca # The extentions to add to the self signed cert
|
||||||
|
|
||||||
|
# Passwords for private keys if not present they will be prompted for
|
||||||
|
# input_password = secret
|
||||||
|
# output_password = secret
|
||||||
|
|
||||||
|
# This sets a mask for permitted string types. There are several options.
|
||||||
|
# default: PrintableString, T61String, BMPString.
|
||||||
|
# pkix : PrintableString, BMPString (PKIX recommendation before 2004)
|
||||||
|
# utf8only: only UTF8Strings (PKIX recommendation after 2004).
|
||||||
|
# nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings).
|
||||||
|
# MASK:XXXX a literal mask value.
|
||||||
|
# WARNING: ancient versions of Netscape crash on BMPStrings or UTF8Strings.
|
||||||
|
string_mask = utf8only
|
||||||
|
|
||||||
|
# req_extensions = v3_req # The extensions to add to a certificate request
|
||||||
|
|
||||||
|
[ req_distinguished_name ]
|
||||||
|
countryName = Country Name (2 letter code)
|
||||||
|
#countryName_default = AU
|
||||||
|
|
||||||
|
|
||||||
|
######### TODO: custom START
|
||||||
|
countryName_default = KR
|
||||||
|
stateOrProvinceName_default = Seoul
|
||||||
|
localityName_default = Gangseo
|
||||||
|
|
||||||
|
organizationName_default = XIT Co
|
||||||
|
|
||||||
|
organizationalUnitName_default = Tech Support Team
|
||||||
|
|
||||||
|
emailAddress_default = minkyu1128@xit.co.kr
|
||||||
|
|
||||||
|
commonName_default = www.xit-ntri.co.kr
|
||||||
|
######### TODO: custom END
|
||||||
|
countryName_min = 2
|
||||||
|
countryName_max = 2
|
||||||
|
|
||||||
|
#stateOrProvinceName = State or Province Name (full name)
|
||||||
|
#stateOrProvinceName_default = Some-State
|
||||||
|
|
||||||
|
#localityName = Locality Name (eg, city)
|
||||||
|
|
||||||
|
#0.organizationName = Organization Name (eg, company)
|
||||||
|
#0.organizationName_default = Internet Widgits Pty Ltd
|
||||||
|
|
||||||
|
# we can do this but it is not needed normally :-)
|
||||||
|
#1.organizationName = Second Organization Name (eg, company)
|
||||||
|
#1.organizationName_default = World Wide Web Pty Ltd
|
||||||
|
|
||||||
|
organizationalUnitName = Organizational Unit Name (eg, section)
|
||||||
|
#organizationalUnitName_default =
|
||||||
|
|
||||||
|
commonName = Common Name (e.g. server FQDN or YOUR name)
|
||||||
|
commonName_max = 64
|
||||||
|
|
||||||
|
#emailAddress = Email Address
|
||||||
|
emailAddress_max = 64
|
||||||
|
|
||||||
|
# SET-ex3 = SET extension number 3
|
||||||
|
|
||||||
|
[ req_attributes ]
|
||||||
|
challengePassword = A challenge password
|
||||||
|
challengePassword_min = 4
|
||||||
|
challengePassword_max = 20
|
||||||
|
|
||||||
|
unstructuredName = An optional company name
|
||||||
|
|
||||||
|
[ usr_cert ]
|
||||||
|
|
||||||
|
# These extensions are added when 'ca' signs a request.
|
||||||
|
|
||||||
|
# This goes against PKIX guidelines but some CAs do it and some software
|
||||||
|
# requires this to avoid interpreting an end user certificate as a CA.
|
||||||
|
|
||||||
|
basicConstraints=CA:FALSE
|
||||||
|
|
||||||
|
# Here are some examples of the usage of nsCertType. If it is omitted
|
||||||
|
# the certificate can be used for anything *except* object signing.
|
||||||
|
|
||||||
|
# This is OK for an SSL server.
|
||||||
|
# nsCertType = server
|
||||||
|
|
||||||
|
# For an object signing certificate this would be used.
|
||||||
|
# nsCertType = objsign
|
||||||
|
|
||||||
|
# For normal client use this is typical
|
||||||
|
# nsCertType = client, email
|
||||||
|
|
||||||
|
# and for everything including object signing:
|
||||||
|
# nsCertType = client, email, objsign
|
||||||
|
|
||||||
|
# This is typical in keyUsage for a client certificate.
|
||||||
|
# keyUsage = nonRepudiation, digitalSignature, keyEncipherment
|
||||||
|
|
||||||
|
# This will be displayed in Netscape's comment listbox.
|
||||||
|
nsComment = "OpenSSL Generated Certificate"
|
||||||
|
|
||||||
|
# PKIX recommendations harmless if included in all certificates.
|
||||||
|
subjectKeyIdentifier=hash
|
||||||
|
authorityKeyIdentifier=keyid,issuer
|
||||||
|
|
||||||
|
# This stuff is for subjectAltName and issuerAltname.
|
||||||
|
# Import the email address.
|
||||||
|
# subjectAltName=email:copy
|
||||||
|
# An alternative to produce certificates that aren't
|
||||||
|
# deprecated according to PKIX.
|
||||||
|
# subjectAltName=email:move
|
||||||
|
|
||||||
|
# Copy subject details
|
||||||
|
# issuerAltName=issuer:copy
|
||||||
|
|
||||||
|
#nsCaRevocationUrl = http://www.domain.dom/ca-crl.pem
|
||||||
|
#nsBaseUrl
|
||||||
|
#nsRevocationUrl
|
||||||
|
#nsRenewalUrl
|
||||||
|
#nsCaPolicyUrl
|
||||||
|
#nsSslServerName
|
||||||
|
|
||||||
|
# This is required for TSA certificates.
|
||||||
|
# extendedKeyUsage = critical,timeStamping
|
||||||
|
|
||||||
|
[ v3_req ]
|
||||||
|
|
||||||
|
# Extensions to add to a certificate request
|
||||||
|
|
||||||
|
basicConstraints = CA:FALSE
|
||||||
|
keyUsage = nonRepudiation, digitalSignature, keyEncipherment
|
||||||
|
|
||||||
|
[ v3_ca ]
|
||||||
|
|
||||||
|
# Extensions for a typical CA
|
||||||
|
|
||||||
|
|
||||||
|
# PKIX recommendation.
|
||||||
|
|
||||||
|
subjectKeyIdentifier=hash
|
||||||
|
|
||||||
|
authorityKeyIdentifier=keyid:always,issuer
|
||||||
|
|
||||||
|
# This is what PKIX recommends but some broken software chokes on critical
|
||||||
|
# extensions.
|
||||||
|
#basicConstraints = critical,CA:true
|
||||||
|
# So we do this instead.
|
||||||
|
basicConstraints = CA:true
|
||||||
|
|
||||||
|
# Key usage: this is typical for a CA certificate. However since it will
|
||||||
|
# prevent it being used as an test self-signed certificate it is best
|
||||||
|
# left out by default.
|
||||||
|
# keyUsage = cRLSign, keyCertSign
|
||||||
|
|
||||||
|
# Some might want this also
|
||||||
|
# nsCertType = sslCA, emailCA
|
||||||
|
|
||||||
|
# Include email address in subject alt name: another PKIX recommendation
|
||||||
|
# subjectAltName=email:copy
|
||||||
|
# Copy issuer details
|
||||||
|
# issuerAltName=issuer:copy
|
||||||
|
|
||||||
|
# DER hex encoding of an extension: beware experts only!
|
||||||
|
# obj=DER:02:03
|
||||||
|
# Where 'obj' is a standard or added object
|
||||||
|
# You can even override a supported extension:
|
||||||
|
# basicConstraints= critical, DER:30:03:01:01:FF
|
||||||
|
|
||||||
|
[ crl_ext ]
|
||||||
|
|
||||||
|
# CRL extensions.
|
||||||
|
# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.
|
||||||
|
|
||||||
|
# issuerAltName=issuer:copy
|
||||||
|
authorityKeyIdentifier=keyid:always
|
||||||
|
|
||||||
|
[ proxy_cert_ext ]
|
||||||
|
# These extensions should be added when creating a proxy certificate
|
||||||
|
|
||||||
|
# This goes against PKIX guidelines but some CAs do it and some software
|
||||||
|
# requires this to avoid interpreting an end user certificate as a CA.
|
||||||
|
|
||||||
|
basicConstraints=CA:FALSE
|
||||||
|
|
||||||
|
# Here are some examples of the usage of nsCertType. If it is omitted
|
||||||
|
# the certificate can be used for anything *except* object signing.
|
||||||
|
|
||||||
|
# This is OK for an SSL server.
|
||||||
|
# nsCertType = server
|
||||||
|
|
||||||
|
# For an object signing certificate this would be used.
|
||||||
|
# nsCertType = objsign
|
||||||
|
|
||||||
|
# For normal client use this is typical
|
||||||
|
# nsCertType = client, email
|
||||||
|
|
||||||
|
# and for everything including object signing:
|
||||||
|
# nsCertType = client, email, objsign
|
||||||
|
|
||||||
|
# This is typical in keyUsage for a client certificate.
|
||||||
|
# keyUsage = nonRepudiation, digitalSignature, keyEncipherment
|
||||||
|
|
||||||
|
# This will be displayed in Netscape's comment listbox.
|
||||||
|
nsComment = "OpenSSL Generated Certificate"
|
||||||
|
|
||||||
|
# PKIX recommendations harmless if included in all certificates.
|
||||||
|
subjectKeyIdentifier=hash
|
||||||
|
authorityKeyIdentifier=keyid,issuer
|
||||||
|
|
||||||
|
# This stuff is for subjectAltName and issuerAltname.
|
||||||
|
# Import the email address.
|
||||||
|
# subjectAltName=email:copy
|
||||||
|
# An alternative to produce certificates that aren't
|
||||||
|
# deprecated according to PKIX.
|
||||||
|
# subjectAltName=email:move
|
||||||
|
|
||||||
|
# Copy subject details
|
||||||
|
# issuerAltName=issuer:copy
|
||||||
|
|
||||||
|
#nsCaRevocationUrl = http://www.domain.dom/ca-crl.pem
|
||||||
|
#nsBaseUrl
|
||||||
|
#nsRevocationUrl
|
||||||
|
#nsRenewalUrl
|
||||||
|
#nsCaPolicyUrl
|
||||||
|
#nsSslServerName
|
||||||
|
|
||||||
|
# This really needs to be in place for it to be a proxy certificate.
|
||||||
|
proxyCertInfo=critical,language:id-ppl-anyLanguage,pathlen:3,policy:foo
|
||||||
|
|
||||||
|
####################################################################
|
||||||
|
[ tsa ]
|
||||||
|
|
||||||
|
default_tsa = tsa_config1 # the default TSA section
|
||||||
|
|
||||||
|
[ tsa_config1 ]
|
||||||
|
|
||||||
|
# These are used by the TSA reply generation only.
|
||||||
|
dir = ./demoCA # TSA root directory
|
||||||
|
serial = $dir/tsaserial # The current serial number (mandatory)
|
||||||
|
crypto_device = builtin # OpenSSL engine to use for signing
|
||||||
|
signer_cert = $dir/tsacert.pem # The TSA signing certificate
|
||||||
|
# (optional)
|
||||||
|
certs = $dir/cacert.pem # Certificate chain to include in reply
|
||||||
|
# (optional)
|
||||||
|
signer_key = $dir/private/tsakey.pem # The TSA private key (optional)
|
||||||
|
|
||||||
|
default_policy = tsa_policy1 # Policy if request did not specify it
|
||||||
|
# (optional)
|
||||||
|
other_policies = tsa_policy2, tsa_policy3 # acceptable policies (optional)
|
||||||
|
digests = md5, sha1 # Acceptable message digests (mandatory)
|
||||||
|
accuracy = secs:1, millisecs:500, microsecs:100 # (optional)
|
||||||
|
clock_precision_digits = 0 # number of digits after dot. (optional)
|
||||||
|
ordering = yes # Is ordering defined for timestamps?
|
||||||
|
# (optional, default: no)
|
||||||
|
tsa_name = yes # Must the TSA name be included in the reply?
|
||||||
|
# (optional, default: no)
|
||||||
|
ess_cert_id_chain = no # Must the ESS cert id chain be included?
|
||||||
|
# (optional, default: no)
|
@ -0,0 +1,28 @@
|
|||||||
|
@echo off
|
||||||
|
|
||||||
|
rem ========================================
|
||||||
|
rem Default Path
|
||||||
|
rem ========================================
|
||||||
|
set OPEN_SSL_HOME=C:\OpenSSL
|
||||||
|
set OPEN_SSL_BIN_DIR=%OPEN_SSL_HOME%\bin
|
||||||
|
set DP_SSL_HOME=%~dp0..\..
|
||||||
|
set DP_SSL_CERT=%DP_SSL_HOME%\cert
|
||||||
|
set CUR_DATE=%date:-=%
|
||||||
|
set DP_SSL_CERT_BAK=%DP_SSL_CERT%\backup\%CUR_DATE%
|
||||||
|
|
||||||
|
rem ========================================
|
||||||
|
rem File Name
|
||||||
|
rem ========================================
|
||||||
|
set FM_PRIVATE_KEY=server.key
|
||||||
|
set FM_CERTE_INF=server.csr
|
||||||
|
set FM_CERT=server.crt
|
||||||
|
|
||||||
|
rem ========================================
|
||||||
|
rem File Path
|
||||||
|
rem ========================================
|
||||||
|
set FP_PRIVATE_KEY=%DP_SSL_CERT%\%FM_PRIVATE_KEY%
|
||||||
|
set FP_CERT_INF=%DP_SSL_CERT%\%FM_CERTE_INF%
|
||||||
|
set FP_CERT=%DP_SSL_CERT%\%FM_CERT%
|
||||||
|
rem set OPEN_SSL_CNF_PATH=%OPEN_SSL_BIN_DIR%\openssl.cnf
|
||||||
|
set OPEN_SSL_CNF_PATH=%DP_SSL_HOME%\bin\conf\openssl.cnf
|
||||||
|
|
@ -0,0 +1,41 @@
|
|||||||
|
@echo off
|
||||||
|
|
||||||
|
setlocal
|
||||||
|
|
||||||
|
call %~dp0/setenv.bat
|
||||||
|
|
||||||
|
|
||||||
|
echo =================================================
|
||||||
|
echo 인증요청서(CSR) 파일을 생성 합니다
|
||||||
|
echo ♣ 인증요청서(Certificate Signing Request)란??
|
||||||
|
echo SSL 서버를 운영하는 회사의 정보를 암호화하여 인증기관으로 보내
|
||||||
|
echo 인증서를 발급받기 위한 일종의 신청서 입니다.
|
||||||
|
echo -------------------------------------------------
|
||||||
|
echo [ Ref ... ]
|
||||||
|
echo -.서버의 식별항목
|
||||||
|
echo Country Name ( 국가코드) [] : KR
|
||||||
|
echo State or Province Name ( 지역 ) [] : Seoul
|
||||||
|
echo Locality Name ( 시/군/구 ) [] : Gangseo
|
||||||
|
echo Organization Name ( 회사명 ) [] : XIT Co
|
||||||
|
echo Organizational Unit Name ( 부서명 ) [] : Tech Support Team
|
||||||
|
echo Common Name ( 서비스도메인명 ) [] : www.xit.co.kr
|
||||||
|
echo Email Address [] : minkyu1128@xit.co.kr
|
||||||
|
echo -.식별항목에 대한 설명
|
||||||
|
echo Country Name : 이것은 두 자로 된 ISO 형식의 국가 코드입니다.
|
||||||
|
echo State or Province Name : 시 이름을 입력해야 하며 약어를 사용할 수 없습니다.
|
||||||
|
echo Locality Name : 이 필드는 대부분의 경우 생략이 가능하며 업체가 위치한 곳를 나타냅니다.
|
||||||
|
echo Organization : 사업자 등록증에 있는 회사명과 일치되는 영문 회사명을 입력하시면 됩니다.
|
||||||
|
echo Organization Unit : "리눅스 관리팀", "윈도우 관리팀" 등과 같이 업체의 부서를 입력할 수 있습니다.
|
||||||
|
echo Common Name : 인증받을 도메인 주소를 입력하시면 됩니다.
|
||||||
|
echo =================================================
|
||||||
|
echo openssl req -new -key %FP_PRIVATE_KEY% -out %FP_CERT_INF% -config %OPEN_SSL_CNF_PATH%
|
||||||
|
%OPEN_SSL_BIN_DIR%\openssl req -new -key %FP_PRIVATE_KEY% -out %FP_CERT_INF% -config %OPEN_SSL_CNF_PATH%
|
||||||
|
echo.
|
||||||
|
echo =================================================
|
||||||
|
echo 정식인증서(certificate)를 생성 합니다
|
||||||
|
echo -------------------------------------------------
|
||||||
|
echo [ Ref ... ]
|
||||||
|
echo =================================================
|
||||||
|
echo openssl req -new -x509 -days 3650 -in %FP_CERT_INF% -key %FP_PRIVATE_KEY% -out %FP_CERT% -config %OPEN_SSL_CNF_PATH%
|
||||||
|
%OPEN_SSL_BIN_DIR%\openssl req -new -x509 -days 3650 -in %FP_CERT_INF% -key %FP_PRIVATE_KEY% -out %FP_CERT% -config %OPEN_SSL_CNF_PATH%
|
||||||
|
|
@ -0,0 +1,37 @@
|
|||||||
|
@echo off
|
||||||
|
|
||||||
|
setlocal
|
||||||
|
|
||||||
|
call %~dp0/setenv.bat
|
||||||
|
|
||||||
|
|
||||||
|
echo =================================================
|
||||||
|
echo SSL 파일을 백업 합니다
|
||||||
|
echo =================================================
|
||||||
|
if not exist "%DP_SSL_CERT_BAK%" (
|
||||||
|
mkdir "%DP_SSL_CERT_BAK%"
|
||||||
|
)
|
||||||
|
rem
|
||||||
|
rem echo 개인키(%FM_PRIVATE_KEY%) 파일을 백업 합니다.
|
||||||
|
rem echo copy %FP_PRIVATE_KEY% %DP_SSL_CERT_BAK%
|
||||||
|
rem copy %FP_PRIVATE_KEY% %DP_SSL_CERT_BAK%
|
||||||
|
rem
|
||||||
|
rem echo 인증서 세부정보(%FM_CERTE_INF%) 파일을 백업 합니다.
|
||||||
|
rem echo copy %FP_CERT_INF% %DP_SSL_CERT_BAK%
|
||||||
|
rem copy %FP_CERT_INF% %DP_SSL_CERT_BAK%
|
||||||
|
rem
|
||||||
|
rem echo 인증서(%FM_CERT%) 파일을 백업 합니다.
|
||||||
|
rem echo copy %FP_CERT% %DP_SSL_CERT_BAK%
|
||||||
|
rem copy %FP_CERT% %DP_SSL_CERT_BAK%
|
||||||
|
rem
|
||||||
|
rem echo.
|
||||||
|
rem echo %DP_SSL_CERT_BAK% 디렉토리에 백업을 완료 했습니다.
|
||||||
|
|
||||||
|
echo 개인키(%FM_PRIVATE_KEY%)/인증서세부(%FM_CERTE_INF%)/인증서(%FM_CERT%) 파일을 백업 합니다.
|
||||||
|
echo copy %DP_SSL_CERT%\*.* %DP_SSL_CERT_BAK%\*.*
|
||||||
|
copy %DP_SSL_CERT%\*.* %DP_SSL_CERT_BAK%\*.*
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
echo.
|
||||||
|
echo 백업을 종료 합니다.
|
@ -0,0 +1,15 @@
|
|||||||
|
@echo off
|
||||||
|
|
||||||
|
setlocal
|
||||||
|
|
||||||
|
call %~dp0/setenv.bat
|
||||||
|
|
||||||
|
|
||||||
|
echo =================================================
|
||||||
|
echo 서버키(private key)를 생성 합니다
|
||||||
|
echo -------------------------------------------------
|
||||||
|
echo [ Ref ... ]
|
||||||
|
echo =================================================
|
||||||
|
echo openssl genrsa -out %FP_PRIVATE_KEY% 2048
|
||||||
|
%OPEN_SSL_BIN_DIR%\openssl genrsa -out %FP_PRIVATE_KEY% 2048
|
||||||
|
|
@ -0,0 +1,17 @@
|
|||||||
|
@echo off
|
||||||
|
|
||||||
|
setlocal
|
||||||
|
|
||||||
|
echo ####################################################
|
||||||
|
echo "SSL 인증서 신규발행"을 시작합니다.
|
||||||
|
echo ####################################################
|
||||||
|
call ./conf/ssl-key.bat
|
||||||
|
call ./conf/ssl-cert.bat
|
||||||
|
echo.
|
||||||
|
echo SSL 인증서 발행을 완료 하였습니다.
|
||||||
|
echo
|
||||||
|
call ./conf/ssl-file-backup.bat
|
||||||
|
|
||||||
|
echo.
|
||||||
|
echo SSL 인증서 발행을 종료 합니다.
|
||||||
|
pause
|
@ -0,0 +1,15 @@
|
|||||||
|
@echo off
|
||||||
|
|
||||||
|
setlocal
|
||||||
|
|
||||||
|
echo ####################################################
|
||||||
|
echo "SSL 인증서 갱신"을 시작 합니다.
|
||||||
|
echo ####################################################
|
||||||
|
call ./conf/ssl-cert.bat
|
||||||
|
call ./conf/ssl-file-backup.bat
|
||||||
|
echo.
|
||||||
|
echo SSL 인증서 갱신을 완료 하였습니다.
|
||||||
|
|
||||||
|
echo.
|
||||||
|
echo SSL 인증서 갱신을 종료 합니다.
|
||||||
|
pause
|
@ -0,0 +1,21 @@
|
|||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIIDXzCCAkegAwIBAgIJANcjiThQCx5CMA0GCSqGSIb3DQEBCwUAMEYxCzAJBgNV
|
||||||
|
BAYTAktSMRowGAYDVQQLDBFUZWNoIFN1cHBvcnQgVGVhbTEbMBkGA1UEAwwSd3d3
|
||||||
|
LnhpdC1udHJpLmNvLmtyMB4XDTIzMDEwMjA4MTg1NVoXDTMyMTIzMDA4MTg1NVow
|
||||||
|
RjELMAkGA1UEBhMCS1IxGjAYBgNVBAsMEVRlY2ggU3VwcG9ydCBUZWFtMRswGQYD
|
||||||
|
VQQDDBJ3d3cueGl0LW50cmkuY28ua3IwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAw
|
||||||
|
ggEKAoIBAQDECYiQuZiw6xjorcweXsCoOT+cUQStFqET/OYSrK/i/YgR1GFDSqKo
|
||||||
|
g04eeYN7+bcRFaonvZgPAmNcyxQ1YqgeRD8n2QNmoBYYW/Q8R9/VnERhs/ymyaDs
|
||||||
|
R8nEH7OhRh2rzeUQdj33fR4eFg4sRoklRxM/1pVYmG7JK72fjY3RJnSYfF9u3isS
|
||||||
|
etSc66GITvNtVEEwY2FE1RA7VM71VtxxbKSKRW+L2dnRdOExWGIV80+G1t5d9nci
|
||||||
|
SKq+tYjtDfMi8QZvLIUYegazqvf6A2mHGrtTC+x/LdGWZqSzyq0mluIdcVxj8Ku9
|
||||||
|
RijwMBubpXI9TfLJYuRLCsoY9OX9I55jAgMBAAGjUDBOMB0GA1UdDgQWBBQkoyL3
|
||||||
|
NQR2KDGRG72x2GOuoJy2MTAfBgNVHSMEGDAWgBQkoyL3NQR2KDGRG72x2GOuoJy2
|
||||||
|
MTAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEBCwUAA4IBAQB8rlwuWIHFZXcKTI/N
|
||||||
|
As8uf3x4/LByAk2Fi6ytHkgUq3qCM8cpBQFERi23Yeuof4f1gU4Xe9o3BFDdNNhg
|
||||||
|
lcAZAsm7JGe+b/4Ato2EXU2ZrXDgyqUGHlOB4z0zZUXbQcJfqDLVuBaJTyUIEOD6
|
||||||
|
BmaMY/Buj+GmCOdgTEHRM73OC7AGi3fiGMViImsbFzsF+ALt5aySw0pF5UNirGkY
|
||||||
|
xoqQYemO7rWAqqcfmYkrOu0oeWua/dJdahjdqdPYA+iWbuVRvINvoiycmKwTiMhL
|
||||||
|
SrZyCdUkq9kKSxdPyPff/wHT6ilB8o4mYgkw8iptLAnvII9hTyqgnkWdej7+JVQo
|
||||||
|
3Zfm
|
||||||
|
-----END CERTIFICATE-----
|
@ -0,0 +1,16 @@
|
|||||||
|
-----BEGIN CERTIFICATE REQUEST-----
|
||||||
|
MIICizCCAXMCAQAwRjELMAkGA1UEBhMCS1IxGjAYBgNVBAsMEVRlY2ggU3VwcG9y
|
||||||
|
dCBUZWFtMRswGQYDVQQDDBJ3d3cueGl0LW50cmkuY28ua3IwggEiMA0GCSqGSIb3
|
||||||
|
DQEBAQUAA4IBDwAwggEKAoIBAQDECYiQuZiw6xjorcweXsCoOT+cUQStFqET/OYS
|
||||||
|
rK/i/YgR1GFDSqKog04eeYN7+bcRFaonvZgPAmNcyxQ1YqgeRD8n2QNmoBYYW/Q8
|
||||||
|
R9/VnERhs/ymyaDsR8nEH7OhRh2rzeUQdj33fR4eFg4sRoklRxM/1pVYmG7JK72f
|
||||||
|
jY3RJnSYfF9u3isSetSc66GITvNtVEEwY2FE1RA7VM71VtxxbKSKRW+L2dnRdOEx
|
||||||
|
WGIV80+G1t5d9nciSKq+tYjtDfMi8QZvLIUYegazqvf6A2mHGrtTC+x/LdGWZqSz
|
||||||
|
yq0mluIdcVxj8Ku9RijwMBubpXI9TfLJYuRLCsoY9OX9I55jAgMBAAGgADANBgkq
|
||||||
|
hkiG9w0BAQsFAAOCAQEAku5gIwuYAmaPBzI3razzF2zyiTdRqZWU8VBYdGwrR49x
|
||||||
|
UASekecpYV3e3bzkZmJQLF5Qs6OXJofcjlxMhU9f/avMpOpDt7VWDVTFBHOzjx7X
|
||||||
|
jQXbIy+BkazjzyWZQhMMCfbbHkvRK6JEu3gpgl/htXksl1s2X8Gu4ZZ0X34HHWJ1
|
||||||
|
Uuk6LU/BidofFpOnL3xx3oI++u5OVJ84jj6gfQ6V4cIwjYU9uwCaEZiQxXS4+AWd
|
||||||
|
Y/vfYz/5SauUqSQntgB2Mld1rH8XWYSZOsdGHiIzUsNvpmrG5fnpPPgakKGLs0pT
|
||||||
|
2wqUIMDIuFBO/b35Br9ao+ooDuIu4B9YCcA8RgbrGQ==
|
||||||
|
-----END CERTIFICATE REQUEST-----
|
@ -0,0 +1,27 @@
|
|||||||
|
-----BEGIN RSA PRIVATE KEY-----
|
||||||
|
MIIEogIBAAKCAQEAxAmIkLmYsOsY6K3MHl7AqDk/nFEErRahE/zmEqyv4v2IEdRh
|
||||||
|
Q0qiqINOHnmDe/m3ERWqJ72YDwJjXMsUNWKoHkQ/J9kDZqAWGFv0PEff1ZxEYbP8
|
||||||
|
psmg7EfJxB+zoUYdq83lEHY9930eHhYOLEaJJUcTP9aVWJhuySu9n42N0SZ0mHxf
|
||||||
|
bt4rEnrUnOuhiE7zbVRBMGNhRNUQO1TO9VbccWykikVvi9nZ0XThMVhiFfNPhtbe
|
||||||
|
XfZ3IkiqvrWI7Q3zIvEGbyyFGHoGs6r3+gNphxq7Uwvsfy3Rlmaks8qtJpbiHXFc
|
||||||
|
Y/CrvUYo8DAbm6VyPU3yyWLkSwrKGPTl/SOeYwIDAQABAoIBAA2hkBJoJVrf7gp3
|
||||||
|
00KlWgYYfPjUlVunwCmQozrXMR+6e1SqDN1N+kN3Zd4umtrrATS56ev7ffBFPT19
|
||||||
|
jXks0/3OxwlxSJBBP2gQNMpgQQssY4DbsAy05nCniTsO7UGgi32fwnbDkgl8dLSo
|
||||||
|
2fFwMicaaxc8R4QyjTmFxhirEhphz/8Ie8JPJR55bMPHgLM8RgehkQiEg/L7NV9b
|
||||||
|
Es1tVhK3flKADPvyU+8GQqX8cl8XQjoG+sZ0sDmz4NnHmdqOb2k4+l/NNp53Q0wm
|
||||||
|
L+u8GjEV3FZnwNqg2CF3HVS1nqLiwgqPEVPv55bn0W+XGGMkKbwQuurNCusH5U2m
|
||||||
|
kmH7MsECgYEA49eFbLmZmIRqnuxHuiLVV6qQsKSuHADQ6crm93qJjtFIYcuXPI4q
|
||||||
|
Z49DN1UWAd66oCKGvdLs8Wp7t9WLiab2QnVThHSciB/U7NnpakPF52sTI0HTueAg
|
||||||
|
BV6fis4CkdHAIvL5cgmuSqn07uWKjwCffQBZZd4T876a6AVaB5xFWuECgYEA3EPG
|
||||||
|
T2mL1mHgnTabrNFzBVLE4CTt0J0axQ1dCSsifwCfV8/LKNKxMc2r3hdonM0CyxI5
|
||||||
|
8rvxDAQVYvKTky4ITKVHd3xpUIZjDLz3T7JOeliyvhWYo72v/sKT/cM8QxOYSBu+
|
||||||
|
bKCi6x0gG8uV/UixTkQtENmO/2ARQwIHSfupBcMCgYAq8994bsjxAs2i5kJjadu0
|
||||||
|
ajhaxMD6EIFSAelm8Ffsb7HoldwOE3MVEOIIFWdPtPCT7c5fDNuUa5GlR4HF0o8M
|
||||||
|
WlgDWYSE+RNID5C8cshlZz81X1yN5x3CRWNoZIwBd3x0WkACaqbL9pxxSR7E9MYc
|
||||||
|
Z6ty09oJEn7bjN67Ho/IoQKBgBgVmROJ2O6CGUtXc0I8TLViTYCsyQwsgYbWZTvh
|
||||||
|
aY41hTbW08IM968YbBiGuruadxm5TnjKMBs+PxBosdZADExFLkFUazeQ2jfEWc5v
|
||||||
|
EsGx/Slntx8AWMQkhoYS2P4EoHwR/IpoLihDMQWZBzeAwVJrhfn3r/kgigKnsCBY
|
||||||
|
0ix9AoGAI/qKjvvNxS2B+s/0v61MwEglBMaya+2wMmx2v470b0QpDpDKcQOC50Ds
|
||||||
|
1LeScQp9Z7kT6feQGyLVERGCFAORMy34gqzeiUBVY3Rt8EGFC7JbTmaq7lX1pMR/
|
||||||
|
8oKeUt41I5YZtCabUoK3nHYc3bG5bDflQkGZfFO/NjOhVaY+QaI=
|
||||||
|
-----END RSA PRIVATE KEY-----
|
@ -0,0 +1,21 @@
|
|||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIIDXzCCAkegAwIBAgIJANcjiThQCx5CMA0GCSqGSIb3DQEBCwUAMEYxCzAJBgNV
|
||||||
|
BAYTAktSMRowGAYDVQQLDBFUZWNoIFN1cHBvcnQgVGVhbTEbMBkGA1UEAwwSd3d3
|
||||||
|
LnhpdC1udHJpLmNvLmtyMB4XDTIzMDEwMjA4MTg1NVoXDTMyMTIzMDA4MTg1NVow
|
||||||
|
RjELMAkGA1UEBhMCS1IxGjAYBgNVBAsMEVRlY2ggU3VwcG9ydCBUZWFtMRswGQYD
|
||||||
|
VQQDDBJ3d3cueGl0LW50cmkuY28ua3IwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAw
|
||||||
|
ggEKAoIBAQDECYiQuZiw6xjorcweXsCoOT+cUQStFqET/OYSrK/i/YgR1GFDSqKo
|
||||||
|
g04eeYN7+bcRFaonvZgPAmNcyxQ1YqgeRD8n2QNmoBYYW/Q8R9/VnERhs/ymyaDs
|
||||||
|
R8nEH7OhRh2rzeUQdj33fR4eFg4sRoklRxM/1pVYmG7JK72fjY3RJnSYfF9u3isS
|
||||||
|
etSc66GITvNtVEEwY2FE1RA7VM71VtxxbKSKRW+L2dnRdOExWGIV80+G1t5d9nci
|
||||||
|
SKq+tYjtDfMi8QZvLIUYegazqvf6A2mHGrtTC+x/LdGWZqSzyq0mluIdcVxj8Ku9
|
||||||
|
RijwMBubpXI9TfLJYuRLCsoY9OX9I55jAgMBAAGjUDBOMB0GA1UdDgQWBBQkoyL3
|
||||||
|
NQR2KDGRG72x2GOuoJy2MTAfBgNVHSMEGDAWgBQkoyL3NQR2KDGRG72x2GOuoJy2
|
||||||
|
MTAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEBCwUAA4IBAQB8rlwuWIHFZXcKTI/N
|
||||||
|
As8uf3x4/LByAk2Fi6ytHkgUq3qCM8cpBQFERi23Yeuof4f1gU4Xe9o3BFDdNNhg
|
||||||
|
lcAZAsm7JGe+b/4Ato2EXU2ZrXDgyqUGHlOB4z0zZUXbQcJfqDLVuBaJTyUIEOD6
|
||||||
|
BmaMY/Buj+GmCOdgTEHRM73OC7AGi3fiGMViImsbFzsF+ALt5aySw0pF5UNirGkY
|
||||||
|
xoqQYemO7rWAqqcfmYkrOu0oeWua/dJdahjdqdPYA+iWbuVRvINvoiycmKwTiMhL
|
||||||
|
SrZyCdUkq9kKSxdPyPff/wHT6ilB8o4mYgkw8iptLAnvII9hTyqgnkWdej7+JVQo
|
||||||
|
3Zfm
|
||||||
|
-----END CERTIFICATE-----
|
@ -0,0 +1,16 @@
|
|||||||
|
-----BEGIN CERTIFICATE REQUEST-----
|
||||||
|
MIICizCCAXMCAQAwRjELMAkGA1UEBhMCS1IxGjAYBgNVBAsMEVRlY2ggU3VwcG9y
|
||||||
|
dCBUZWFtMRswGQYDVQQDDBJ3d3cueGl0LW50cmkuY28ua3IwggEiMA0GCSqGSIb3
|
||||||
|
DQEBAQUAA4IBDwAwggEKAoIBAQDECYiQuZiw6xjorcweXsCoOT+cUQStFqET/OYS
|
||||||
|
rK/i/YgR1GFDSqKog04eeYN7+bcRFaonvZgPAmNcyxQ1YqgeRD8n2QNmoBYYW/Q8
|
||||||
|
R9/VnERhs/ymyaDsR8nEH7OhRh2rzeUQdj33fR4eFg4sRoklRxM/1pVYmG7JK72f
|
||||||
|
jY3RJnSYfF9u3isSetSc66GITvNtVEEwY2FE1RA7VM71VtxxbKSKRW+L2dnRdOEx
|
||||||
|
WGIV80+G1t5d9nciSKq+tYjtDfMi8QZvLIUYegazqvf6A2mHGrtTC+x/LdGWZqSz
|
||||||
|
yq0mluIdcVxj8Ku9RijwMBubpXI9TfLJYuRLCsoY9OX9I55jAgMBAAGgADANBgkq
|
||||||
|
hkiG9w0BAQsFAAOCAQEAku5gIwuYAmaPBzI3razzF2zyiTdRqZWU8VBYdGwrR49x
|
||||||
|
UASekecpYV3e3bzkZmJQLF5Qs6OXJofcjlxMhU9f/avMpOpDt7VWDVTFBHOzjx7X
|
||||||
|
jQXbIy+BkazjzyWZQhMMCfbbHkvRK6JEu3gpgl/htXksl1s2X8Gu4ZZ0X34HHWJ1
|
||||||
|
Uuk6LU/BidofFpOnL3xx3oI++u5OVJ84jj6gfQ6V4cIwjYU9uwCaEZiQxXS4+AWd
|
||||||
|
Y/vfYz/5SauUqSQntgB2Mld1rH8XWYSZOsdGHiIzUsNvpmrG5fnpPPgakKGLs0pT
|
||||||
|
2wqUIMDIuFBO/b35Br9ao+ooDuIu4B9YCcA8RgbrGQ==
|
||||||
|
-----END CERTIFICATE REQUEST-----
|
@ -0,0 +1,27 @@
|
|||||||
|
-----BEGIN RSA PRIVATE KEY-----
|
||||||
|
MIIEogIBAAKCAQEAxAmIkLmYsOsY6K3MHl7AqDk/nFEErRahE/zmEqyv4v2IEdRh
|
||||||
|
Q0qiqINOHnmDe/m3ERWqJ72YDwJjXMsUNWKoHkQ/J9kDZqAWGFv0PEff1ZxEYbP8
|
||||||
|
psmg7EfJxB+zoUYdq83lEHY9930eHhYOLEaJJUcTP9aVWJhuySu9n42N0SZ0mHxf
|
||||||
|
bt4rEnrUnOuhiE7zbVRBMGNhRNUQO1TO9VbccWykikVvi9nZ0XThMVhiFfNPhtbe
|
||||||
|
XfZ3IkiqvrWI7Q3zIvEGbyyFGHoGs6r3+gNphxq7Uwvsfy3Rlmaks8qtJpbiHXFc
|
||||||
|
Y/CrvUYo8DAbm6VyPU3yyWLkSwrKGPTl/SOeYwIDAQABAoIBAA2hkBJoJVrf7gp3
|
||||||
|
00KlWgYYfPjUlVunwCmQozrXMR+6e1SqDN1N+kN3Zd4umtrrATS56ev7ffBFPT19
|
||||||
|
jXks0/3OxwlxSJBBP2gQNMpgQQssY4DbsAy05nCniTsO7UGgi32fwnbDkgl8dLSo
|
||||||
|
2fFwMicaaxc8R4QyjTmFxhirEhphz/8Ie8JPJR55bMPHgLM8RgehkQiEg/L7NV9b
|
||||||
|
Es1tVhK3flKADPvyU+8GQqX8cl8XQjoG+sZ0sDmz4NnHmdqOb2k4+l/NNp53Q0wm
|
||||||
|
L+u8GjEV3FZnwNqg2CF3HVS1nqLiwgqPEVPv55bn0W+XGGMkKbwQuurNCusH5U2m
|
||||||
|
kmH7MsECgYEA49eFbLmZmIRqnuxHuiLVV6qQsKSuHADQ6crm93qJjtFIYcuXPI4q
|
||||||
|
Z49DN1UWAd66oCKGvdLs8Wp7t9WLiab2QnVThHSciB/U7NnpakPF52sTI0HTueAg
|
||||||
|
BV6fis4CkdHAIvL5cgmuSqn07uWKjwCffQBZZd4T876a6AVaB5xFWuECgYEA3EPG
|
||||||
|
T2mL1mHgnTabrNFzBVLE4CTt0J0axQ1dCSsifwCfV8/LKNKxMc2r3hdonM0CyxI5
|
||||||
|
8rvxDAQVYvKTky4ITKVHd3xpUIZjDLz3T7JOeliyvhWYo72v/sKT/cM8QxOYSBu+
|
||||||
|
bKCi6x0gG8uV/UixTkQtENmO/2ARQwIHSfupBcMCgYAq8994bsjxAs2i5kJjadu0
|
||||||
|
ajhaxMD6EIFSAelm8Ffsb7HoldwOE3MVEOIIFWdPtPCT7c5fDNuUa5GlR4HF0o8M
|
||||||
|
WlgDWYSE+RNID5C8cshlZz81X1yN5x3CRWNoZIwBd3x0WkACaqbL9pxxSR7E9MYc
|
||||||
|
Z6ty09oJEn7bjN67Ho/IoQKBgBgVmROJ2O6CGUtXc0I8TLViTYCsyQwsgYbWZTvh
|
||||||
|
aY41hTbW08IM968YbBiGuruadxm5TnjKMBs+PxBosdZADExFLkFUazeQ2jfEWc5v
|
||||||
|
EsGx/Slntx8AWMQkhoYS2P4EoHwR/IpoLihDMQWZBzeAwVJrhfn3r/kgigKnsCBY
|
||||||
|
0ix9AoGAI/qKjvvNxS2B+s/0v61MwEglBMaya+2wMmx2v470b0QpDpDKcQOC50Ds
|
||||||
|
1LeScQp9Z7kT6feQGyLVERGCFAORMy34gqzeiUBVY3Rt8EGFC7JbTmaq7lX1pMR/
|
||||||
|
8oKeUt41I5YZtCabUoK3nHYc3bG5bDflQkGZfFO/NjOhVaY+QaI=
|
||||||
|
-----END RSA PRIVATE KEY-----
|
Loading…
Reference in New Issue