X-Git-Url: https://git.arvados.org/arvados.git/blobdiff_plain/42fff42165a0fa1602758a078746f8697f265f83..f3b0dd8d793994d2661cc416cb4136e85883874e:/tools/salt-install/config_examples/single_host/multiple_hostnames/states/snakeoil_certs.sls?ds=sidebyside diff --git a/tools/salt-install/config_examples/single_host/multiple_hostnames/states/snakeoil_certs.sls b/tools/salt-install/config_examples/single_host/multiple_hostnames/states/snakeoil_certs.sls index 466d41d423..8f2fda45bf 100644 --- a/tools/salt-install/config_examples/single_host/multiple_hostnames/states/snakeoil_certs.sls +++ b/tools/salt-install/config_examples/single_host/multiple_hostnames/states/snakeoil_certs.sls @@ -1,35 +1,65 @@ # Copyright (C) The Arvados Authors. All rights reserved. # -# SPDX-License-Identifier: AGPL-3.0 +# SPDX-License-Identifier: Apache-2.0 + +# WARNING: This file is only used for testing purposes, and should not be used +# in a production environment {%- set curr_tpldir = tpldir %} {%- set tpldir = 'arvados' %} {%- from "arvados/map.jinja" import arvados with context %} {%- set tpldir = curr_tpldir %} -{%- set arvados_ca_cert_file = '/etc/ssl/certs/arvados-snakeoil-ca.pem' %} +{%- set orig_cert_dir = salt['pillar.get']('extra_custom_certs_dir', '/srv/salt/certs') %} + +include: + - nginx.passenger + - nginx.config + - nginx.service + +# Debian uses different dirs for certs and keys, but being a Snake Oil example, +# we'll keep it simple here. +{%- set arvados_ca_cert_file = '/etc/ssl/private/arvados-snakeoil-ca.pem' %} {%- set arvados_ca_key_file = '/etc/ssl/private/arvados-snakeoil-ca.key' %} -{%- set arvados_cert_file = '/etc/ssl/certs/arvados-snakeoil-cert.pem' %} -{%- set arvados_csr_file = '/etc/ssl/private/arvados-snakeoil-cert.csr' %} -{%- set arvados_key_file = '/etc/ssl/private/arvados-snakeoil-cert.key' %} {%- if grains.get('os_family') == 'Debian' %} {%- set arvados_ca_cert_dest = '/usr/local/share/ca-certificates/arvados-snakeoil-ca.crt' %} {%- set update_ca_cert = '/usr/sbin/update-ca-certificates' %} {%- set openssl_conf = '/etc/ssl/openssl.cnf' %} + +extra_snakeoil_certs_ssl_cert_pkg_installed: + pkg.installed: + - name: ssl-cert + - require_in: + - sls: postgres + {%- else %} {%- set arvados_ca_cert_dest = '/etc/pki/ca-trust/source/anchors/arvados-snakeoil-ca.pem' %} {%- set update_ca_cert = '/usr/bin/update-ca-trust' %} {%- set openssl_conf = '/etc/pki/tls/openssl.cnf' %} + {%- endif %} -arvados_test_salt_states_examples_single_host_snakeoil_certs_dependencies_pkg_installed: +extra_snakeoil_certs_dependencies_pkg_installed: pkg.installed: - pkgs: - openssl - ca-certificates -arvados_test_salt_states_examples_single_host_snakeoil_certs_arvados_snake_oil_ca_cmd_run: +# Remove the RANDFILE parameter in openssl.cnf as it makes openssl fail in Ubuntu 18.04 +# Saving and restoring the rng state is not necessary anymore in the openssl 1.1.1 +# random generator, cf +# https://github.com/openssl/openssl/issues/7754 +# +extra_snakeoil_certs_file_comment_etc_openssl_conf: + file.comment: + - name: /etc/ssl/openssl.cnf + - regex: ^RANDFILE.* + - onlyif: grep -q ^RANDFILE /etc/ssl/openssl.cnf + - require_in: + - cmd: extra_snakeoil_certs_arvados_snakeoil_ca_cmd_run + +extra_snakeoil_certs_arvados_snakeoil_ca_cmd_run: # Taken from https://github.com/arvados/arvados/blob/master/tools/arvbox/lib/arvbox/docker/service/certificate/run cmd.run: - name: | @@ -54,61 +84,82 @@ arvados_test_salt_states_examples_single_host_snakeoil_certs_arvados_snake_oil_c - test -f {{ arvados_ca_cert_file }} - openssl verify -CAfile {{ arvados_ca_cert_file }} {{ arvados_ca_cert_file }} - require: - - pkg: arvados_test_salt_states_examples_single_host_snakeoil_certs_dependencies_pkg_installed + - pkg: extra_snakeoil_certs_dependencies_pkg_installed -arvados_test_salt_states_examples_single_host_snakeoil_certs_arvados_snake_oil_cert_cmd_run: +# Create independent certs for each vhost +{%- for vh in [ + 'collections', + 'controller', + 'download', + 'keepproxy', + 'webshell', + 'workbench', + 'workbench2', + 'websocket', + ] +%} +# We're creating these in a tmp directory, so they're copied to their destination +# with the `custom_certs` state file, as if using custom certificates. +{%- set arvados_cert_file = orig_cert_dir ~ '/arvados-' ~ vh ~ '.pem' %} +{%- set arvados_csr_file = orig_cert_dir ~ '/arvados-' ~ vh ~ '.csr' %} +{%- set arvados_key_file = orig_cert_dir ~ '/arvados-' ~ vh ~ '.key' %} + +extra_snakeoil_certs_arvados_snakeoil_cert_{{ vh }}_cmd_run: cmd.run: - name: | - cat > /tmp/openssl.cnf <<-CNF + cat > /tmp/{{ vh }}.openssl.cnf <<-CNF [req] default_bits = 2048 prompt = no default_md = sha256 - req_extensions = rext distinguished_name = dn + req_extensions = rext + [rext] + subjectAltName = @alt_names [dn] C = CC ST = Some State L = Some Location - O = Arvados Formula - OU = arvados-formula - CN = {{ arvados.cluster.name }}.{{ arvados.cluster.domain }} + O = Arvados Provision Example Single Host / Multiple Hostnames + OU = arvados-provision-example-single_host_multiple_hostnames + CN = {{ vh }}.{{ arvados.cluster.name }}.{{ arvados.cluster.domain }} emailAddress = admin@{{ arvados.cluster.name }}.{{ arvados.cluster.domain }} - [rext] - subjectAltName = @alt_names [alt_names] {%- for entry in grains.get('ipv4') %} IP.{{ loop.index }} = {{ entry }} {%- endfor %} - {%- for entry in [ - 'keep', - 'collections', - 'download', - 'ws', - 'workbench', - 'workbench2', + DNS.1 = {{ vh }}.{{ arvados.cluster.name }}.{{ arvados.cluster.domain }} + {%- if vh in [ + 'controller', + 'keepproxy', + 'websocket' ] %} - DNS.{{ loop.index }} = {{ entry }}.{{ arvados.cluster.name }}.{{ arvados.cluster.domain }} - {%- endfor %} - DNS.7 = {{ arvados.cluster.name }}.{{ arvados.cluster.domain }} + {%- if vh == 'controller' %} + DNS.2 = {{ arvados.cluster.name }}.{{ arvados.cluster.domain }} + {%- elif vh == 'keepproxy' %} + DNS.2 = keep.{{ arvados.cluster.name }}.{{ arvados.cluster.domain }} + {%- elif vh == 'websocket' %} + DNS.2 = ws.{{ arvados.cluster.name }}.{{ arvados.cluster.domain }} + {%- endif %} + {%- endif %} CNF # The req openssl req \ - -config /tmp/openssl.cnf \ + -config /tmp/{{ vh }}.openssl.cnf \ -new \ -nodes \ -sha256 \ -out {{ arvados_csr_file }} \ - -keyout {{ arvados_key_file }} > /tmp/snake_oil_certs.output 2>&1 && \ + -keyout {{ arvados_key_file }} > /tmp/snakeoil_certs.{{ vh }}.output 2>&1 && \ # The cert openssl x509 \ -req \ -days 365 \ -in {{ arvados_csr_file }} \ -out {{ arvados_cert_file }} \ - -extfile /tmp/openssl.cnf \ + -extfile /tmp/{{ vh }}.openssl.cnf \ -extensions rext \ -CA {{ arvados_ca_cert_file }} \ -CAkey {{ arvados_ca_key_file }} \ @@ -119,40 +170,20 @@ arvados_test_salt_states_examples_single_host_snakeoil_certs_arvados_snake_oil_c - test -f {{ arvados_key_file }} - openssl verify -CAfile {{ arvados_ca_cert_file }} {{ arvados_cert_file }} - require: - - pkg: arvados_test_salt_states_examples_single_host_snakeoil_certs_dependencies_pkg_installed - - cmd: arvados_test_salt_states_examples_single_host_snakeoil_certs_arvados_snake_oil_ca_cmd_run - -{%- if grains.get('os_family') == 'Debian' %} -arvados_test_salt_states_examples_single_host_snakeoil_certs_ssl_cert_pkg_installed: - pkg.installed: - - name: ssl-cert + - pkg: extra_snakeoil_certs_dependencies_pkg_installed + - cmd: extra_snakeoil_certs_arvados_snakeoil_ca_cmd_run - require_in: - - sls: postgres + - file: extra_custom_certs_file_copy_arvados-{{ vh }}.pem + - file: extra_custom_certs_file_copy_arvados-{{ vh }}.key -arvados_test_salt_states_examples_single_host_snakeoil_certs_certs_permissions_cmd_run: - cmd.run: - - name: | - chown root:ssl-cert {{ arvados_key_file }} - - require: - - cmd: arvados_test_salt_states_examples_single_host_snakeoil_certs_arvados_snake_oil_cert_cmd_run - - pkg: arvados_test_salt_states_examples_single_host_snakeoil_certs_ssl_cert_pkg_installed -{%- endif %} - -arvados_test_salt_states_examples_single_host_snakeoil_certs_nginx_snakeoil_file_managed: + {%- if grains.get('os_family') == 'Debian' %} +extra_snakeoil_certs_certs_permissions_{{ vh}}_cmd_run: file.managed: - - name: /etc/nginx/snippets/arvados-snakeoil.conf - - contents: | - ssl_certificate {{ arvados_cert_file }}; - ssl_certificate_key {{ arvados_key_file }}; - - watch_in: - - service: nginx_service + - name: {{ arvados_key_file }} + - owner: root + - group: ssl-cert - require: - - pkg: passenger_install - - cmd: arvados_test_salt_states_examples_single_host_snakeoil_certs_certs_permissions_cmd_run - - require_in: - - file: nginx_config - - service: nginx_service - - watch_in: - - service: nginx_service - - + - cmd: extra_snakeoil_certs_arvados_snakeoil_cert_{{ vh }}_cmd_run + - pkg: extra_snakeoil_certs_ssl_cert_pkg_installed + {%- endif %} +{%- endfor %}