X-Git-Url: https://git.arvados.org/arvados.git/blobdiff_plain/c340eecc7a03dd066792e5f046f087b8b3dfced6..2c622f46cb0324f392a1f8006ac30521a856646b:/tools/salt-install/config_examples/single_host/multiple_hostnames/states/snakeoil_certs.sls diff --git a/tools/salt-install/config_examples/single_host/multiple_hostnames/states/snakeoil_certs.sls b/tools/salt-install/config_examples/single_host/multiple_hostnames/states/snakeoil_certs.sls index 91617e4fa4..a8b487e29a 100644 --- a/tools/salt-install/config_examples/single_host/multiple_hostnames/states/snakeoil_certs.sls +++ b/tools/salt-install/config_examples/single_host/multiple_hostnames/states/snakeoil_certs.sls @@ -2,11 +2,16 @@ # # SPDX-License-Identifier: Apache-2.0 +# WARNING: This file is only used for testing purposes, and should not be used +# in a production environment + {%- set curr_tpldir = tpldir %} {%- set tpldir = 'arvados' %} {%- from "arvados/map.jinja" import arvados with context %} {%- set tpldir = curr_tpldir %} +{%- set orig_cert_dir = salt['pillar.get']('extra_custom_certs_dir', '/srv/salt/certs') %} + include: - nginx.passenger - nginx.config @@ -16,106 +21,132 @@ include: # we'll keep it simple here. {%- set arvados_ca_cert_file = '/etc/ssl/private/arvados-snakeoil-ca.pem' %} {%- set arvados_ca_key_file = '/etc/ssl/private/arvados-snakeoil-ca.key' %} -{%- set arvados_cert_file = '/etc/ssl/private/arvados-snakeoil-cert.pem' %} -{%- set arvados_csr_file = '/etc/ssl/private/arvados-snakeoil-cert.csr' %} -{%- set arvados_key_file = '/etc/ssl/private/arvados-snakeoil-cert.key' %} {%- if grains.get('os_family') == 'Debian' %} {%- set arvados_ca_cert_dest = '/usr/local/share/ca-certificates/arvados-snakeoil-ca.crt' %} {%- set update_ca_cert = '/usr/sbin/update-ca-certificates' %} {%- set openssl_conf = '/etc/ssl/openssl.cnf' %} + +extra_snakeoil_certs_ssl_cert_pkg_installed: + pkg.installed: + - name: ssl-cert + - require_in: + - sls: postgres + {%- else %} {%- set arvados_ca_cert_dest = '/etc/pki/ca-trust/source/anchors/arvados-snakeoil-ca.pem' %} {%- set update_ca_cert = '/usr/bin/update-ca-trust' %} {%- set openssl_conf = '/etc/pki/tls/openssl.cnf' %} + {%- endif %} -arvados_test_salt_states_examples_single_host_snakeoil_certs_dependencies_pkg_installed: +extra_snakeoil_certs_dependencies_pkg_installed: pkg.installed: - pkgs: - openssl - ca-certificates -arvados_test_salt_states_examples_single_host_snakeoil_certs_arvados_snake_oil_ca_cmd_run: +extra_snakeoil_certs_arvados_snakeoil_ca_cmd_run: # Taken from https://github.com/arvados/arvados/blob/master/tools/arvbox/lib/arvbox/docker/service/certificate/run cmd.run: - name: | - # These dirs are not to CentOS-ish, but this is a helper script + # These dirs are not too CentOS-ish, but this is a helper script # and they should be enough - mkdir -p /etc/ssl/certs/ /etc/ssl/private/ && \ + /bin/bash -c "mkdir -p /etc/ssl/certs/ /etc/ssl/private/ && \ openssl req \ -new \ -nodes \ -sha256 \ -x509 \ - -subj "/C=CC/ST=Some State/O=Arvados Formula/OU=arvados-formula/CN=snakeoil-ca-{{ arvados.cluster.name }}.{{ arvados.cluster.domain }}" \ + -subj \"/C=CC/ST=Some State/O=Arvados Formula/OU=arvados-formula/CN=snakeoil-ca-{{ arvados.cluster.name }}.{{ arvados.cluster.domain }}\" \ -extensions x509_ext \ -config <(cat {{ openssl_conf }} \ - <(printf "\n[x509_ext]\nbasicConstraints=critical,CA:true,pathlen:0\nkeyUsage=critical,keyCertSign,cRLSign")) \ + <(printf \"\n[x509_ext]\nbasicConstraints=critical,CA:true,pathlen:0\nkeyUsage=critical,keyCertSign,cRLSign\")) \ -out {{ arvados_ca_cert_file }} \ -keyout {{ arvados_ca_key_file }} \ -days 365 && \ cp {{ arvados_ca_cert_file }} {{ arvados_ca_cert_dest }} && \ - {{ update_ca_cert }} + {{ update_ca_cert }}" - unless: - test -f {{ arvados_ca_cert_file }} - openssl verify -CAfile {{ arvados_ca_cert_file }} {{ arvados_ca_cert_file }} - require: - - pkg: arvados_test_salt_states_examples_single_host_snakeoil_certs_dependencies_pkg_installed + - pkg: extra_snakeoil_certs_dependencies_pkg_installed + +# Create independent certs for each vhost +{%- for vh in [ + 'collections', + 'controller', + 'download', + 'keepproxy', + 'webshell', + 'workbench', + 'workbench2', + 'websocket', + ] +%} +# We're creating these in a tmp directory, so they're copied to their destination +# with the `custom_certs` state file, as if using custom certificates. +{%- set arvados_cert_file = orig_cert_dir ~ '/arvados-' ~ vh ~ '.pem' %} +{%- set arvados_csr_file = orig_cert_dir ~ '/arvados-' ~ vh ~ '.csr' %} +{%- set arvados_key_file = orig_cert_dir ~ '/arvados-' ~ vh ~ '.key' %} -arvados_test_salt_states_examples_single_host_snakeoil_certs_arvados_snake_oil_cert_cmd_run: +extra_snakeoil_certs_arvados_snakeoil_cert_{{ vh }}_cmd_run: cmd.run: - name: | - cat > /tmp/openssl.cnf <<-CNF + cat > /tmp/{{ vh }}.openssl.cnf <<-CNF [req] default_bits = 2048 prompt = no default_md = sha256 - req_extensions = rext distinguished_name = dn + req_extensions = rext + [rext] + subjectAltName = @alt_names [dn] C = CC ST = Some State L = Some Location - O = Arvados Formula - OU = arvados-formula - CN = {{ arvados.cluster.name }}.{{ arvados.cluster.domain }} + O = Arvados Provision Example Single Host / Multiple Hostnames + OU = arvados-provision-example-single_host_multiple_hostnames + CN = {{ vh }}.{{ arvados.cluster.name }}.{{ arvados.cluster.domain }} emailAddress = admin@{{ arvados.cluster.name }}.{{ arvados.cluster.domain }} - [rext] - subjectAltName = @alt_names [alt_names] {%- for entry in grains.get('ipv4') %} IP.{{ loop.index }} = {{ entry }} {%- endfor %} - {%- for entry in [ - 'keep', - 'collections', - 'download', - 'ws', - 'workbench', - 'workbench2', + DNS.1 = {{ vh }}.{{ arvados.cluster.name }}.{{ arvados.cluster.domain }} + {%- if vh in [ + 'controller', + 'keepproxy', + 'websocket' ] %} - DNS.{{ loop.index }} = {{ entry }}.{{ arvados.cluster.name }}.{{ arvados.cluster.domain }} - {%- endfor %} - DNS.7 = {{ arvados.cluster.name }}.{{ arvados.cluster.domain }} + {%- if vh == 'controller' %} + DNS.2 = {{ arvados.cluster.name }}.{{ arvados.cluster.domain }} + {%- elif vh == 'keepproxy' %} + DNS.2 = keep.{{ arvados.cluster.name }}.{{ arvados.cluster.domain }} + {%- elif vh == 'websocket' %} + DNS.2 = ws.{{ arvados.cluster.name }}.{{ arvados.cluster.domain }} + {%- endif %} + {%- endif %} CNF # The req openssl req \ - -config /tmp/openssl.cnf \ + -config /tmp/{{ vh }}.openssl.cnf \ -new \ -nodes \ -sha256 \ -out {{ arvados_csr_file }} \ - -keyout {{ arvados_key_file }} > /tmp/snake_oil_certs.output 2>&1 && \ + -keyout {{ arvados_key_file }} > /tmp/snakeoil_certs.{{ vh }}.output 2>&1 && \ # The cert openssl x509 \ -req \ -days 365 \ -in {{ arvados_csr_file }} \ -out {{ arvados_cert_file }} \ - -extfile /tmp/openssl.cnf \ + -extfile /tmp/{{ vh }}.openssl.cnf \ -extensions rext \ -CA {{ arvados_ca_cert_file }} \ -CAkey {{ arvados_ca_key_file }} \ @@ -126,27 +157,20 @@ arvados_test_salt_states_examples_single_host_snakeoil_certs_arvados_snake_oil_c - test -f {{ arvados_key_file }} - openssl verify -CAfile {{ arvados_ca_cert_file }} {{ arvados_cert_file }} - require: - - pkg: arvados_test_salt_states_examples_single_host_snakeoil_certs_dependencies_pkg_installed - - cmd: arvados_test_salt_states_examples_single_host_snakeoil_certs_arvados_snake_oil_ca_cmd_run - # We need this before we can add the nginx's snippet - - require_in: - - file: nginx_snippet_arvados-snakeoil.conf - -{%- if grains.get('os_family') == 'Debian' %} -arvados_test_salt_states_examples_single_host_snakeoil_certs_ssl_cert_pkg_installed: - pkg.installed: - - name: ssl-cert + - pkg: extra_snakeoil_certs_dependencies_pkg_installed + - cmd: extra_snakeoil_certs_arvados_snakeoil_ca_cmd_run - require_in: - - sls: postgres + - file: extra_custom_certs_{{ vh }}_cert_file_copy + - file: extra_custom_certs_{{ vh }}_key_file_copy -arvados_test_salt_states_examples_single_host_snakeoil_certs_certs_permissions_cmd_run: + {%- if grains.get('os_family') == 'Debian' %} +extra_snakeoil_certs_certs_permissions_{{ vh}}_cmd_run: file.managed: - name: {{ arvados_key_file }} - owner: root - group: ssl-cert - require: - - cmd: arvados_test_salt_states_examples_single_host_snakeoil_certs_arvados_snake_oil_cert_cmd_run - - pkg: arvados_test_salt_states_examples_single_host_snakeoil_certs_ssl_cert_pkg_installed - - require_in: - - file: nginx_snippet_arvados-snakeoil.conf -{%- endif %} + - cmd: extra_snakeoil_certs_arvados_snakeoil_cert_{{ vh }}_cmd_run + - pkg: extra_snakeoil_certs_ssl_cert_pkg_installed + {%- endif %} +{%- endfor %}