mirror of https://github.com/portainer/portainer
feat(ssl): enable mTLS certificates [EE-2617] (#6612)
parent
f9f937f844
commit
dff74f0823
|
@ -18,8 +18,6 @@ const (
|
||||||
defaultHTTPDisabled = "false"
|
defaultHTTPDisabled = "false"
|
||||||
defaultHTTPEnabled = "false"
|
defaultHTTPEnabled = "false"
|
||||||
defaultSSL = "false"
|
defaultSSL = "false"
|
||||||
defaultSSLCertPath = "/certs/portainer.crt"
|
|
||||||
defaultSSLKeyPath = "/certs/portainer.key"
|
|
||||||
defaultBaseURL = "/"
|
defaultBaseURL = "/"
|
||||||
defaultSecretKeyName = "portainer"
|
defaultSecretKeyName = "portainer"
|
||||||
)
|
)
|
||||||
|
|
|
@ -15,8 +15,6 @@ const (
|
||||||
defaultHTTPDisabled = "false"
|
defaultHTTPDisabled = "false"
|
||||||
defaultHTTPEnabled = "false"
|
defaultHTTPEnabled = "false"
|
||||||
defaultSSL = "false"
|
defaultSSL = "false"
|
||||||
defaultSSLCertPath = "C:\\certs\\portainer.crt"
|
|
||||||
defaultSSLKeyPath = "C:\\certs\\portainer.key"
|
|
||||||
defaultSnapshotInterval = "5m"
|
defaultSnapshotInterval = "5m"
|
||||||
defaultBaseURL = "/"
|
defaultBaseURL = "/"
|
||||||
defaultSecretKeyName = "portainer"
|
defaultSecretKeyName = "portainer"
|
||||||
|
|
|
@ -1,41 +1,19 @@
|
||||||
package main
|
package main
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"fmt"
|
|
||||||
"log"
|
"log"
|
||||||
"strings"
|
|
||||||
|
|
||||||
"github.com/sirupsen/logrus"
|
"github.com/sirupsen/logrus"
|
||||||
)
|
)
|
||||||
|
|
||||||
type portainerFormatter struct {
|
|
||||||
logrus.TextFormatter
|
|
||||||
}
|
|
||||||
|
|
||||||
func (f *portainerFormatter) Format(entry *logrus.Entry) ([]byte, error) {
|
|
||||||
var levelColor int
|
|
||||||
switch entry.Level {
|
|
||||||
case logrus.DebugLevel, logrus.TraceLevel:
|
|
||||||
levelColor = 31 // gray
|
|
||||||
case logrus.WarnLevel:
|
|
||||||
levelColor = 33 // yellow
|
|
||||||
case logrus.ErrorLevel, logrus.FatalLevel, logrus.PanicLevel:
|
|
||||||
levelColor = 31 // red
|
|
||||||
default:
|
|
||||||
levelColor = 36 // blue
|
|
||||||
}
|
|
||||||
return []byte(fmt.Sprintf("\x1b[%dm%s\x1b[0m %s %s\n", levelColor, strings.ToUpper(entry.Level.String()), entry.Time.Format(f.TimestampFormat), entry.Message)), nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func configureLogger() {
|
func configureLogger() {
|
||||||
logger := logrus.New() // logger is to implicitly substitute stdlib's log
|
logger := logrus.New() // logger is to implicitly substitute stdlib's log
|
||||||
log.SetOutput(logger.Writer())
|
log.SetOutput(logger.Writer())
|
||||||
|
|
||||||
formatter := &logrus.TextFormatter{DisableTimestamp: true, DisableLevelTruncation: true}
|
formatter := &logrus.TextFormatter{DisableTimestamp: false, DisableLevelTruncation: true}
|
||||||
formatterLogrus := &portainerFormatter{logrus.TextFormatter{DisableTimestamp: false, DisableLevelTruncation: true, TimestampFormat: "2006/01/02 15:04:05", FullTimestamp: true}}
|
|
||||||
|
|
||||||
logger.SetFormatter(formatter)
|
logger.SetFormatter(formatter)
|
||||||
logrus.SetFormatter(formatterLogrus)
|
logrus.SetFormatter(formatter)
|
||||||
|
|
||||||
logger.SetLevel(logrus.DebugLevel)
|
logger.SetLevel(logrus.DebugLevel)
|
||||||
logrus.SetLevel(logrus.DebugLevel)
|
logrus.SetLevel(logrus.DebugLevel)
|
||||||
|
|
|
@ -208,7 +208,7 @@ func initGitService() portainer.GitService {
|
||||||
return git.NewService()
|
return git.NewService()
|
||||||
}
|
}
|
||||||
|
|
||||||
func initSSLService(addr, dataPath, certPath, keyPath string, fileService portainer.FileService, dataStore dataservices.DataStore, shutdownTrigger context.CancelFunc) (*ssl.Service, error) {
|
func initSSLService(addr, certPath, keyPath string, fileService portainer.FileService, dataStore dataservices.DataStore, shutdownTrigger context.CancelFunc) (*ssl.Service, error) {
|
||||||
slices := strings.Split(addr, ":")
|
slices := strings.Split(addr, ":")
|
||||||
host := slices[0]
|
host := slices[0]
|
||||||
if host == "" {
|
if host == "" {
|
||||||
|
@ -568,7 +568,7 @@ func buildServer(flags *portainer.CLIFlags) portainer.Server {
|
||||||
cryptoService := initCryptoService()
|
cryptoService := initCryptoService()
|
||||||
digitalSignatureService := initDigitalSignatureService()
|
digitalSignatureService := initDigitalSignatureService()
|
||||||
|
|
||||||
sslService, err := initSSLService(*flags.AddrHTTPS, *flags.Data, *flags.SSLCert, *flags.SSLKey, fileService, dataStore, shutdownTrigger)
|
sslService, err := initSSLService(*flags.AddrHTTPS, *flags.SSLCert, *flags.SSLKey, fileService, dataStore, shutdownTrigger)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
logrus.Fatal(err)
|
logrus.Fatal(err)
|
||||||
}
|
}
|
||||||
|
|
|
@ -9,18 +9,7 @@ import (
|
||||||
// CreateServerTLSConfiguration creates a basic tls.Config to be used by servers with recommended TLS settings
|
// CreateServerTLSConfiguration creates a basic tls.Config to be used by servers with recommended TLS settings
|
||||||
func CreateServerTLSConfiguration() *tls.Config {
|
func CreateServerTLSConfiguration() *tls.Config {
|
||||||
return &tls.Config{
|
return &tls.Config{
|
||||||
MinVersion: tls.VersionTLS12,
|
MinVersion: tls.VersionTLS13,
|
||||||
CipherSuites: []uint16{
|
|
||||||
tls.TLS_AES_128_GCM_SHA256,
|
|
||||||
tls.TLS_AES_256_GCM_SHA384,
|
|
||||||
tls.TLS_CHACHA20_POLY1305_SHA256,
|
|
||||||
tls.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
|
|
||||||
tls.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
|
|
||||||
tls.TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
|
|
||||||
tls.TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
|
|
||||||
tls.TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,
|
|
||||||
tls.TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,
|
|
||||||
},
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -56,10 +56,12 @@ const (
|
||||||
TempPath = "tmp"
|
TempPath = "tmp"
|
||||||
// SSLCertPath represents the default ssl certificates path
|
// SSLCertPath represents the default ssl certificates path
|
||||||
SSLCertPath = "certs"
|
SSLCertPath = "certs"
|
||||||
// DefaultSSLCertFilename represents the default ssl certificate file name
|
// SSLCertFilename represents the ssl certificate file name
|
||||||
DefaultSSLCertFilename = "cert.pem"
|
SSLCertFilename = "cert.pem"
|
||||||
// DefaultSSLKeyFilename represents the default ssl key file name
|
// SSLKeyFilename represents the ssl key file name
|
||||||
DefaultSSLKeyFilename = "key.pem"
|
SSLKeyFilename = "key.pem"
|
||||||
|
// SSLCACertFilename represents the CA ssl certificate file name for mTLS
|
||||||
|
SSLCACertFilename = "ca-cert.pem"
|
||||||
)
|
)
|
||||||
|
|
||||||
// ErrUndefinedTLSFileType represents an error returned on undefined TLS file type
|
// ErrUndefinedTLSFileType represents an error returned on undefined TLS file type
|
||||||
|
@ -161,7 +163,7 @@ func (service *Service) Copy(fromFilePath string, toFilePath string, deleteIfExi
|
||||||
}
|
}
|
||||||
|
|
||||||
if !exists {
|
if !exists {
|
||||||
return errors.New("File doesn't exist")
|
return errors.New(fmt.Sprintf("File (%s) doesn't exist", fromFilePath))
|
||||||
}
|
}
|
||||||
|
|
||||||
finput, err := os.Open(fromFilePath)
|
finput, err := os.Open(fromFilePath)
|
||||||
|
@ -580,8 +582,8 @@ func (service *Service) wrapFileStore(filepath string) string {
|
||||||
}
|
}
|
||||||
|
|
||||||
func defaultCertPathUnderFileStore() (string, string) {
|
func defaultCertPathUnderFileStore() (string, string) {
|
||||||
certPath := JoinPaths(SSLCertPath, DefaultSSLCertFilename)
|
certPath := JoinPaths(SSLCertPath, SSLCertFilename)
|
||||||
keyPath := JoinPaths(SSLCertPath, DefaultSSLKeyFilename)
|
keyPath := JoinPaths(SSLCertPath, SSLKeyFilename)
|
||||||
return certPath, keyPath
|
return certPath, keyPath
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -627,6 +629,18 @@ func (service *Service) CopySSLCertPair(certPath, keyPath string) (string, strin
|
||||||
return defCertPath, defKeyPath, nil
|
return defCertPath, defKeyPath, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// CopySSLCACert copies the specified caCert pem file
|
||||||
|
func (service *Service) CopySSLCACert(caCertPath string) (string, error) {
|
||||||
|
toFilePath := service.wrapFileStore(JoinPaths(SSLCertPath, SSLCACertFilename))
|
||||||
|
|
||||||
|
err := service.Copy(caCertPath, toFilePath, true)
|
||||||
|
if err != nil {
|
||||||
|
return "", err
|
||||||
|
}
|
||||||
|
|
||||||
|
return toFilePath, nil
|
||||||
|
}
|
||||||
|
|
||||||
// FileExists checks for the existence of the specified file.
|
// FileExists checks for the existence of the specified file.
|
||||||
func FileExists(filePath string) (bool, error) {
|
func FileExists(filePath string) (bool, error) {
|
||||||
if _, err := os.Stat(filePath); err != nil {
|
if _, err := os.Stat(filePath); err != nil {
|
||||||
|
|
|
@ -8,6 +8,7 @@ import (
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
"github.com/pkg/errors"
|
"github.com/pkg/errors"
|
||||||
|
|
||||||
"github.com/portainer/libcrypto"
|
"github.com/portainer/libcrypto"
|
||||||
portainer "github.com/portainer/portainer/api"
|
portainer "github.com/portainer/portainer/api"
|
||||||
"github.com/portainer/portainer/api/dataservices"
|
"github.com/portainer/portainer/api/dataservices"
|
||||||
|
@ -32,8 +33,8 @@ func NewService(fileService portainer.FileService, dataStore dataservices.DataSt
|
||||||
|
|
||||||
// Init initializes the service
|
// Init initializes the service
|
||||||
func (service *Service) Init(host, certPath, keyPath string) error {
|
func (service *Service) Init(host, certPath, keyPath string) error {
|
||||||
pathSupplied := certPath != "" && keyPath != ""
|
certSupplied := certPath != "" && keyPath != ""
|
||||||
if pathSupplied {
|
if certSupplied {
|
||||||
newCertPath, newKeyPath, err := service.fileService.CopySSLCertPair(certPath, keyPath)
|
newCertPath, newKeyPath, err := service.fileService.CopySSLCertPair(certPath, keyPath)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return errors.Wrap(err, "failed copying supplied certs")
|
return errors.Wrap(err, "failed copying supplied certs")
|
||||||
|
@ -60,16 +61,24 @@ func (service *Service) Init(host, certPath, keyPath string) error {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// path not supplied and certificates doesn't exist - generate self signed
|
// path not supplied and certificates doesn't exist - generate self-signed
|
||||||
certPath, keyPath = service.fileService.GetDefaultSSLCertsPath()
|
certPath, keyPath = service.fileService.GetDefaultSSLCertsPath()
|
||||||
|
|
||||||
err = service.generateSelfSignedCertificates(host, certPath, keyPath)
|
err = generateSelfSignedCertificates(host, certPath, keyPath)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return errors.Wrap(err, "failed generating self signed certs")
|
return errors.Wrap(err, "failed generating self signed certs")
|
||||||
}
|
}
|
||||||
|
|
||||||
return service.cacheInfo(certPath, keyPath, true)
|
return service.cacheInfo(certPath, keyPath, true)
|
||||||
|
}
|
||||||
|
|
||||||
|
func generateSelfSignedCertificates(ip, certPath, keyPath string) error {
|
||||||
|
if ip == "" {
|
||||||
|
return errors.New("host can't be empty")
|
||||||
|
}
|
||||||
|
|
||||||
|
log.Printf("[INFO] [internal,ssl] [message: no cert files found, generating self signed ssl certificates]")
|
||||||
|
return libcrypto.GenerateCertsForHost("localhost", ip, certPath, keyPath, time.Now().AddDate(5, 0, 0))
|
||||||
}
|
}
|
||||||
|
|
||||||
// GetRawCertificate gets the raw certificate
|
// GetRawCertificate gets the raw certificate
|
||||||
|
@ -98,7 +107,10 @@ func (service *Service) SetCertificates(certData, keyData []byte) error {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
service.cacheInfo(certPath, keyPath, false)
|
err = service.cacheInfo(certPath, keyPath, false)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
service.shutdownTrigger()
|
service.shutdownTrigger()
|
||||||
|
|
||||||
|
@ -138,7 +150,7 @@ func (service *Service) cacheCertificate(certPath, keyPath string) error {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (service *Service) cacheInfo(certPath, keyPath string, selfSigned bool) error {
|
func (service *Service) cacheInfo(certPath string, keyPath string, selfSigned bool) error {
|
||||||
err := service.cacheCertificate(certPath, keyPath)
|
err := service.cacheCertificate(certPath, keyPath)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
|
@ -160,12 +172,3 @@ func (service *Service) cacheInfo(certPath, keyPath string, selfSigned bool) err
|
||||||
|
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (service *Service) generateSelfSignedCertificates(ip, certPath, keyPath string) error {
|
|
||||||
if ip == "" {
|
|
||||||
return errors.New("host can't be empty")
|
|
||||||
}
|
|
||||||
|
|
||||||
log.Printf("[INFO] [internal,ssl] [message: no cert files found, generating self signed ssl certificates]")
|
|
||||||
return libcrypto.GenerateCertsForHost("localhost", ip, certPath, keyPath, time.Now().AddDate(5, 0, 0))
|
|
||||||
}
|
|
||||||
|
|
|
@ -1238,6 +1238,7 @@ type (
|
||||||
GetDefaultSSLCertsPath() (string, string)
|
GetDefaultSSLCertsPath() (string, string)
|
||||||
StoreSSLCertPair(cert, key []byte) (string, string, error)
|
StoreSSLCertPair(cert, key []byte) (string, string, error)
|
||||||
CopySSLCertPair(certPath, keyPath string) (string, string, error)
|
CopySSLCertPair(certPath, keyPath string) (string, string, error)
|
||||||
|
CopySSLCACert(caCertPath string) (string, error)
|
||||||
StoreFDOProfileFileFromBytes(fdoProfileIdentifier string, data []byte) (string, error)
|
StoreFDOProfileFileFromBytes(fdoProfileIdentifier string, data []byte) (string, error)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue