| # source me to have all the nice things |
| |
| if [ "$0" == "$BASH_SOURCE" ]; then |
| echo "You should be sourcing this." |
| exit 1 |
| fi |
| |
| hscloud_root="$( cd "$(dirname "$BASH_SOURCE")"; pwd -P )" |
| |
| hscloud-dc() { |
| ( cd "$hscloud_root" && docker-compose -f "docker/docker-compose.yml" "$@" ) |
| } |
| |
| hscloud-pki-dev() { |
| ( |
| set -e |
| |
| cd "$hscloud_root" |
| rm -rf docker/pki |
| |
| cp -rv go/pki/dev-certs docker/pki |
| cd docker/pki |
| bash gen.sh m6220-proxy arista-proxy cmc-proxy topo client |
| ls *pem |
| ) |
| } |
| |
| # Generate a per-node certificate remotely on the node. |
| hscloud-node-remote-cert() { |
| ( |
| set -e |
| if [ -z "$1" ] || [ -z "$2" ] || [ -x "$3" ]; then |
| echo >&2 "Usage: hscloud-node-remote-cert node.fqdn.com certname subj" |
| exit 1 |
| fi |
| fqdn="$1" |
| certname="$2" |
| subj="$3" |
| |
| echo "Node: ${fqdn}; Cert: ${certname}" |
| |
| echo "Checking node livenes..." |
| ssh root@$fqdn uname -a |
| |
| echo "Checking if node already has key..." |
| ssh root@$fqdn stat /opt/hscloud/${certname}.key || ( |
| echo "Generating key..." |
| ssh root@$fqdn -- mkdir -p /opt/hscloud |
| ssh root@$fqdn -- nix-shell -p openssl --command "\"openssl genrsa -out /opt/hscloud/${certname}.key 4096\"" |
| ssh root@$fqdn -- chmod 400 /opt/hscloud/${certname}.key |
| ) |
| |
| echo "Checking if node already has cert..." |
| ssh root@$fqdn stat /opt/hscloud/${certname}.crt && exit 0 |
| echo "No cert, will generate..." |
| |
| cd "$hscloud_root" |
| secrets="$hscloud_root/secrets" |
| ca="$secrets/plain/ca.key" |
| [ ! -f "$ca" ] && ( scripts/secretstore decrypt "$secrets/cipher/ca.key" > $ca ) |
| |
| ssh root@$fqdn -- nix-shell -p openssl --command "\"openssl req -new -key /opt/hscloud/${certname}.key -out /opt/hscloud/${certname}.csr -subj '${subj}'\"" |
| scp root@$fqdn:/opt/hscloud/${certname}.csr ${fqdn}-${certname}.csr |
| openssl x509 -req -in ${fqdn}-${certname}.csr -CA data/ca.crt -CAkey "$ca" -CAcreateserial -out "data/${fqdn}-${certname}.crt" |
| |
| scp "data/${fqdn}-${certname}.crt" root@$fqdn:/opt/hscloud/${certname}.crt |
| scp "data/ca.crt" root@$fqdn:/opt/hscloud/ca.crt |
| ssh root@$fqdn -- chmod 444 /opt/hscloud/${certname}.crt /opt/hscloud/ca.crt |
| rm ${fqdn}-${certname}.csr |
| ) |
| } |
| |
| # Generate locally (if not present) a shared certificate, and upload it to the node |
| hscloud-node-shared-cert() { |
| ( |
| set -e |
| if [ -z "$1" ] || [ -z "$2" ] || [ -x "$3" ]; then |
| echo >&2 "Usage: hscloud-node-shared-cert node.fqdn.com certname subj" |
| exit 1 |
| fi |
| fqdn="$1" |
| certname="$2" |
| subj="$3" |
| |
| cd "$hscloud_root" |
| secrets="$hscloud_root/secrets" |
| keyfile="$secrets/$certname.key" |
| cert="$hscloud_root/data/$certname.crt" |
| csr="$hscloud_root/data/$certname.csr" |
| ca="$secrets/plain/ca.key" |
| [ ! -f "$ca" ] && ( scripts/secretstore decrypt "$secrets/cipher/ca.key" > $ca ) |
| |
| echo "Checking if key exists..." |
| if [ ! -f "$keyfile" ]; then |
| echo "No key, trying to decrypt..." |
| if ! scripts/secretstore decrypt "$secrets/cipher/$certname.key" > "$keyfile" ; then |
| echo "No encrypted key, generating..." |
| openssl genrsa -out $keyfile 4096 |
| echo "Encrypting..." |
| scripts/secretstore encrypt "$keyfile" > "$secrets/cipher/$certname.key" |
| fi |
| fi |
| |
| echo "Checking if cert exists..." |
| if [ ! -f "$cert" ]; then |
| echo "No cert, generating..." |
| rm -f "${csr}" |
| openssl req -new -key "${keyfile}" -out "${csr}" -subj "${subj}" |
| openssl x509 -req -in "${csr}" -CA data/ca.crt -CAkey "$ca" -CAcreateserial -out "${cert}" |
| fi |
| |
| echo "Copying certificate to node..." |
| scp "${cert}" root@$fqdn:/opt/hscloud/${certname}.crt |
| scp "${keyfile}" root@$fqdn:/opt/hscloud/${certname}.key |
| ssh root@$fqdn -- chmod 444 /opt/hscloud/${certname}.crt |
| ssh root@$fqdn -- chmod 400 /opt/hscloud/${certname}.key |
| ) |
| } |
| |
| hscloud-node-certs() { |
| ( |
| set -e |
| |
| if [ -z "$1" ]; then |
| echo >&2 "Usage: hscloud-node-certs node.fqdn.com" |
| exit 1 |
| fi |
| fqdn="$1" |
| |
| hscloud-node-remote-cert ${fqdn} node "/C=PL/ST=Mazowieckie/L=Mazowieckie/O=Stowarzyszenie Warszawski Hackerspace/OU=Node Bootstrap Certificate/CN=\"$fqdn\"" |
| hscloud-node-remote-cert ${fqdn} kube-node "/C=PL/ST=Mazowieckie/L=Mazowieckie/O=system:nodes/OU=Kubernetes Node Certificate/CN=system:node:\"$fqdn\"" |
| for component in controller-manager proxy scheduler; do |
| hscloud-node-shared-cert ${fqdn} kube-${component} "/C=PL/ST=Mazowieckie/L=Mazowieckie/O=system:kube-${component}/OU=Kubernetes Component ${component}/CN=system:kube-${component}" |
| done |
| ) |
| } |
| |
| echo "Now playing:" |
| echo " hscloud-dc - run docker-compose" |
| echo " hscloud-pki-dev - generate dev PKI certs" |
| echo " hscloud-node-push-certs - push a node cert to the node" |
| echo "" |