123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184 |
- package control
- import (
- "io/ioutil"
- "os"
- "path/filepath"
- log "github.com/Sirupsen/logrus"
- "github.com/codegangsta/cli"
- machineUtil "github.com/docker/machine/utils"
- "github.com/rancher/os/config"
- "github.com/rancher/os/util"
- )
- const (
- NAME string = "rancher"
- BITS int = 2048
- ServerTlsPath string = "/etc/docker/tls"
- ClientTlsPath string = "/home/rancher/.docker"
- Cert string = "cert.pem"
- Key string = "key.pem"
- ServerCert string = "server-cert.pem"
- ServerKey string = "server-key.pem"
- CaCert string = "ca.pem"
- CaKey string = "ca-key.pem"
- )
- func tlsConfCommands() []cli.Command {
- return []cli.Command{
- {
- Name: "generate",
- ShortName: "gen",
- Usage: "generates new set of TLS configuration certs",
- Action: tlsConfCreate,
- Flags: []cli.Flag{
- cli.StringSliceFlag{
- Name: "hostname, H",
- Usage: "the hostname for which you want to generate the certificate",
- Value: &cli.StringSlice{"localhost"},
- },
- cli.BoolFlag{
- Name: "server, s",
- Usage: "generate the server keys instead of client keys",
- },
- cli.StringFlag{
- Name: "dir, d",
- Usage: "the directory to save/read the certs to/from",
- Value: "",
- },
- },
- },
- }
- }
- func writeCerts(generateServer bool, hostname []string, certPath, keyPath, caCertPath, caKeyPath string) error {
- if !generateServer {
- return machineUtil.GenerateCert([]string{""}, certPath, keyPath, caCertPath, caKeyPath, NAME, BITS)
- }
- if err := machineUtil.GenerateCert(hostname, certPath, keyPath, caCertPath, caKeyPath, NAME, BITS); err != nil {
- return err
- }
- cert, err := ioutil.ReadFile(certPath)
- if err != nil {
- return err
- }
- key, err := ioutil.ReadFile(keyPath)
- if err != nil {
- return err
- }
- // certPath, keyPath are already written to by machineUtil.GenerateCert()
- if err := config.Set("rancher.docker.server_cert", string(cert)); err != nil {
- return err
- }
- if err := config.Set("rancher.docker.server_key", string(key)); err != nil {
- return err
- }
- return nil
- }
- func writeCaCerts(cfg *config.CloudConfig, caCertPath, caKeyPath string) error {
- if cfg.Rancher.Docker.CACert == "" {
- if err := machineUtil.GenerateCACertificate(caCertPath, caKeyPath, NAME, BITS); err != nil {
- return err
- }
- caCert, err := ioutil.ReadFile(caCertPath)
- if err != nil {
- return err
- }
- caKey, err := ioutil.ReadFile(caKeyPath)
- if err != nil {
- return err
- }
- // caCertPath, caKeyPath are already written to by machineUtil.GenerateCACertificate()
- if err := config.Set("rancher.docker.ca_cert", string(caCert)); err != nil {
- return err
- }
- if err := config.Set("rancher.docker.ca_key", string(caKey)); err != nil {
- return err
- }
- } else {
- cfg = config.LoadConfig()
- if err := util.WriteFileAtomic(caCertPath, []byte(cfg.Rancher.Docker.CACert), 0400); err != nil {
- return err
- }
- if err := util.WriteFileAtomic(caKeyPath, []byte(cfg.Rancher.Docker.CAKey), 0400); err != nil {
- return err
- }
- }
- return nil
- }
- func tlsConfCreate(c *cli.Context) error {
- err := generate(c)
- if err != nil {
- log.Fatal(err)
- }
- return nil
- }
- func generate(c *cli.Context) error {
- generateServer := c.Bool("server")
- outDir := c.String("dir")
- hostnames := c.StringSlice("hostname")
- return Generate(generateServer, outDir, hostnames)
- }
- func Generate(generateServer bool, outDir string, hostnames []string) error {
- if outDir == "" {
- if generateServer {
- outDir = ServerTlsPath
- } else {
- outDir = ClientTlsPath
- }
- log.Infof("Out directory (-d, --dir) not specified, using default: %s", outDir)
- }
- caCertPath := filepath.Join(outDir, CaCert)
- caKeyPath := filepath.Join(outDir, CaKey)
- certPath := filepath.Join(outDir, Cert)
- keyPath := filepath.Join(outDir, Key)
- if generateServer {
- certPath = filepath.Join(outDir, ServerCert)
- keyPath = filepath.Join(outDir, ServerKey)
- }
- if _, err := os.Stat(outDir); os.IsNotExist(err) {
- if err := os.MkdirAll(outDir, 0700); err != nil {
- return err
- }
- }
- cfg := config.LoadConfig()
- if err := writeCaCerts(cfg, caCertPath, caKeyPath); err != nil {
- return err
- }
- if err := writeCerts(generateServer, hostnames, certPath, keyPath, caCertPath, caKeyPath); err != nil {
- return err
- }
- if !generateServer {
- if err := filepath.Walk(outDir, func(path string, info os.FileInfo, err error) error {
- return os.Chown(path, 1100, 1100) // rancher:rancher
- }); err != nil {
- return err
- }
- }
- return nil
- }
|