From 3091dcda6ce4db5ea26651c1e2097377db4d4753 Mon Sep 17 00:00:00 2001 From: Jonathan Ervine Date: Thu, 23 Apr 2020 21:49:10 +0800 Subject: [PATCH] modified: Dockerfile new file: start.sh Customised to be ready to bootstrap CA --- .nfs000000000e0c87de00000001 | Bin 0 -> 16384 bytes Dockerfile | 15 +++- start.sh | 163 +++++++++++++++++++++++++++++++++++ 3 files changed, 174 insertions(+), 4 deletions(-) create mode 100644 .nfs000000000e0c87de00000001 create mode 100644 start.sh diff --git a/.nfs000000000e0c87de00000001 b/.nfs000000000e0c87de00000001 new file mode 100644 index 0000000000000000000000000000000000000000..6f8934746ef01f12ebf287791c687ee1971fc0ae GIT binary patch literal 16384 zcmeHOO>i7X6`lkL33hCX9H^o~{5;w!TaeL8mT}D5!db7@i6~nVyONzkGGcb7cX!bI zWu`~AY)lF+Cg2NP0!0A@90z#52QGS04@qH5PnRBD!%UNnO#Y{vSltn z%~pL{Z~wg4{dM>2_uhF4V;B(XQSrnHq9zC*hAXZ;F5)&;PUd|E;~6_7~vCz$?IuzzaYCd;&ND90l$N z{U82IOdnsy7g0sIiS26O=i*gy@qxm(i`fCG;M zCjbI|xl7Z20elN+0#)GFdo=Ae;LE@|FahiXUVlK-eg^y$co}#J_!01R-~r&*n0Nww z9QZKsA>dc<*0gT|SAkCh=YeHl4{+l?Z~=S+_!{sWz=6HMEAP^@?*lH-0c^km9s=Ha zr>6Z0_#Vp4JOb9IHz!yX$OL;rD4m+~|%@(5Z>3uoq6YSoqbYO{H6t})#!Xw03R zY0k{e)*E>xHXLSg!QoxQGL0m1NiU)AV&k+fYrx~06JrJ}GD0(sF9eZov>g{i&-Dxt ztJCu4?y2DE`l;&T>4lZ~UZ=e65b)R5T{=LaW5?&Awx$Lc~<=sK3ealWiBvsPnGYdctQ z`G*K6&vRn2YgVK_($j-QUc%)@zrb4EAXrVedlI26@Wp;}+O$Na6J+>|#_9YqF#sRs z+0g?zU96mMIO?cwD-j#JcUF1_2=db7=aXI&qZcPnkkuQuupoCZWbB}U2eU%DCa0p8 zs*4MAwR&Sgr>QB@d6Y0cpI6FRPwOVKlu=Tmwy-jslgye8nf?wYpGn$gp0}Aq&!X*o z9=*Q9R&obZ=@YiyY%*5U<|N+K!#_E@$jNG3+NNrpwf<@h6CI){@n>Muh}q2Nj_Jli za)kCgSYl9?8R9?&k;B)gb~bnmFHuGu zR%kJncQfpZoE)jyiJMT6p5DCDa!rVx>>{*ZMkULmx;_ zznlRK;TGw$o1h_|zPvozf$+#u*T(a35j`qRI`L?o%nn|Q-9*y(ZES{L|mi;6=IcCDMYZKgz1O#>9 z2Ffix*7MS~*y4fST6SkB3j62Z^T@Oz{=`)2@{pQ}Q99TaV=UWjt&CgIw*wE3C5N4` zEvg!yG>uE+#z#>kn;8~O9-?FEnK*D@^omrOy9rW_`t_fS9-$6{4~R2QnHwl>YoA&0 z#moqAP|Ld?+`>Anz>qm+OFD_!1-Np$da^E^%5B;->y5KBwfY_1o+GL2ksoTD#-|ep z7M3#Y@JhDo+DN`WxJBkx4z3l><=`6WVGgd69`)AYNLB`ln{U)l%{(YdWayRf8UXN!8*3&Vc zV=gQ(u8V-0!h^5%?jd2DMdYMhNeo>Z*XfA)O;dBpV% zK*aTb2d)9TfnC5&#OE&p0Wbml8FBdwzz={g0Ucl;@HS%e*MR2%5wAZ3B)}3d15|(y z0B<8!e-n5Wcp3OMa1~eu=75g?j{v)XKOk=Z9dHeJ7Wg7C1sn$+1MUOv0d8VGKLNzN zUJ`RFJ_Q2>0|f&G0|f&G1OFck2?~ay5 zqqrOe0bfa@{ZSPoWPzx$A$jJSE#_{Y&MT!Zv7xeuBJ%>Dk4mWzt<~pF!DCH7dEPAz zJ1WF{5s%oafoF27ds=9WE3zoh6E^W^z~b-uQNmEEdI+U@|v=CZDM2H6H$;L!-9T!xk2KIg-nIYidv&yU8t+- zC_x4{9TOq-a551oT`VzH_~hd3^yzx8SdfqWV_BwJnegG$Pd-ER$^(cEwW!F0H5G`d zdX<()^;@ok99B(oFG>vgK%&31Tn|mHk{q>Ajur#gPxBZzZIhc74VhTGLT6Nx_*|MK zPBkgdUhDB%A(7{hS>}j!5MQL+jjbM)*|N2X7UWJ~fFiYa{5W>Uu!l56IgKh4xBW(j z9E26@$l)wFrvuCWfzdlj`Su<;DS9>q(c7JkG%J|1IOxetein8h2akR7h(0??+jUP* z9iCC;BgwMFch_6mi8~tjR?TTi-g$)NnHG-$hdfF{yp=tO!$XF?laQtR70EK$;aK?; z2a;_V?I`dJ*Fky}DJMOnad?Ucrugpk_b<|I)T)#ZRNYS3Rz9 $TMP_CA_PASSWORD +echo $CA_PROVISIONER_PASSWORD > $TMP_CA_PROVISIONER_PASSWORD + +step ca init \ + --name "$CA_NAME" \ + --dns "$CA_DNS" \ + --address "$CA_ADDRESS" \ + --password-file "$TMP_CA_PASSWORD" \ + --provisioner "$CA_DEFAULT_PROVISIONER" \ + --provisioner-password-file "$TMP_CA_PROVISIONER_PASSWORD" \ + --with-ca-url "$CA_URL" + +rm -f $TMP_CA_PASSWORD $TMP_CA_PROVISIONER_PASSWORD + +echo +echo -e "\e[1mCreating configmaps and secrets in $NAMESPACE namespace ...\e[0m" + +function kbreplace() { + kubectl $@ -o yaml --dry-run | kubectl replace -f - +} + +# Replace secrets created on helm install +# It allows to properly remove them on help delete +kbreplace -n $NAMESPACE create configmap $PREFIX-config --from-file $(step path)/config +kbreplace -n $NAMESPACE create configmap $PREFIX-certs --from-file $(step path)/certs +kbreplace -n $NAMESPACE create configmap $PREFIX-secrets --from-file $(step path)/secrets + +kbreplace -n $NAMESPACE create secret generic $PREFIX-ca-password --from-literal "password=${CA_PASSWORD}" +kbreplace -n $NAMESPACE create secret generic $PREFIX-provisioner-password --from-literal "password=${CA_PROVISIONER_PASSWORD}" + +# Label all configmaps and secrets +kubectl -n $NAMESPACE label configmap $PREFIX-config $LABELS +kubectl -n $NAMESPACE label configmap $PREFIX-certs $LABELS +kubectl -n $NAMESPACE label configmap $PREFIX-secrets $LABELS +kubectl -n $NAMESPACE label secret $PREFIX-ca-password $LABELS +kubectl -n $NAMESPACE label secret $PREFIX-provisioner-password $LABELS + +# Replace webhook if necessary +if [ "$AUTOCERT" == "true" ]; then + CA_BUNDLE=$(cat $(step path)/certs/root_ca.crt | base64 | tr -d '\n') + cat <