2018-11-06 02:04:12 +00:00
|
|
|
# Examples
|
2018-11-03 01:55:13 +00:00
|
|
|
|
2018-11-06 02:04:12 +00:00
|
|
|
## Basic client usage
|
|
|
|
|
2018-11-14 09:06:34 +00:00
|
|
|
The basic-client example shows the functionality of the `ca.Client` type. The
|
|
|
|
methods work as an SDK for integrating services with the Certificate Authority (CA).
|
2018-11-06 02:04:12 +00:00
|
|
|
|
2018-11-14 09:06:34 +00:00
|
|
|
In [basic-client/client.go](/examples/basic-client/client.go) we see
|
|
|
|
the initialization of a client:
|
2018-11-06 02:04:12 +00:00
|
|
|
|
|
|
|
```go
|
|
|
|
client, err := ca.NewClient("https://localhost:9000", ca.WithRootSHA256("84a033e84196f73bd593fad7a63e509e57fd982f02084359c4e8c5c864efc27d"))
|
|
|
|
```
|
|
|
|
|
|
|
|
The previous code uses the CA address and the root certificate fingerprint.
|
|
|
|
The CA url will be present in the token, and the root fingerprint can be present
|
2018-11-14 09:06:34 +00:00
|
|
|
too if the `--root root_ca.crt` option is used in the creation of the token. If
|
|
|
|
the token does contain the root fingerprint then it is simpler to use:
|
2018-11-06 02:04:12 +00:00
|
|
|
|
|
|
|
```go
|
|
|
|
client, err := ca.Bootstrap(token)
|
|
|
|
```
|
|
|
|
|
2018-11-14 09:06:34 +00:00
|
|
|
After the initialization there are examples of all the client methods. These
|
|
|
|
methods are a convenient way to use the CA API. The first method, `Health`,
|
|
|
|
returns the status of the CA server. If the server is up it will return
|
|
|
|
`{"status":"ok"}`.
|
2018-11-06 02:04:12 +00:00
|
|
|
|
|
|
|
```go
|
|
|
|
health, err := client.Health()
|
|
|
|
// Health is a struct created from the JSON response {"status": "ok"}
|
|
|
|
```
|
|
|
|
|
2018-11-14 09:06:34 +00:00
|
|
|
The next method `Root` is used to get and verify the root certificate. We
|
|
|
|
pass a fingerprint and it downloads the root certificate from the CA and
|
|
|
|
verifies that the fingerprint matches. This method uses an insecure HTTP
|
2018-11-06 02:04:12 +00:00
|
|
|
client as it might be used in the initialization of the client, but the response
|
2018-11-14 09:06:34 +00:00
|
|
|
is considered secure because we have compared against the expected digest.
|
2018-11-06 02:04:12 +00:00
|
|
|
|
|
|
|
```go
|
|
|
|
root, err := client.Root("84a033e84196f73bd593fad7a63e509e57fd982f02084359c4e8c5c864efc27d")
|
|
|
|
```
|
|
|
|
|
2018-11-14 09:06:34 +00:00
|
|
|
Next we have the most important method; `Sign`. `Sign` will authorize and sign a
|
|
|
|
CSR (Certificate Signing Request) that we provide. To authorize this request we use
|
|
|
|
a provisioning token issued by an authorized provisioner.
|
|
|
|
You can build your own certificate request and add it in
|
|
|
|
the `*api.SignRequest`, but our CA SDK contains a method that will generate a
|
|
|
|
secure random key and create a CSR - combining the key with the information
|
|
|
|
provided in the provisioning token.
|
2018-11-06 02:04:12 +00:00
|
|
|
|
|
|
|
```go
|
2018-11-14 09:06:34 +00:00
|
|
|
// Create a CSR from a token and return the SignRequest, the private key, and an
|
2018-11-06 02:04:12 +00:00
|
|
|
// error if something failed.
|
|
|
|
req, pk, err := ca.CreateSignRequest(token)
|
|
|
|
if err != nil { ... }
|
|
|
|
|
2018-11-14 09:06:34 +00:00
|
|
|
// Do the Sign request and return the signed certificate.
|
2018-11-06 02:04:12 +00:00
|
|
|
sign, err := client.Sign(req)
|
|
|
|
if err != nil { ... }
|
|
|
|
```
|
|
|
|
|
2018-11-14 09:06:34 +00:00
|
|
|
Next is the `Renew` method which is used to (you guessed it!) renew certificates.
|
|
|
|
Certificate renewal relies on a mTLS connection with using an existing certificate.
|
|
|
|
So, as input we will need to pass a transport with the current certificate.
|
2018-11-06 02:04:12 +00:00
|
|
|
|
|
|
|
```go
|
|
|
|
// Get a cancelable context to stop the renewal goroutines and timers.
|
|
|
|
ctx, cancel := context.WithCancel(context.Background())
|
|
|
|
defer cancel()
|
2018-11-14 09:06:34 +00:00
|
|
|
// Create a transport with the sign response and the private key.
|
2018-11-06 02:04:12 +00:00
|
|
|
tr, err := client.Transport(ctx, sign, pk)
|
|
|
|
if err != nil { ... }
|
2018-11-14 09:06:34 +00:00
|
|
|
// Renew the certificate. The return type is equivalent to the Sign method.
|
2018-11-06 02:04:12 +00:00
|
|
|
renew, err := client.Renew(tr)
|
|
|
|
if err != nil { ... }
|
|
|
|
```
|
|
|
|
|
2018-11-14 09:06:34 +00:00
|
|
|
The following methods are for inpsecting Provisioners.
|
|
|
|
One method that returns a list of provisioners or a the encrypted key of one provisioner.
|
2018-11-06 02:04:12 +00:00
|
|
|
|
|
|
|
```go
|
2018-11-14 09:06:34 +00:00
|
|
|
// Without options it will return the first 20 provisioners.
|
2018-11-06 02:04:12 +00:00
|
|
|
provisioners, err := client.Provisioners()
|
2018-11-14 09:06:34 +00:00
|
|
|
// We can also set a limit up to 100.
|
2018-11-06 02:04:12 +00:00
|
|
|
provisioners, err := client.Provisioners(ca.WithProvisionerLimit(100))
|
2018-11-14 09:06:34 +00:00
|
|
|
// With a pagination cursor.
|
2018-11-06 02:04:12 +00:00
|
|
|
provisioners, err := client.Provisioners(ca.WithProvisionerCursor("1f18c1ecffe54770e9107ce7b39b39735"))
|
2018-11-14 09:06:34 +00:00
|
|
|
// Or combine both.
|
2018-11-06 02:04:12 +00:00
|
|
|
provisioners, err := client.Provisioners(
|
|
|
|
ca.WithProvisionerCursor("1f18c1ecffe54770e9107ce7b39b39735"),
|
|
|
|
ca.WithProvisionerLimit(100),
|
|
|
|
)
|
|
|
|
|
|
|
|
// Return the encrypted key of one of the returned provisioners. The key
|
|
|
|
// returned is an encrypted JWE with the private key used to sign tokens.
|
|
|
|
key, err := client.ProvisionerKey("DmAtZt2EhmZr_iTJJ387fr4Md2NbzMXGdXQNW1UWPXk")
|
|
|
|
```
|
|
|
|
|
2018-11-14 09:06:34 +00:00
|
|
|
The following example shows how to create a
|
|
|
|
tls.Config object that can be injected into servers and clients. By default these
|
|
|
|
methods will spin off Go routines that auto-renew a certificate once (approximately)
|
|
|
|
two thirds of the duration of the certificate has passed.
|
2018-11-06 02:04:12 +00:00
|
|
|
|
|
|
|
```go
|
|
|
|
// Get a cancelable context to stop the renewal goroutines and timers.
|
|
|
|
ctx, cancel := context.WithCancel(context.Background())
|
|
|
|
defer cancel()
|
2018-11-14 09:06:34 +00:00
|
|
|
// Get tls.Config for a server.
|
2018-11-06 23:08:36 +00:00
|
|
|
tlsConfig, err := client.GetServerTLSConfig(ctx, sign, pk)
|
2018-11-14 09:06:34 +00:00
|
|
|
// Get tls.Config for a client.
|
2018-11-06 02:04:12 +00:00
|
|
|
tlsConfig, err := client.GetClientTLSConfig(ctx, sign, pk)
|
2018-11-14 09:06:34 +00:00
|
|
|
// Get an http.Transport for a client; this can be used as a http.RoundTripper
|
|
|
|
// in an http.Client.
|
2018-11-06 02:04:12 +00:00
|
|
|
tr, err := client.Transport(ctx, sign, pk)
|
|
|
|
```
|
|
|
|
|
|
|
|
To run the example you need to start the certificate authority:
|
|
|
|
|
2018-11-07 01:16:33 +00:00
|
|
|
```sh
|
2018-11-06 02:04:12 +00:00
|
|
|
certificates $ bin/step-ca examples/pki/config/ca.json
|
|
|
|
2018/11/02 18:29:25 Serving HTTPS on :9000 ...
|
|
|
|
```
|
|
|
|
|
2018-11-14 09:06:34 +00:00
|
|
|
Then run client.go with a new token:
|
2018-11-07 01:16:33 +00:00
|
|
|
```sh
|
2018-11-06 02:04:12 +00:00
|
|
|
certificates $ export STEPPATH=examples/pki
|
|
|
|
certificates $ export STEP_CA_URL=https://localhost:9000
|
2018-11-07 02:03:48 +00:00
|
|
|
certificates $ go run examples/basic-client/client.go $(step ca token client.smallstep.com)
|
2018-11-06 02:04:12 +00:00
|
|
|
```
|
|
|
|
|
|
|
|
## Bootstrap Client & Server
|
2018-11-03 01:55:13 +00:00
|
|
|
|
2018-11-14 09:06:34 +00:00
|
|
|
In this example we are going run the CA alongside a simple Server using TLS and
|
|
|
|
a simple client making TLS requests to the server.
|
2018-11-03 01:55:13 +00:00
|
|
|
|
|
|
|
The examples directory already contains a sample pki configuration with the
|
|
|
|
password `password` hardcoded, but you can create your own using `step ca init`.
|
|
|
|
|
2018-11-14 09:06:34 +00:00
|
|
|
These examples show the use of some other helper methods - simple ways to
|
2018-11-07 01:16:33 +00:00
|
|
|
create TLS configured http.Server and http.Client objects. The methods are
|
2018-11-21 21:29:18 +00:00
|
|
|
`BootstrapServer` and `BootstrapClient`.
|
2018-11-07 01:16:33 +00:00
|
|
|
|
|
|
|
```go
|
|
|
|
// Get a cancelable context to stop the renewal goroutines and timers.
|
|
|
|
ctx, cancel := context.WithCancel(context.Background())
|
|
|
|
defer cancel()
|
2018-11-21 21:29:18 +00:00
|
|
|
// Create an http.Server that requires a client certificate
|
2018-11-07 01:16:33 +00:00
|
|
|
srv, err := ca.BootstrapServer(ctx, token, &http.Server{
|
|
|
|
Addr: ":8443",
|
|
|
|
Handler: handler,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
srv.ListenAndServeTLS("", "")
|
2018-11-03 01:55:13 +00:00
|
|
|
```
|
2018-11-07 01:16:33 +00:00
|
|
|
|
2018-11-08 00:07:35 +00:00
|
|
|
```go
|
|
|
|
// Get a cancelable context to stop the renewal goroutines and timers.
|
|
|
|
ctx, cancel := context.WithCancel(context.Background())
|
|
|
|
defer cancel()
|
2018-11-21 21:29:18 +00:00
|
|
|
// Create an http.Server that does not require a client certificate
|
2018-11-08 00:07:35 +00:00
|
|
|
srv, err := ca.BootstrapServerWithMTLS(ctx, token, &http.Server{
|
|
|
|
Addr: ":8443",
|
|
|
|
Handler: handler,
|
2018-11-21 21:29:18 +00:00
|
|
|
}, ca.VerifyClientCertIfGiven())
|
2018-11-08 00:07:35 +00:00
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
srv.ListenAndServeTLS("", "")
|
|
|
|
```
|
|
|
|
|
2018-11-07 01:16:33 +00:00
|
|
|
```go
|
|
|
|
// Get a cancelable context to stop the renewal goroutines and timers.
|
|
|
|
ctx, cancel := context.WithCancel(context.Background())
|
|
|
|
defer cancel()
|
|
|
|
// Create an http.Client
|
|
|
|
client, err := ca.BootstrapClient(ctx, token)
|
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
resp, err := client.Get("https://localhost:8443")
|
|
|
|
```
|
|
|
|
|
2018-11-14 09:06:34 +00:00
|
|
|
We will demonstrate the mTLS configuration in a different example. In this
|
|
|
|
examplefor we will configure the server to only verify client certificates
|
|
|
|
if they are provided.
|
|
|
|
|
|
|
|
To being with let's start the Step CA:
|
2018-11-08 00:07:35 +00:00
|
|
|
|
2018-11-07 01:16:33 +00:00
|
|
|
```sh
|
2018-11-03 01:55:13 +00:00
|
|
|
certificates $ bin/step-ca examples/pki/config/ca.json
|
|
|
|
2018/11/02 18:29:25 Serving HTTPS on :9000 ...
|
|
|
|
```
|
|
|
|
|
2018-11-21 21:29:18 +00:00
|
|
|
Next we will start the bootstrap-tls-server and enter `password` prompted for the
|
2018-11-03 01:55:13 +00:00
|
|
|
provisioner password:
|
2018-11-14 09:06:34 +00:00
|
|
|
|
2018-11-07 01:16:33 +00:00
|
|
|
```sh
|
2018-11-06 02:04:12 +00:00
|
|
|
certificates $ export STEPPATH=examples/pki
|
2018-11-03 01:55:13 +00:00
|
|
|
certificates $ export STEP_CA_URL=https://localhost:9000
|
2018-11-21 21:29:18 +00:00
|
|
|
certificates $ go run examples/bootstrap-tls-server/server.go $(step ca token localhost)
|
2018-11-03 01:55:13 +00:00
|
|
|
✔ Key ID: DmAtZt2EhmZr_iTJJ387fr4Md2NbzMXGdXQNW1UWPXk (mariano@smallstep.com)
|
|
|
|
Please enter the password to decrypt the provisioner key:
|
|
|
|
Listening on :8443 ...
|
|
|
|
```
|
|
|
|
|
2018-11-14 09:06:34 +00:00
|
|
|
Let's try to cURL our new bootstrap server with the system certificates bundle
|
|
|
|
as our root. It should fail.
|
2018-11-03 01:55:13 +00:00
|
|
|
```
|
|
|
|
certificates $ curl https://localhost:8443
|
|
|
|
curl: (60) SSL certificate problem: unable to get local issuer certificate
|
|
|
|
More details here: https://curl.haxx.se/docs/sslcerts.html
|
|
|
|
|
|
|
|
curl performs SSL certificate verification by default, using a "bundle"
|
|
|
|
of Certificate Authority (CA) public keys (CA certs). If the default
|
|
|
|
bundle file isn't adequate, you can specify an alternate file
|
|
|
|
using the --cacert option.
|
|
|
|
If this HTTPS server uses a certificate signed by a CA represented in
|
|
|
|
the bundle, the certificate verification probably failed due to a
|
|
|
|
problem with the certificate (it might be expired, or the name might
|
|
|
|
not match the domain name in the URL).
|
|
|
|
If you'd like to turn off curl's verification of the certificate, use
|
|
|
|
the -k (or --insecure) option.
|
|
|
|
HTTPS-proxy has similar options --proxy-cacert and --proxy-insecure.
|
|
|
|
```
|
|
|
|
|
2018-11-14 09:06:34 +00:00
|
|
|
Now lets use the root certificate generated for the Step PKI. It should work.
|
|
|
|
|
2018-11-07 01:16:33 +00:00
|
|
|
```sh
|
2018-11-03 01:55:13 +00:00
|
|
|
certificates $ curl --cacert examples/pki/secrets/root_ca.crt https://localhost:8443
|
|
|
|
Hello nobody at 2018-11-03 01:49:25.66912 +0000 UTC!!!
|
|
|
|
```
|
|
|
|
|
2018-11-14 09:06:34 +00:00
|
|
|
Notice that in the response we see `nobody`. This is because the server did not
|
2018-11-03 01:55:13 +00:00
|
|
|
detected a TLS client configuration.
|
|
|
|
|
2018-11-14 09:06:34 +00:00
|
|
|
But if we create a client with it's own certificate (generated by the Step CA),
|
|
|
|
we should see the Common Name of the client certificate:
|
|
|
|
|
2018-11-07 01:16:33 +00:00
|
|
|
```sh
|
2018-11-06 02:04:12 +00:00
|
|
|
certificates $ export STEPPATH=examples/pki
|
2018-11-03 01:55:13 +00:00
|
|
|
certificates $ export STEP_CA_URL=https://localhost:9000
|
2018-11-07 02:03:48 +00:00
|
|
|
certificates $ go run examples/bootstrap-client/client.go $(step ca token Mike)
|
2018-11-03 01:55:13 +00:00
|
|
|
✔ Key ID: DmAtZt2EhmZr_iTJJ387fr4Md2NbzMXGdXQNW1UWPXk (mariano@smallstep.com)
|
|
|
|
Please enter the password to decrypt the provisioner key:
|
|
|
|
Server responded: Hello Mike at 2018-11-03 01:52:52.678215 +0000 UTC!!!
|
|
|
|
Server responded: Hello Mike at 2018-11-03 01:52:53.681563 +0000 UTC!!!
|
|
|
|
Server responded: Hello Mike at 2018-11-03 01:52:54.682787 +0000 UTC!!!
|
|
|
|
...
|
2018-11-06 21:36:24 +00:00
|
|
|
```
|
|
|
|
|
2018-11-08 00:07:35 +00:00
|
|
|
## Bootstrap mTLS Client & Server
|
|
|
|
|
2018-11-14 09:06:34 +00:00
|
|
|
This example demonstrates a stricter configuration of the bootstrap-server. Here
|
|
|
|
we configure the server to require mTLS (mutual TLS) with a valid client certificate.
|
|
|
|
|
|
|
|
As always, we begin by starting the CA:
|
2018-11-08 00:07:35 +00:00
|
|
|
|
|
|
|
```sh
|
|
|
|
certificates $ bin/step-ca examples/pki/config/ca.json
|
|
|
|
2018/11/02 18:29:25 Serving HTTPS on :9000 ...
|
|
|
|
```
|
|
|
|
|
2018-11-14 09:06:34 +00:00
|
|
|
Next we start the mTLS server and we enter `password` when prompted for the
|
2018-11-08 00:07:35 +00:00
|
|
|
provisioner password:
|
2018-11-14 09:06:34 +00:00
|
|
|
|
2018-11-08 00:07:35 +00:00
|
|
|
```sh
|
|
|
|
certificates $ export STEPPATH=examples/pki
|
|
|
|
certificates $ export STEP_CA_URL=https://localhost:9000
|
|
|
|
certificates $ go run examples/bootstrap-mtls-server/server.go $(step ca token localhost)
|
|
|
|
✔ Key ID: DmAtZt2EhmZr_iTJJ387fr4Md2NbzMXGdXQNW1UWPXk (mariano@smallstep.com)
|
|
|
|
Please enter the password to decrypt the provisioner key:
|
|
|
|
Listening on :8443 ...
|
|
|
|
```
|
|
|
|
|
2018-11-14 09:06:34 +00:00
|
|
|
Now that the server is configured to require mTLS cURL-ing should fail even
|
|
|
|
if we use the correct root certificate bundle.
|
|
|
|
|
2018-11-08 00:07:35 +00:00
|
|
|
```sh
|
|
|
|
certificates $ curl --cacert examples/pki/secrets/root_ca.crt https://localhost:8443
|
|
|
|
curl: (35) error:1401E412:SSL routines:CONNECT_CR_FINISHED:sslv3 alert bad certificate
|
|
|
|
```
|
|
|
|
|
2018-11-14 09:06:34 +00:00
|
|
|
However, if we use our client (which requests a certificate from the Step CA
|
|
|
|
when it starts):
|
|
|
|
|
2018-11-08 00:07:35 +00:00
|
|
|
```sh
|
|
|
|
certificates $ export STEPPATH=examples/pki
|
|
|
|
certificates $ export STEP_CA_URL=https://localhost:9000
|
|
|
|
certificates $ go run examples/bootstrap-client/client.go $(step ca token Mike)
|
|
|
|
✔ Key ID: DmAtZt2EhmZr_iTJJ387fr4Md2NbzMXGdXQNW1UWPXk (mariano@smallstep.com)
|
|
|
|
Please enter the password to decrypt the provisioner key:
|
|
|
|
Server responded: Hello Mike at 2018-11-07 21:54:00.140022 +0000 UTC!!!
|
|
|
|
Server responded: Hello Mike at 2018-11-07 21:54:01.140827 +0000 UTC!!!
|
|
|
|
Server responded: Hello Mike at 2018-11-07 21:54:02.141578 +0000 UTC!!!
|
|
|
|
...
|
|
|
|
```
|
|
|
|
|
2018-11-06 21:36:24 +00:00
|
|
|
## Certificate rotation
|
|
|
|
|
2018-11-14 09:06:34 +00:00
|
|
|
We can use the bootstrap-server to demonstrate certificate rotation. We've
|
|
|
|
added a second provisioner, named `mike@smallstep.com`, to the CA configuration.
|
|
|
|
This provisioner is has a default certificate duration of 2 minutes.
|
|
|
|
Let's run the server, and inspect the certificate. We can should be able to
|
|
|
|
see the certificate rotate once approximately 2/3rds of it's lifespan has passed.
|
2018-11-06 21:36:24 +00:00
|
|
|
|
2018-11-07 01:16:33 +00:00
|
|
|
```sh
|
2018-11-06 21:36:24 +00:00
|
|
|
certificates $ export STEPPATH=examples/pki
|
|
|
|
certificates $ export STEP_CA_URL=https://localhost:9000
|
2018-11-08 00:07:35 +00:00
|
|
|
certificates $ go run examples/bootstrap-server/server.go $(step ca token localhost)
|
2018-11-06 21:36:24 +00:00
|
|
|
✔ Key ID: YYNxZ0rq0WsT2MlqLCWvgme3jszkmt99KjoGEJJwAKs (mike@smallstep.com)
|
|
|
|
Please enter the password to decrypt the provisioner key:
|
|
|
|
Listening on :8443 ...
|
|
|
|
```
|
|
|
|
|
2018-11-14 09:06:34 +00:00
|
|
|
In this case, the certificate will rotate after 74-80 seconds.
|
|
|
|
The exact formula is `<duration>-<duration>/3-rand(<duration>/20)` (`duration=120`
|
|
|
|
in our example).
|
2018-11-06 21:36:24 +00:00
|
|
|
|
|
|
|
We can use the following command to check the certificate expiration and to make
|
|
|
|
sure the certificate changes after 74-80 seconds.
|
|
|
|
|
2018-11-07 01:16:33 +00:00
|
|
|
```sh
|
2018-11-06 21:36:24 +00:00
|
|
|
certificates $ step certificate inspect --insecure https://localhost:8443
|
2018-11-06 23:24:46 +00:00
|
|
|
```
|
2018-11-10 02:17:51 +00:00
|
|
|
|
|
|
|
## NGINX with Step CA certificates
|
|
|
|
|
2018-11-14 09:06:34 +00:00
|
|
|
The example under the `docker` directory shows how to combine the Step CA
|
|
|
|
with NGINX to serve or proxy services using certificates created by the
|
|
|
|
Step CA.
|
2018-11-10 02:17:51 +00:00
|
|
|
|
|
|
|
This example creates 3 different docker images:
|
|
|
|
|
|
|
|
* nginx-test: docker image with NGINX and a script using inotify-tools to watch
|
|
|
|
for changes in the certificate to reload NGINX.
|
2018-11-14 09:06:34 +00:00
|
|
|
* step-ca-test: docker image with the Step CA
|
|
|
|
* step-renewer-test: docker image with the step cli tool - it creates the
|
|
|
|
certificate and sets a cron that renews the certificate (the cron
|
|
|
|
runs every minute for testing purposes).
|
2018-11-10 02:17:51 +00:00
|
|
|
|
2018-11-14 09:06:34 +00:00
|
|
|
To run this test you need to have the docker daemon running. With docker running
|
|
|
|
swith to the `examples/docker directory` and run `make`:
|
2018-11-10 02:17:51 +00:00
|
|
|
|
2018-11-12 19:46:07 +00:00
|
|
|
```
|
2018-11-10 02:17:51 +00:00
|
|
|
certificates $ cd examples/docker/
|
|
|
|
docker $ make
|
2018-11-12 19:46:07 +00:00
|
|
|
GOOS=linux go build -o ca/step-ca github.com/smallstep/certificates/cmd/step-ca
|
|
|
|
GOOS=linux go build -o renewer/step github.com/smallstep/cli/cmd/step
|
|
|
|
docker build -t nginx-test:latest nginx
|
|
|
|
...
|
|
|
|
docker-compose up
|
|
|
|
WARNING: The Docker Engine you're using is running in swarm mode.
|
|
|
|
|
|
|
|
Compose does not use swarm mode to deploy services to multiple nodes in a swarm. All containers will be scheduled on the current node.
|
|
|
|
|
|
|
|
To deploy your application across the swarm, use `docker stack deploy`.
|
|
|
|
|
|
|
|
Creating network "docker_default" with the default driver
|
|
|
|
Creating docker_ca_1 ... done
|
|
|
|
Creating docker_renewer_1 ... done
|
|
|
|
Creating docker_nginx_1 ... done
|
|
|
|
Attaching to docker_ca_1, docker_renewer_1, docker_nginx_1
|
|
|
|
ca_1 | 2018/11/12 19:39:16 Serving HTTPS on :443 ...
|
|
|
|
nginx_1 | Setting up watches.
|
|
|
|
nginx_1 | Watches established.
|
|
|
|
...
|
2018-11-10 02:17:51 +00:00
|
|
|
```
|
|
|
|
|
2018-11-12 19:46:07 +00:00
|
|
|
Make will build the binaries for step and step-ca, create the images, create the
|
|
|
|
containers and start them using docker composer.
|
2018-11-10 02:17:51 +00:00
|
|
|
|
|
|
|
NGINX will be listening on your local machine on https://localhost:4443, but to
|
|
|
|
make sure the cert is right we need to add the following entry to `/etc/hosts`:
|
|
|
|
|
|
|
|
```
|
|
|
|
127.0.0.1 nginx
|
|
|
|
```
|
|
|
|
|
2018-11-14 09:06:34 +00:00
|
|
|
Now we can use cURL to verify:
|
2018-11-10 02:17:51 +00:00
|
|
|
|
|
|
|
```sh
|
|
|
|
docker $ curl --cacert ca/pki/secrets/root_ca.crt https://nginx:4443/
|
|
|
|
<!DOCTYPE html>
|
|
|
|
<html>
|
|
|
|
<head>
|
|
|
|
<title>Welcome to nginx!</title>
|
|
|
|
<style>
|
|
|
|
body {
|
|
|
|
width: 35em;
|
|
|
|
margin: 0 auto;
|
|
|
|
font-family: Tahoma, Verdana, Arial, sans-serif;
|
|
|
|
}
|
|
|
|
</style>
|
|
|
|
</head>
|
|
|
|
<body>
|
|
|
|
<h1>Welcome to nginx!</h1>
|
|
|
|
<p>If you see this page, the nginx web server is successfully installed and
|
|
|
|
working. Further configuration is required.</p>
|
|
|
|
|
|
|
|
<p>For online documentation and support please refer to
|
|
|
|
<a href="http://nginx.org/">nginx.org</a>.<br/>
|
|
|
|
Commercial support is available at
|
|
|
|
<a href="http://nginx.com/">nginx.com</a>.</p>
|
|
|
|
|
|
|
|
<p><em>Thank you for using nginx.</em></p>
|
|
|
|
</body>
|
|
|
|
</html>
|
|
|
|
```
|
|
|
|
|
2018-11-14 09:06:34 +00:00
|
|
|
We can use `make inspect` to witness the certificate being rotated every minute.
|
2018-11-10 02:17:51 +00:00
|
|
|
|
|
|
|
```sh
|
2018-11-12 19:46:07 +00:00
|
|
|
docker $ make inspect | head
|
2018-11-10 02:17:51 +00:00
|
|
|
step certificate inspect https://localhost:4443 --insecure
|
|
|
|
Certificate:
|
|
|
|
Data:
|
|
|
|
Version: 3 (0x2)
|
|
|
|
Serial Number: 220353801925419530569669982276277771655 (0xa5c6993a7e110e6f009c83c79edc1d87)
|
|
|
|
Signature Algorithm: ECDSA-SHA256
|
|
|
|
Issuer: CN=Smallstep Intermediate CA
|
|
|
|
Validity
|
|
|
|
Not Before: Nov 10 02:13:00 2018 UTC
|
|
|
|
Not After : Nov 11 02:13:00 2018 UTC
|
2018-11-12 19:46:07 +00:00
|
|
|
docker $ make inspect | head
|
2018-11-10 02:17:51 +00:00
|
|
|
step certificate inspect https://localhost:4443 --insecure
|
|
|
|
Certificate:
|
|
|
|
Data:
|
|
|
|
Version: 3 (0x2)
|
|
|
|
Serial Number: 207756171799719353821615361892302471392 (0x9c4c621c04d3e8be401ff0d14c5440e0)
|
|
|
|
Signature Algorithm: ECDSA-SHA256
|
|
|
|
Issuer: CN=Smallstep Intermediate CA
|
|
|
|
Validity
|
|
|
|
Not Before: Nov 10 02:14:00 2018 UTC
|
|
|
|
Not After : Nov 11 02:14:00 2018 UTC
|
|
|
|
```
|
|
|
|
|
2018-11-14 09:06:34 +00:00
|
|
|
Finally, to cleanup the containers and volumes created in this demo use `make down`:
|
2018-11-10 02:17:51 +00:00
|
|
|
|
|
|
|
```sh
|
2018-11-12 19:46:07 +00:00
|
|
|
docker $ make down
|
|
|
|
docker-compose down
|
|
|
|
Stopping docker_nginx_1 ... done
|
|
|
|
Stopping docker_renewer_1 ... done
|
|
|
|
Stopping docker_ca_1 ... done
|
|
|
|
Removing docker_nginx_1 ... done
|
|
|
|
Removing docker_renewer_1 ... done
|
|
|
|
Removing docker_ca_1 ... done
|
|
|
|
Removing network docker_default
|
2018-11-10 02:17:51 +00:00
|
|
|
```
|
2018-11-27 02:00:12 +00:00
|
|
|
|
|
|
|
## Configuration Management Tools
|
|
|
|
|
|
|
|
Configuration management tools such as Puppet, Chef, Ansible, Salt, etc. make
|
|
|
|
automation and deployment a whole lot easier and more manageable. Step CLI and
|
|
|
|
CA are built with automation in mind and are easy to configure using your
|
|
|
|
favorite tools
|
|
|
|
|
|
|
|
# Puppet
|
|
|
|
|
|
|
|
The following are snippets and files that users can add to their puppet
|
|
|
|
manifests to easily instrument services with TLS.
|
|
|
|
|
|
|
|
** [step.pp](./puppet/step.pp) ** - Install `step` from source and configure the `step` user, group,
|
|
|
|
and home directory for use by the Step CLI and CA.
|
|
|
|
** [step_ca.pp](./puppet/step_ca.pp) ** - Install `step-ca` from source. Configure
|
|
|
|
certificates and secrets and run the Step CA.
|
|
|
|
** [tls_server.pp](./puppet/tls_server.pp) ** - This is your service, instrumented
|
|
|
|
with the Step CA SDK to request, receive, and renew TLS certificates. See
|
|
|
|
[the bootstrap-tls-server](./bootstrap-tls-server/server.go) for a
|
|
|
|
simple integration example.
|
|
|
|
|
|
|
|
**Note:** This is a significantly oversimplified example that will not work standalone.
|
|
|
|
A complete Puppet configuration should use a service manager (like
|
|
|
|
[systemctl](https://www.digitalocean.com/community/tutorials/how-to-use-systemctl-to-manage-systemd-services-and-units))
|
|
|
|
and a secret store (like [Hiera](https://puppet.com/docs/puppet/6.0/hiera_intro.html)).
|
|
|
|
If you are interested in seeing a more complete example please let us know and we'll
|
|
|
|
make one available.
|
|
|
|
|