2020-02-11 06:47:55 +01:00
|
|
|
import os
|
|
|
|
import logging
|
|
|
|
from pathlib import Path
|
|
|
|
from shutil import copytree, rmtree
|
|
|
|
|
|
|
|
from g import internal_tls_dir, DEFAULT_GID, DEFAULT_UID, PG_GID, PG_UID
|
2020-02-14 14:11:52 +01:00
|
|
|
from utils.misc import check_permission, owner_can_read, get_realpath
|
2020-02-11 06:47:55 +01:00
|
|
|
|
|
|
|
|
|
|
|
class InternalTLS:
|
|
|
|
|
|
|
|
harbor_certs_filename = {
|
|
|
|
'harbor_internal_ca.crt',
|
|
|
|
'proxy.crt', 'proxy.key',
|
|
|
|
'core.crt', 'core.key',
|
|
|
|
'job_service.crt', 'job_service.key',
|
|
|
|
'registryctl.crt', 'registryctl.key',
|
2020-04-28 07:17:24 +02:00
|
|
|
'registry.crt', 'registry.key',
|
|
|
|
'portal.crt', 'portal.key'
|
2020-02-11 06:47:55 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
clair_certs_filename = {
|
|
|
|
'clair_adapter.crt', 'clair_adapter.key',
|
|
|
|
'clair.crt', 'clair.key'
|
|
|
|
}
|
|
|
|
|
2020-03-16 16:20:05 +01:00
|
|
|
trivy_certs_filename = {
|
|
|
|
'trivy_adapter.crt', 'trivy_adapter.key',
|
|
|
|
}
|
|
|
|
|
2020-02-11 06:47:55 +01:00
|
|
|
notary_certs_filename = {
|
|
|
|
'notary_signer.crt', 'notary_signer.key',
|
|
|
|
'notary_server.crt', 'notary_server.key'
|
|
|
|
}
|
|
|
|
|
|
|
|
chart_museum_filename = {
|
|
|
|
'chartmuseum.crt',
|
|
|
|
'chartmuseum.key'
|
|
|
|
}
|
|
|
|
|
|
|
|
db_certs_filename = {
|
|
|
|
'harbor_db.crt', 'harbor_db.key'
|
|
|
|
}
|
|
|
|
|
2020-03-16 16:20:05 +01:00
|
|
|
def __init__(self, tls_enabled=False, verify_client_cert=False, tls_dir='', data_volume='', **kwargs):
|
2020-02-11 06:47:55 +01:00
|
|
|
self.data_volume = data_volume
|
2020-03-16 16:20:05 +01:00
|
|
|
self.verify_client_cert = verify_client_cert
|
|
|
|
self.enabled = tls_enabled
|
|
|
|
self.tls_dir = tls_dir
|
|
|
|
if self.enabled:
|
2020-02-11 06:47:55 +01:00
|
|
|
self.required_filenames = self.harbor_certs_filename
|
|
|
|
if kwargs.get('with_clair'):
|
|
|
|
self.required_filenames.update(self.clair_certs_filename)
|
|
|
|
if kwargs.get('with_notary'):
|
|
|
|
self.required_filenames.update(self.notary_certs_filename)
|
|
|
|
if kwargs.get('with_chartmuseum'):
|
|
|
|
self.required_filenames.update(self.chart_museum_filename)
|
2020-03-17 10:30:25 +01:00
|
|
|
if kwargs.get('with_trivy'):
|
|
|
|
self.required_filenames.update(self.trivy_certs_filename)
|
2020-02-11 06:47:55 +01:00
|
|
|
if not kwargs.get('external_database'):
|
|
|
|
self.required_filenames.update(self.db_certs_filename)
|
|
|
|
|
|
|
|
def __getattribute__(self, name: str):
|
|
|
|
"""
|
|
|
|
Make the call like 'internal_tls.core_crt_path' possible
|
|
|
|
"""
|
|
|
|
# only handle when enabled tls and name ends with 'path'
|
|
|
|
if name.endswith('_path'):
|
|
|
|
if not (self.enabled):
|
|
|
|
return object.__getattribute__(self, name)
|
|
|
|
|
|
|
|
name_parts = name.split('_')
|
|
|
|
if len(name_parts) < 3:
|
|
|
|
return object.__getattribute__(self, name)
|
|
|
|
|
|
|
|
filename = '{}.{}'.format('_'.join(name_parts[:-2]), name_parts[-2])
|
|
|
|
|
|
|
|
if filename in self.required_filenames:
|
|
|
|
return os.path.join(self.data_volume, 'secret', 'tls', filename)
|
|
|
|
|
|
|
|
return object.__getattribute__(self, name)
|
|
|
|
|
|
|
|
def _check(self, filename: str):
|
|
|
|
"""
|
|
|
|
Check the permission of cert and key is correct
|
|
|
|
"""
|
|
|
|
|
|
|
|
path = Path(os.path.join(internal_tls_dir, filename))
|
|
|
|
|
|
|
|
if not path.exists:
|
|
|
|
if filename == 'harbor_internal_ca.crt':
|
|
|
|
return
|
|
|
|
raise Exception('File {} not exist'.format(filename))
|
|
|
|
|
|
|
|
if not path.is_file:
|
|
|
|
raise Exception('invalid {}'.format(filename))
|
|
|
|
|
|
|
|
# check key file permission
|
|
|
|
if filename.endswith('.key') and not check_permission(path, mode=0o600):
|
|
|
|
raise Exception('key file {} permission is not 600'.format(filename))
|
|
|
|
|
|
|
|
# check owner can read cert file
|
|
|
|
if filename.endswith('.crt') and not owner_can_read(path.stat().st_mode):
|
|
|
|
raise Exception('File {} should readable by owner'.format(filename))
|
|
|
|
|
|
|
|
def validate(self) -> bool:
|
|
|
|
if not self.enabled:
|
|
|
|
return True
|
|
|
|
|
|
|
|
if not internal_tls_dir.exists():
|
|
|
|
raise Exception('Internal dir for tls {} not exist'.format(internal_tls_dir))
|
|
|
|
|
|
|
|
for filename in self.required_filenames:
|
|
|
|
self._check(filename)
|
|
|
|
|
|
|
|
return True
|
|
|
|
|
|
|
|
def prepare(self):
|
|
|
|
"""
|
|
|
|
Prepare moves certs in tls file to data volume with correct permission.
|
|
|
|
"""
|
|
|
|
if not self.enabled:
|
|
|
|
logging.info('internal tls NOT enabled...')
|
|
|
|
return
|
|
|
|
original_tls_dir = get_realpath(self.tls_dir)
|
2020-02-11 07:39:19 +01:00
|
|
|
if internal_tls_dir.exists():
|
|
|
|
rmtree(internal_tls_dir)
|
2020-02-11 06:47:55 +01:00
|
|
|
copytree(original_tls_dir, internal_tls_dir, symlinks=True)
|
|
|
|
|
|
|
|
for file in internal_tls_dir.iterdir():
|
|
|
|
if file.name.endswith('.key'):
|
|
|
|
file.chmod(0o600)
|
|
|
|
elif file.name.endswith('.crt'):
|
|
|
|
file.chmod(0o644)
|
|
|
|
|
|
|
|
if file.name in self.db_certs_filename:
|
|
|
|
os.chown(file, PG_UID, PG_GID)
|
|
|
|
else:
|
|
|
|
os.chown(file, DEFAULT_UID, DEFAULT_GID)
|
|
|
|
|
|
|
|
|