feature(entrypoint): generate self-signed certificate

- generate via specific invocation
- auto-generate if SSL and no mounted certificate found
- allow specifying hostname for certificate
This commit is contained in:
Asif Bacchus 2021-07-23 17:19:58 -06:00
parent e8d238f3c3
commit c48e985d23
4 changed files with 77 additions and 7 deletions

View File

@ -5,11 +5,14 @@ ARG NODE_VERSION=16
ARG ALPINE_VERSION=3.14
FROM node:${NODE_VERSION}-alpine${ALPINE_VERSION}
# create new node user with set id from build-arg
# create new node user with set id from build-arg and create volume directories
ARG NODE_UID=9999
RUN deluser --remove-home node \
&& addgroup -g ${NODE_UID} -S node \
&& adduser -G node -S -u ${NODE_UID} node
&& adduser -G node -S -u ${NODE_UID} node \
&& mkdir /watch /certs \
&& chown root:node /certs \
&& chmod 770 /certs
# create default volumes in-case user forgets, expose default port
VOLUME [ "/watch", "/certs" ]
@ -40,6 +43,7 @@ ENV LR_EXCLUDE=".git/,.svn/,.vscode/,.idea/"
ENV LR_DELAY=500
ENV LR_DEBUG=true
ENV LR_HTTPS=true
ENV CERT_HOSTNAME=""
# install livereload npm as node user then switch back to root user
USER node
@ -51,11 +55,13 @@ RUN mkdir -p .npm-global/bin .npm-global/lib \
# copy scripts and fix-up all permissions
USER root
COPY [ "selfsigned.cnf", "/etc/selfsigned.cnf" ]
COPY [ "livereload.js", "/home/node/livereload.js" ]
COPY [ "entrypoint.sh", "/usr/local/bin/entrypoint.sh" ]
RUN chown node:node /home/node/livereload.js \
&& chmod 644 /home/node/livereload.js \
&& chmod 755 /usr/local/bin/entrypoint.sh
&& chmod 755 /usr/local/bin/entrypoint.sh \
&& chmod 644 /etc/selfsigned.cnf
# switch to node user, run entrypoint script by default
USER node

View File

@ -6,10 +6,26 @@
# functions
certificateGenerateNew() {
certificateCheckEnabled
# generate self-signed certificate
printf "\nGenerating new self-signed certificate:\n"
printf "Exporting new certificate:\n"
exit 0
# shellcheck disable=SC3028
if [ -z "$CERT_HOSTNAME" ]; then export CERT_HOSTNAME="$HOSTNAME"; fi
if ! openssl req -new -x509 -days 365 -nodes -out /certs/fullchain.pem -keyout /certs/privkey.pem -config /etc/selfsigned.cnf; then
printf "\nUnable to generate certificate. Is your 'certs' directory writable by this container?\n\n"
exit 55
fi
printf "Exporting pfx certificate..."
if ! openssl pkcs12 -export -in /certs/fullchain.pem -inkey /certs/privkey.pem -out "/certs/${CERT_HOSTNAME}.pfx" -name "LiveReload" -passout pass:cert1234; then
printf "\nUnable to export generated certificate as PFX.\n\n"
exit 56
fi
# print message to user
printf "\n\nA self-signed certificate has been generated and saved in the location mounted to '/certs' in this container.\n"
printf "The certificate and private key are PEM formatted with names 'fullchain.pem' and 'privkey.pem', respectively.\n"
printf "If you need to import them to a Windows machine, please use the '%s.pfx' file with password 'cert1234'.\n\n" "$CERT_HOSTNAME"
if [ "$1" != "noexit" ]; then exit 0; fi
}
certificateShow() {
@ -25,7 +41,6 @@ certificateExport() {
}
certificateCheckEnabled() {
httpsEnabled="$(convertCaseUpper "$LR_HTTPS")"
if [ "$httpsEnabled" != "TRUE" ]; then
printf "\nSSL/TLS not enabled. Please set LR_HTTPS=TRUE if you want to enable SSL/TLS.\n"
exit 1
@ -42,6 +57,7 @@ doCertNew=0
doCertShow=0
doServer=0
doShell=0
httpsEnabled="$(convertCaseUpper "$LR_HTTPS")"
# process action parameter
case "$1" in
@ -70,6 +86,29 @@ esac
# action: run server
if [ "$doServer" -eq 1 ]; then
printf "Starting LiveReload server:\n"
# https pre-flight check
if [ "$httpsEnabled" = "TRUE" ]; then
printf "[SSL/TLS mode enabled]\n"
if [ -n "$(find /certs/ -type d -empty -print)" ]; then
printf "[Generating certificate]\n"
# certs directory is empty --> auto-generate certificates
certificateGenerateNew 'noexit'
else
# certs directory contains certificates --> check if they can read
printf "[Checking mounted certificate]\n"
if ! [ -r "/certs/fullchain.pem" ]; then
printf "\nERROR: SSL/TLS mode selected but unable to read certificate!\n\n"
exit 51
fi
if ! [ -r "/certs/privkey.pem" ]; then
printf "\nERROR: SSL/TLS mode selected but unable to read private key!\n\n"
exit 52
fi
fi
printf "[Certificate OK]\n"
fi
exec node livereload.js
exit "$?"
fi
@ -102,6 +141,7 @@ exit 99
# exit codes:
# 0: normal exit, no errors
# 1: invalid or invalid parameter passed to script
# 2: interactive shell required
# 50: certificate errors
# 51: unable to read certificate/chain
# 52: unable to read private key

16
build/selfsigned.cnf Normal file
View File

@ -0,0 +1,16 @@
default_bits = 4096
default_md = sha256
distinguished_name = dn
req_extensions = san
x509_extensions = san
prompt = no
[dn]
organizationName = LiveReload WebServer
CN = ${ENV::CERT_HOSTNAME}
[san]
subjectAltName = @alt_names
[alt_names]
DNS.1 = ${ENV::CERT_HOSTNAME}

View File

@ -93,4 +93,12 @@
# VALID OPTIONS: true, false
#LR_HTTPS=true
# CERT_HOSTNAME:
# Hostname to use if container is auto-generating a self-signed certificate.
# REQUIRED: NO
# DEFAULT: $HOSTNAME
# VALID OPTIONS: Any valid hostname
#CERT_HOSTNAME=$HOSTNAME
#EOF