All the stuff for the web key
Signed-off-by: Martyn Ranyard <m@rtyn.berlin>
This commit is contained in:
parent
6f5b2f6298
commit
85f61bcc03
Binary file not shown.
|
@ -0,0 +1 @@
|
|||
../hu
|
|
@ -0,0 +1,3 @@
|
|||
FROM nginx:1-alpine
|
||||
|
||||
ADD .well-known /usr/share/nginx/html/.well-known
|
|
@ -0,0 +1,22 @@
|
|||
# Patterns to ignore when building packages.
|
||||
# This supports shell glob matching, relative path matching, and
|
||||
# negation (prefixed with !). Only one pattern per line.
|
||||
.DS_Store
|
||||
# Common VCS dirs
|
||||
.git/
|
||||
.gitignore
|
||||
.bzr/
|
||||
.bzrignore
|
||||
.hg/
|
||||
.hgignore
|
||||
.svn/
|
||||
# Common backup files
|
||||
*.swp
|
||||
*.bak
|
||||
*.tmp
|
||||
*~
|
||||
# Various IDEs
|
||||
.project
|
||||
.idea/
|
||||
*.tmproj
|
||||
.vscode/
|
|
@ -0,0 +1,5 @@
|
|||
apiVersion: v1
|
||||
appVersion: "1.0"
|
||||
description: A Helm chart for Kubernetes
|
||||
name: wkd4pgp
|
||||
version: 0.1.0
|
|
@ -0,0 +1,21 @@
|
|||
1. Get the application URL by running these commands:
|
||||
{{- if .Values.ingress.enabled }}
|
||||
{{- range $host := .Values.ingress.hosts }}
|
||||
{{- range .paths }}
|
||||
http{{ if $.Values.ingress.tls }}s{{ end }}://{{ $host.host }}{{ . }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- else if contains "NodePort" .Values.service.type }}
|
||||
export NODE_PORT=$(kubectl get --namespace {{ .Release.Namespace }} -o jsonpath="{.spec.ports[0].nodePort}" services {{ include "wkd4pgp.fullname" . }})
|
||||
export NODE_IP=$(kubectl get nodes --namespace {{ .Release.Namespace }} -o jsonpath="{.items[0].status.addresses[0].address}")
|
||||
echo http://$NODE_IP:$NODE_PORT
|
||||
{{- else if contains "LoadBalancer" .Values.service.type }}
|
||||
NOTE: It may take a few minutes for the LoadBalancer IP to be available.
|
||||
You can watch the status of by running 'kubectl get --namespace {{ .Release.Namespace }} svc -w {{ include "wkd4pgp.fullname" . }}'
|
||||
export SERVICE_IP=$(kubectl get svc --namespace {{ .Release.Namespace }} {{ include "wkd4pgp.fullname" . }} --template "{{"{{ range (index .status.loadBalancer.ingress 0) }}{{.}}{{ end }}"}}")
|
||||
echo http://$SERVICE_IP:{{ .Values.service.port }}
|
||||
{{- else if contains "ClusterIP" .Values.service.type }}
|
||||
export POD_NAME=$(kubectl get pods --namespace {{ .Release.Namespace }} -l "app.kubernetes.io/name={{ include "wkd4pgp.name" . }},app.kubernetes.io/instance={{ .Release.Name }}" -o jsonpath="{.items[0].metadata.name}")
|
||||
echo "Visit http://127.0.0.1:8080 to use your application"
|
||||
kubectl port-forward $POD_NAME 8080:80
|
||||
{{- end }}
|
|
@ -0,0 +1,56 @@
|
|||
{{/* vim: set filetype=mustache: */}}
|
||||
{{/*
|
||||
Expand the name of the chart.
|
||||
*/}}
|
||||
{{- define "wkd4pgp.name" -}}
|
||||
{{- default .Chart.Name .Values.nameOverride | trunc 63 | trimSuffix "-" -}}
|
||||
{{- end -}}
|
||||
|
||||
{{/*
|
||||
Create a default fully qualified app name.
|
||||
We truncate at 63 chars because some Kubernetes name fields are limited to this (by the DNS naming spec).
|
||||
If release name contains chart name it will be used as a full name.
|
||||
*/}}
|
||||
{{- define "wkd4pgp.fullname" -}}
|
||||
{{- if .Values.fullnameOverride -}}
|
||||
{{- .Values.fullnameOverride | trunc 63 | trimSuffix "-" -}}
|
||||
{{- else -}}
|
||||
{{- $name := default .Chart.Name .Values.nameOverride -}}
|
||||
{{- if contains $name .Release.Name -}}
|
||||
{{- .Release.Name | trunc 63 | trimSuffix "-" -}}
|
||||
{{- else -}}
|
||||
{{- printf "%s-%s" .Release.Name $name | trunc 63 | trimSuffix "-" -}}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
|
||||
{{/*
|
||||
Create chart name and version as used by the chart label.
|
||||
*/}}
|
||||
{{- define "wkd4pgp.chart" -}}
|
||||
{{- printf "%s-%s" .Chart.Name .Chart.Version | replace "+" "_" | trunc 63 | trimSuffix "-" -}}
|
||||
{{- end -}}
|
||||
|
||||
{{/*
|
||||
Common labels
|
||||
*/}}
|
||||
{{- define "wkd4pgp.labels" -}}
|
||||
app.kubernetes.io/name: {{ include "wkd4pgp.name" . }}
|
||||
helm.sh/chart: {{ include "wkd4pgp.chart" . }}
|
||||
app.kubernetes.io/instance: {{ .Release.Name }}
|
||||
{{- if .Chart.AppVersion }}
|
||||
app.kubernetes.io/version: {{ .Chart.AppVersion | quote }}
|
||||
{{- end }}
|
||||
app.kubernetes.io/managed-by: {{ .Release.Service }}
|
||||
{{- end -}}
|
||||
|
||||
{{/*
|
||||
Create the name of the service account to use
|
||||
*/}}
|
||||
{{- define "wkd4pgp.serviceAccountName" -}}
|
||||
{{- if .Values.serviceAccount.create -}}
|
||||
{{ default (include "wkd4pgp.fullname" .) .Values.serviceAccount.name }}
|
||||
{{- else -}}
|
||||
{{ default "default" .Values.serviceAccount.name }}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
|
@ -0,0 +1,57 @@
|
|||
apiVersion: apps/v1
|
||||
kind: Deployment
|
||||
metadata:
|
||||
name: {{ include "wkd4pgp.fullname" . }}
|
||||
labels:
|
||||
{{ include "wkd4pgp.labels" . | indent 4 }}
|
||||
spec:
|
||||
replicas: {{ .Values.replicaCount }}
|
||||
selector:
|
||||
matchLabels:
|
||||
app.kubernetes.io/name: {{ include "wkd4pgp.name" . }}
|
||||
app.kubernetes.io/instance: {{ .Release.Name }}
|
||||
template:
|
||||
metadata:
|
||||
labels:
|
||||
app.kubernetes.io/name: {{ include "wkd4pgp.name" . }}
|
||||
app.kubernetes.io/instance: {{ .Release.Name }}
|
||||
spec:
|
||||
{{- with .Values.imagePullSecrets }}
|
||||
imagePullSecrets:
|
||||
{{- toYaml . | nindent 8 }}
|
||||
{{- end }}
|
||||
serviceAccountName: {{ template "wkd4pgp.serviceAccountName" . }}
|
||||
securityContext:
|
||||
{{- toYaml .Values.podSecurityContext | nindent 8 }}
|
||||
containers:
|
||||
- name: {{ .Chart.Name }}
|
||||
securityContext:
|
||||
{{- toYaml .Values.securityContext | nindent 12 }}
|
||||
image: "{{ .Values.image.repository }}:{{ .Values.image.tag }}"
|
||||
imagePullPolicy: {{ .Values.image.pullPolicy }}
|
||||
ports:
|
||||
- name: http
|
||||
containerPort: 80
|
||||
protocol: TCP
|
||||
livenessProbe:
|
||||
httpGet:
|
||||
path: /
|
||||
port: http
|
||||
readinessProbe:
|
||||
httpGet:
|
||||
path: /
|
||||
port: http
|
||||
resources:
|
||||
{{- toYaml .Values.resources | nindent 12 }}
|
||||
{{- with .Values.nodeSelector }}
|
||||
nodeSelector:
|
||||
{{- toYaml . | nindent 8 }}
|
||||
{{- end }}
|
||||
{{- with .Values.affinity }}
|
||||
affinity:
|
||||
{{- toYaml . | nindent 8 }}
|
||||
{{- end }}
|
||||
{{- with .Values.tolerations }}
|
||||
tolerations:
|
||||
{{- toYaml . | nindent 8 }}
|
||||
{{- end }}
|
|
@ -0,0 +1,41 @@
|
|||
{{- if .Values.ingress.enabled -}}
|
||||
{{- $fullName := include "wkd4pgp.fullname" . -}}
|
||||
{{- $svcPort := .Values.service.port -}}
|
||||
{{- if semverCompare ">=1.14-0" .Capabilities.KubeVersion.GitVersion -}}
|
||||
apiVersion: networking.k8s.io/v1beta1
|
||||
{{- else -}}
|
||||
apiVersion: extensions/v1beta1
|
||||
{{- end }}
|
||||
kind: Ingress
|
||||
metadata:
|
||||
name: {{ $fullName }}
|
||||
labels:
|
||||
{{ include "wkd4pgp.labels" . | indent 4 }}
|
||||
{{- with .Values.ingress.annotations }}
|
||||
annotations:
|
||||
{{- toYaml . | nindent 4 }}
|
||||
{{- end }}
|
||||
spec:
|
||||
{{- if .Values.ingress.tls }}
|
||||
tls:
|
||||
{{- range .Values.ingress.tls }}
|
||||
- hosts:
|
||||
{{- range .hosts }}
|
||||
- {{ . | quote }}
|
||||
{{- end }}
|
||||
secretName: {{ .secretName }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
rules:
|
||||
{{- range .Values.ingress.hosts }}
|
||||
- host: {{ .host | quote }}
|
||||
http:
|
||||
paths:
|
||||
{{- range .paths }}
|
||||
- path: {{ . }}
|
||||
backend:
|
||||
serviceName: {{ $fullName }}
|
||||
servicePort: {{ $svcPort }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- end }}
|
|
@ -0,0 +1,16 @@
|
|||
apiVersion: v1
|
||||
kind: Service
|
||||
metadata:
|
||||
name: {{ include "wkd4pgp.fullname" . }}
|
||||
labels:
|
||||
{{ include "wkd4pgp.labels" . | indent 4 }}
|
||||
spec:
|
||||
type: {{ .Values.service.type }}
|
||||
ports:
|
||||
- port: {{ .Values.service.port }}
|
||||
targetPort: http
|
||||
protocol: TCP
|
||||
name: http
|
||||
selector:
|
||||
app.kubernetes.io/name: {{ include "wkd4pgp.name" . }}
|
||||
app.kubernetes.io/instance: {{ .Release.Name }}
|
|
@ -0,0 +1,8 @@
|
|||
{{- if .Values.serviceAccount.create -}}
|
||||
apiVersion: v1
|
||||
kind: ServiceAccount
|
||||
metadata:
|
||||
name: {{ template "wkd4pgp.serviceAccountName" . }}
|
||||
labels:
|
||||
{{ include "wkd4pgp.labels" . | indent 4 }}
|
||||
{{- end -}}
|
|
@ -0,0 +1,15 @@
|
|||
apiVersion: v1
|
||||
kind: Pod
|
||||
metadata:
|
||||
name: "{{ include "wkd4pgp.fullname" . }}-test-connection"
|
||||
labels:
|
||||
{{ include "wkd4pgp.labels" . | indent 4 }}
|
||||
annotations:
|
||||
"helm.sh/hook": test-success
|
||||
spec:
|
||||
containers:
|
||||
- name: wget
|
||||
image: busybox
|
||||
command: ['wget']
|
||||
args: ['{{ include "wkd4pgp.fullname" . }}:{{ .Values.service.port }}']
|
||||
restartPolicy: Never
|
|
@ -0,0 +1,74 @@
|
|||
# Default values for wkd4pgp.
|
||||
# This is a YAML-formatted file.
|
||||
# Declare variables to be passed into your templates.
|
||||
|
||||
replicaCount: 1
|
||||
|
||||
image:
|
||||
repository: imartyn/wkd4pgp
|
||||
tag: 0.1
|
||||
pullPolicy: IfNotPresent
|
||||
|
||||
imagePullSecrets: []
|
||||
nameOverride: ""
|
||||
fullnameOverride: ""
|
||||
|
||||
serviceAccount:
|
||||
# Specifies whether a service account should be created
|
||||
create: true
|
||||
# The name of the service account to use.
|
||||
# If not set and create is true, a name is generated using the fullname template
|
||||
name:
|
||||
|
||||
podSecurityContext: {}
|
||||
# fsGroup: 2000
|
||||
|
||||
securityContext: {}
|
||||
# capabilities:
|
||||
# drop:
|
||||
# - ALL
|
||||
# readOnlyRootFilesystem: true
|
||||
# runAsNonRoot: true
|
||||
# runAsUser: 1000
|
||||
|
||||
service:
|
||||
type: ClusterIP
|
||||
port: 80
|
||||
|
||||
ingress:
|
||||
enabled: true
|
||||
annotations:
|
||||
cert-manager.io/cluster-issuer: letsencrypt
|
||||
nginx.ingress.kubernetes.io/enable-cors: "true"
|
||||
nginx.ingress.kubernetes.io/cors-allow-origin: "*"
|
||||
hosts:
|
||||
- host: rtyn.berlin
|
||||
paths:
|
||||
- /.well-known/openpgpkey/
|
||||
- host: openpgpkey.rtyn.berlin
|
||||
paths:
|
||||
- /.well-known/openpgpkey/
|
||||
|
||||
tls:
|
||||
- secretName: chart-example-tls
|
||||
hosts:
|
||||
- rtyn.berlin
|
||||
- openpgpkey.rtyn.berlin
|
||||
|
||||
resources: {}
|
||||
# We usually recommend not to specify default resources and to leave this as a conscious
|
||||
# choice for the user. This also increases chances charts run on environments with little
|
||||
# resources, such as Minikube. If you do want to specify resources, uncomment the following
|
||||
# lines, adjust them as necessary, and remove the curly braces after 'resources:'.
|
||||
# limits:
|
||||
# cpu: 100m
|
||||
# memory: 128Mi
|
||||
# requests:
|
||||
# cpu: 100m
|
||||
# memory: 128Mi
|
||||
|
||||
nodeSelector: {}
|
||||
|
||||
tolerations: []
|
||||
|
||||
affinity: {}
|
|
@ -0,0 +1,146 @@
|
|||
#!/usr/bin/python3
|
||||
#
|
||||
# generate-openpgpkey-hu-3
|
||||
# Copyright 2017, W. Martin Borgert <debacle@debian.org>
|
||||
# License: GPL-3+
|
||||
#
|
||||
# This script has the same purpose as generate-openpgpkey-hu by Thomas
|
||||
# Arendsen Hein and Andre Heinecke of Intevation GmbH, but:
|
||||
# - is Python 3 instead of Python 2
|
||||
# - uses python-gnupg instead of python-pyme (removed from Debian)
|
||||
# - is licensed GPL-3+ (like GnuPG) or later instead of GPL-2+
|
||||
# - uses encode_zbase32 function by Tocho Tochev
|
||||
# - is PEP8 clean :~)
|
||||
|
||||
import argparse
|
||||
import email.utils
|
||||
import functools
|
||||
import hashlib
|
||||
import itertools
|
||||
import logging
|
||||
import os
|
||||
import sys
|
||||
|
||||
try:
|
||||
import gnupg
|
||||
except ImportError:
|
||||
gnupg = None
|
||||
|
||||
|
||||
def getargs():
|
||||
ap = argparse.ArgumentParser(
|
||||
description='generate contents of https://.../.well-known/openpgpkey/'
|
||||
+ 'hu/ for OpenPGP Web Key Directory (WKD) from GnuPG keyring',
|
||||
formatter_class=argparse.ArgumentDefaultsHelpFormatter)
|
||||
ap.add_argument('-a', '--address', action='append',
|
||||
help='specific email address, more than one possible')
|
||||
ap.add_argument('-d', '--debug', action='store_true',
|
||||
help='print debug output')
|
||||
ap.add_argument('-e', '--exist-ok', action='store_true',
|
||||
help='accept, if target directory already exists')
|
||||
ap.add_argument('-k', '--keyring',
|
||||
help='keyring to parse (or use default GnuPG keyring)')
|
||||
ap.add_argument('-m', '--mail-domain',
|
||||
help='mail domain to filter keys')
|
||||
ap.add_argument('-o', '--output-dir', default="hu",
|
||||
help='directory to write keys')
|
||||
ap.add_argument('-x', '--include-expired', action='store_true',
|
||||
help='include expired keys')
|
||||
return ap.parse_args()
|
||||
|
||||
|
||||
# Source: https://gist.githubusercontent.com/tochev/99f19d9ce062f1c7e203
|
||||
# /raw/0077ec38adc350e0fd1207e6a525de482b40df7e/zbase32.py
|
||||
# Copyright: Tocho Tochev <tocho AT tochev DOT net>
|
||||
# Licence: MIT
|
||||
# See http://philzimmermann.com/docs/human-oriented-base-32-encoding.txt
|
||||
def encode_zbase32(bs):
|
||||
"""
|
||||
Encode bytes bs using zbase32 encoding.
|
||||
Returns: bytearray
|
||||
|
||||
>>> encode_zbase32(b'\\xd4z\\x04') == b'4t7ye'
|
||||
True
|
||||
"""
|
||||
ALPTHABET = b"ybndrfg8ejkmcpqxot1uwisza345h769"
|
||||
result = bytearray()
|
||||
for word in itertools.zip_longest(*([iter(bs)] * 5)):
|
||||
padding_count = word.count(None)
|
||||
n = functools.reduce(lambda x, y: (x << 8) + (y or 0), word, 0)
|
||||
for i in range(0, (40 - 8 * padding_count), 5):
|
||||
result.append(ALPTHABET[(n >> (35 - i)) & 0x1F])
|
||||
return result
|
||||
|
||||
|
||||
def localpart2zbase32(s):
|
||||
"""transforms local part to lower case, SHA1s it, and encodes zbase32
|
||||
|
||||
See https://tools.ietf.org/id/draft-koch-openpgp-webkey-service-01.html
|
||||
|
||||
>>> localpart2zbase32('Joe.Doe')
|
||||
'iy9q119eutrkn8s1mk4r39qejnbu3n5q'
|
||||
"""
|
||||
return encode_zbase32(
|
||||
hashlib.sha1(s.lower().encode("utf-8")).digest()).decode("utf-8")
|
||||
|
||||
|
||||
class HU:
|
||||
def __init__(self, debug, keyring, output_dir):
|
||||
try:
|
||||
os.makedirs(output_dir, exist_ok=args.exist_ok)
|
||||
except FileExistsError:
|
||||
print("Output directory " + output_dir
|
||||
+ " already exists, exiting!", file=sys.stderr)
|
||||
sys.exit(1)
|
||||
|
||||
if debug:
|
||||
gnupg.logger.setLevel(logging.DEBUG)
|
||||
gnupg.logger.addHandler(logging.StreamHandler())
|
||||
|
||||
self.debug = debug
|
||||
self.gpg = gnupg.GPG(gpgbinary="/usr/bin/gpg2",keyring=keyring)
|
||||
self.output_dir = output_dir
|
||||
|
||||
def get_fps(self, mail_domain, include_expired, addresses):
|
||||
"""return dict of localpart: fingerprint"""
|
||||
fps = {}
|
||||
|
||||
for key in self.gpg.list_keys():
|
||||
for uid in key.get('uids', []):
|
||||
addr = email.utils.parseaddr(uid)[1]
|
||||
if '@' not in addr:
|
||||
continue
|
||||
local, domain = addr.split("@", 1)
|
||||
# trust: 'd' = disabled, 'e' = expired, 'r' = revoked
|
||||
if mail_domain and domain.lower() != mail_domain.lower() \
|
||||
or key['trust'] in ['d', 'r'] \
|
||||
or not include_expired and key['trust'] == 'e' \
|
||||
or addresses and addr not in addresses:
|
||||
continue
|
||||
if local in fps and fps[local] != key['fingerprint']:
|
||||
print("Multiple options for %s! None used." % local,
|
||||
file=sys.stderr)
|
||||
del fps[local]
|
||||
else:
|
||||
fps[local] = key['fingerprint']
|
||||
|
||||
return fps
|
||||
|
||||
def write_keys(self, fps):
|
||||
for local, fingerprint in fps.items():
|
||||
with open(os.path.join(self.output_dir,
|
||||
localpart2zbase32(local)), "wb") as f:
|
||||
f.write(self.gpg.export_keys(fingerprint, armor=False))
|
||||
print("Wrote %d keys to directory '%s'" % (len(fps), self.output_dir))
|
||||
|
||||
|
||||
if __name__ == "__main__":
|
||||
args = getargs()
|
||||
|
||||
if gnupg is None:
|
||||
print("Please 'apt install python3-gnupg'!", file=sys.stderr)
|
||||
sys.exit(1)
|
||||
|
||||
hu = HU(args.debug, args.keyring, args.output_dir)
|
||||
fps = hu.get_fps(args.mail_domain, args.include_expired, args.address)
|
||||
hu.write_keys(fps)
|
Loading…
Reference in New Issue