update repo
This commit is contained in:
@@ -6,4 +6,4 @@ scrapers:
|
|||||||
sinks:
|
sinks:
|
||||||
sink1:
|
sink1:
|
||||||
url: http://tasks.warp10:8080/api/v0/update
|
url: http://tasks.warp10:8080/api/v0/update
|
||||||
token: WARP10_TOKEN
|
token: token
|
||||||
|
3
beets/Dockerfile
Normal file
3
beets/Dockerfile
Normal file
@@ -0,0 +1,3 @@
|
|||||||
|
FROM linuxserver/beets
|
||||||
|
RUN pip install --upgrade pip
|
||||||
|
RUN pip install --upgrade https://github.com/beetbox/audioread/archive/master.zip
|
@@ -11,14 +11,21 @@ services:
|
|||||||
- PGID=1000
|
- PGID=1000
|
||||||
- DB_TYPE=postgres
|
- DB_TYPE=postgres
|
||||||
- DB_HOST=db:5432
|
- DB_HOST=db:5432
|
||||||
- DB_NAME=xxx
|
- DB_NAME=gitea
|
||||||
- DB_USER=xxx
|
- DB_USER=user
|
||||||
- DB_PASSWD=xxx
|
- DB_PASSWD=pwd
|
||||||
volumes:
|
volumes:
|
||||||
- gitea_data:/data
|
- gitea_data:/data
|
||||||
ports:
|
ports:
|
||||||
- "10022:22"
|
- "10022:22"
|
||||||
deploy:
|
deploy:
|
||||||
|
resources:
|
||||||
|
limits:
|
||||||
|
cpus: '0.5'
|
||||||
|
memory: 350M
|
||||||
|
reservations:
|
||||||
|
cpus: '0.1'
|
||||||
|
memory: 100M
|
||||||
labels:
|
labels:
|
||||||
- "traefik.port=3000"
|
- "traefik.port=3000"
|
||||||
- "traefik.frontend.rule=Host:git.cloud.arnaud-pc.fr"
|
- "traefik.frontend.rule=Host:git.cloud.arnaud-pc.fr"
|
||||||
@@ -34,11 +41,19 @@ services:
|
|||||||
db:
|
db:
|
||||||
image: postgres:latest
|
image: postgres:latest
|
||||||
environment:
|
environment:
|
||||||
- POSTGRES_USER=xxx
|
- POSTGRES_USER=user
|
||||||
- POSTGRES_PASSWORD=xxx
|
- POSTGRES_PASSWORD=pwd
|
||||||
- POSTGRES_DB=xxx
|
- POSTGRES_DB=gitea
|
||||||
volumes:
|
volumes:
|
||||||
- postgres_gitea_data:/var/lib/postgresql/data
|
- postgres_gitea_data:/var/lib/postgresql/data
|
||||||
|
deploy:
|
||||||
|
resources:
|
||||||
|
limits:
|
||||||
|
cpus: '0.5'
|
||||||
|
memory: 200M
|
||||||
|
reservations:
|
||||||
|
cpus: '0.1'
|
||||||
|
memory: 50M
|
||||||
networks:
|
networks:
|
||||||
- gitea
|
- gitea
|
||||||
|
|
76
guacamole/docker-compose.yml
Normal file
76
guacamole/docker-compose.yml
Normal file
@@ -0,0 +1,76 @@
|
|||||||
|
version: '3'
|
||||||
|
|
||||||
|
services:
|
||||||
|
web:
|
||||||
|
image: guacamole/guacamole:latest
|
||||||
|
depends_on:
|
||||||
|
- db
|
||||||
|
- guacd
|
||||||
|
environment:
|
||||||
|
- POSTGRES_HOSTNAME=db
|
||||||
|
- POSTGRES_DATABASE=guacamole_db
|
||||||
|
- POSTGRES_USER=user
|
||||||
|
- POSTGRES_PASSWORD=pwd
|
||||||
|
- GUACD_HOSTNAME=guacd
|
||||||
|
deploy:
|
||||||
|
resources:
|
||||||
|
limits:
|
||||||
|
cpus: '0.5'
|
||||||
|
memory: 1G
|
||||||
|
reservations:
|
||||||
|
cpus: '0.25'
|
||||||
|
memory: 500M
|
||||||
|
labels:
|
||||||
|
- "traefik.port=8080"
|
||||||
|
- "traefik.frontend.rule=Host:guacamole.admin.arnaud-pc.fr;PathPrefix:/guacamole"
|
||||||
|
- "traefik.docker.network=dmz"
|
||||||
|
- "traefik.passHostHeader=true"
|
||||||
|
- "traefik.backend.loadbalancer.swarm=true"
|
||||||
|
- "traefik.backend.loadbalancer.method=drr"
|
||||||
|
- "traefik.enable=true"
|
||||||
|
networks:
|
||||||
|
- dmz
|
||||||
|
- guacamole
|
||||||
|
|
||||||
|
guacd:
|
||||||
|
image: guacamole/guacd:latest
|
||||||
|
deploy:
|
||||||
|
resources:
|
||||||
|
limits:
|
||||||
|
cpus: '0.5'
|
||||||
|
memory: 200M
|
||||||
|
reservations:
|
||||||
|
cpus: '0.1'
|
||||||
|
memory: 50M
|
||||||
|
networks:
|
||||||
|
- guacamole
|
||||||
|
|
||||||
|
db:
|
||||||
|
image: postgres:latest
|
||||||
|
environment:
|
||||||
|
- POSTGRES_USER=user
|
||||||
|
- POSTGRES_PASSWORD=pwd
|
||||||
|
- POSTGRES_DB=guacamole_db
|
||||||
|
volumes:
|
||||||
|
- postgres_data:/var/lib/postgresql/data
|
||||||
|
deploy:
|
||||||
|
resources:
|
||||||
|
limits:
|
||||||
|
cpus: '0.5'
|
||||||
|
memory: 200M
|
||||||
|
reservations:
|
||||||
|
cpus: '0.1'
|
||||||
|
memory: 50M
|
||||||
|
networks:
|
||||||
|
- guacamole
|
||||||
|
|
||||||
|
networks:
|
||||||
|
guacamole:
|
||||||
|
driver: overlay
|
||||||
|
dmz:
|
||||||
|
external:
|
||||||
|
name: dmz
|
||||||
|
|
||||||
|
volumes:
|
||||||
|
postgres_data:
|
||||||
|
driver: convoy
|
2
heimdall/Dockerfile
Normal file
2
heimdall/Dockerfile
Normal file
@@ -0,0 +1,2 @@
|
|||||||
|
FROM linuxserver/heimdall
|
||||||
|
RUN apk add php7-pdo php7-pdo_pgsql
|
98
heimdall/docker-compose.yml
Normal file
98
heimdall/docker-compose.yml
Normal file
@@ -0,0 +1,98 @@
|
|||||||
|
version: '3'
|
||||||
|
|
||||||
|
services:
|
||||||
|
web:
|
||||||
|
image: ministicraft/heimdall
|
||||||
|
depends_on:
|
||||||
|
- db
|
||||||
|
environment:
|
||||||
|
- TZ=Europe/Paris
|
||||||
|
- PUID=1000
|
||||||
|
- PGID=1000
|
||||||
|
- DB_CONNECTION=pgsql
|
||||||
|
- DB_HOST=db
|
||||||
|
- DB_DATABASE=heimdall
|
||||||
|
- DB_USERNAME=user
|
||||||
|
- DB_PASSWORD=pwd
|
||||||
|
- APP_URL=https://www.arnaud-pc.fr
|
||||||
|
- FORCE_HTTPS=true
|
||||||
|
- APP_DEBUG=true
|
||||||
|
volumes:
|
||||||
|
- heimdall_config:/config
|
||||||
|
deploy:
|
||||||
|
resources:
|
||||||
|
limits:
|
||||||
|
cpus: '0.5'
|
||||||
|
memory: 200M
|
||||||
|
reservations:
|
||||||
|
cpus: '0.1'
|
||||||
|
memory: 50M
|
||||||
|
networks:
|
||||||
|
- dmz
|
||||||
|
- heimdall
|
||||||
|
|
||||||
|
db:
|
||||||
|
image: postgres:latest
|
||||||
|
environment:
|
||||||
|
- POSTGRES_USER=user
|
||||||
|
- POSTGRES_PASSWORD=pwd
|
||||||
|
- POSTGRES_DB=heimdall
|
||||||
|
volumes:
|
||||||
|
- postgres_data:/var/lib/postgresql/data
|
||||||
|
deploy:
|
||||||
|
resources:
|
||||||
|
limits:
|
||||||
|
cpus: '0.5'
|
||||||
|
memory: 200M
|
||||||
|
reservations:
|
||||||
|
cpus: '0.1'
|
||||||
|
memory: 50M
|
||||||
|
networks:
|
||||||
|
- heimdall
|
||||||
|
|
||||||
|
gatekeeper:
|
||||||
|
image: keycloak/keycloak-gatekeeper
|
||||||
|
networks:
|
||||||
|
- heimdall
|
||||||
|
- dmz
|
||||||
|
command: |
|
||||||
|
--discovery-url=https://auth.arnaud-pc.fr/auth/realms/cloud
|
||||||
|
--client-id=heimdall_proxy
|
||||||
|
--client-secret=secret
|
||||||
|
--listen=:3000
|
||||||
|
--redirection-url=https://www.arnaud-pc.fr
|
||||||
|
--enable-refresh-tokens=true
|
||||||
|
--encryption-key=key
|
||||||
|
--upstream-url=https://web:443
|
||||||
|
--enable-default-deny=true
|
||||||
|
--resources="uri=/*"
|
||||||
|
--skip-upstream-tls-verify=true
|
||||||
|
deploy:
|
||||||
|
resources:
|
||||||
|
limits:
|
||||||
|
cpus: '0.25'
|
||||||
|
memory: 50M
|
||||||
|
reservations:
|
||||||
|
cpus: '0.1'
|
||||||
|
memory: 10M
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.frontend.rule=Host:www.arnaud-pc.fr"
|
||||||
|
- "traefik.port=3000"
|
||||||
|
- "traefik.docker.network=dmz"
|
||||||
|
- "traefik.backend.loadbalancer.swarm=true"
|
||||||
|
|
||||||
|
networks:
|
||||||
|
heimdall:
|
||||||
|
driver: overlay
|
||||||
|
dmz:
|
||||||
|
external:
|
||||||
|
name: dmz
|
||||||
|
|
||||||
|
volumes:
|
||||||
|
heimdall_config:
|
||||||
|
driver: convoy
|
||||||
|
postgres_data:
|
||||||
|
driver: convoy
|
||||||
|
nginx:
|
||||||
|
driver: convoy
|
92
keycloack/docker-compose.yml
Normal file
92
keycloack/docker-compose.yml
Normal file
@@ -0,0 +1,92 @@
|
|||||||
|
version: '3'
|
||||||
|
|
||||||
|
services:
|
||||||
|
keycloack:
|
||||||
|
image: jboss/keycloak
|
||||||
|
depends_on:
|
||||||
|
- db
|
||||||
|
environment:
|
||||||
|
- TZ=Europe/Paris
|
||||||
|
- PUID=1000
|
||||||
|
- PGID=1000
|
||||||
|
- DB_VENDOR=postgres
|
||||||
|
- DB_ADDR=db
|
||||||
|
- DB_PORT=5432
|
||||||
|
- DB_DATABASE=keycloack
|
||||||
|
- DB_USER=user
|
||||||
|
- DB_PASSWORD=pwd
|
||||||
|
- PROXY_ADDRESS_FORWARDING=true
|
||||||
|
volumes:
|
||||||
|
- config:/opt/jboss/keycloak/standalone/configuration/
|
||||||
|
networks:
|
||||||
|
- dmz
|
||||||
|
- keycloack
|
||||||
|
deploy:
|
||||||
|
resources:
|
||||||
|
limits:
|
||||||
|
cpus: '0.5'
|
||||||
|
memory: 1G
|
||||||
|
reservations:
|
||||||
|
cpus: '0.1'
|
||||||
|
memory: 500M
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.frontend.rule=Host:auth.arnaud-pc.fr"
|
||||||
|
- "traefik.port=8080"
|
||||||
|
- "traefik.docker.network=dmz"
|
||||||
|
- "traefik.protocol=http"
|
||||||
|
- "traefik.backend.loadbalancer.swarm=true"
|
||||||
|
db:
|
||||||
|
image: postgres:latest
|
||||||
|
environment:
|
||||||
|
- POSTGRES_USER=user
|
||||||
|
- POSTGRES_PASSWORD=keycloack
|
||||||
|
- POSTGRES_DB=pwd
|
||||||
|
volumes:
|
||||||
|
- postgres_data:/var/lib/postgresql/data
|
||||||
|
deploy:
|
||||||
|
resources:
|
||||||
|
limits:
|
||||||
|
cpus: '0.5'
|
||||||
|
memory: 200M
|
||||||
|
reservations:
|
||||||
|
cpus: '0.1'
|
||||||
|
memory: 50M
|
||||||
|
networks:
|
||||||
|
- keycloack
|
||||||
|
|
||||||
|
adminer:
|
||||||
|
image: adminer
|
||||||
|
networks:
|
||||||
|
- keycloack
|
||||||
|
- dmz
|
||||||
|
deploy:
|
||||||
|
mode: replicated
|
||||||
|
replicas: 0
|
||||||
|
resources:
|
||||||
|
limits:
|
||||||
|
cpus: '0.5'
|
||||||
|
memory: 200M
|
||||||
|
reservations:
|
||||||
|
cpus: '0.1'
|
||||||
|
memory: 50M
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=false"
|
||||||
|
- "traefik.frontend.rule=Host:auth.arnaud-pc.fr"
|
||||||
|
- "traefik.port=8080"
|
||||||
|
- "traefik.docker.network=dmz"
|
||||||
|
- "traefik.protocol=http"
|
||||||
|
- "traefik.backend.loadbalancer.swarm=true"
|
||||||
|
|
||||||
|
networks:
|
||||||
|
keycloack:
|
||||||
|
driver: overlay
|
||||||
|
dmz:
|
||||||
|
external:
|
||||||
|
name: dmz
|
||||||
|
|
||||||
|
volumes:
|
||||||
|
config:
|
||||||
|
driver: convoy
|
||||||
|
postgres_data:
|
||||||
|
driver: convoy
|
112
monitoring/docker-compose.yml
Normal file
112
monitoring/docker-compose.yml
Normal file
@@ -0,0 +1,112 @@
|
|||||||
|
version: '3.5'
|
||||||
|
|
||||||
|
services:
|
||||||
|
beamium:
|
||||||
|
image: ministicraft/beamium
|
||||||
|
command: beamium -c /etc/beamium/scraper.yml
|
||||||
|
networks:
|
||||||
|
- monitoring
|
||||||
|
configs:
|
||||||
|
- source: beamium_monitoring_conf
|
||||||
|
target: /etc/beamium/scraper.yml
|
||||||
|
deploy:
|
||||||
|
mode: replicated
|
||||||
|
replicas: 0
|
||||||
|
|
||||||
|
cadvisor:
|
||||||
|
image: google/cadvisor
|
||||||
|
volumes:
|
||||||
|
- /var/run/docker.sock:/var/lib/docker.sock:ro
|
||||||
|
- /:/rootfs:ro
|
||||||
|
- /var/run:/var/run:ro
|
||||||
|
- /sys:/sys:ro
|
||||||
|
- /var/lib/docker/:/var/lib/docker:ro
|
||||||
|
networks:
|
||||||
|
- monitoring
|
||||||
|
- dmz
|
||||||
|
deploy:
|
||||||
|
mode: replicated
|
||||||
|
replicas: 0
|
||||||
|
labels:
|
||||||
|
- "traefik.quantum.frontend.rule=Host:warp10.monitoring.arnaud-pc.fr"
|
||||||
|
- "traefik.quantum.port=8080"
|
||||||
|
- "traefik.quantum.docker.network=dmz"
|
||||||
|
- "traefik.quantum.passHostHeader=true"
|
||||||
|
- "traefik.backend.loadbalancer.swarm=true"
|
||||||
|
- "traefik.backend.loadbalancer.method=drr"
|
||||||
|
- "traefik.enable=true"
|
||||||
|
placement:
|
||||||
|
constraints: [node.platform.os == linux]
|
||||||
|
resources:
|
||||||
|
limits:
|
||||||
|
memory: 128M
|
||||||
|
|
||||||
|
warp10:
|
||||||
|
image: warp10io/warp10
|
||||||
|
volumes:
|
||||||
|
- /var/warp10:/data
|
||||||
|
networks:
|
||||||
|
- monitoring
|
||||||
|
- dmz
|
||||||
|
deploy:
|
||||||
|
mode: replicated
|
||||||
|
replicas: 0
|
||||||
|
labels:
|
||||||
|
- "traefik.quantum.frontend.auth.basic.usersFile=/etc/traefik/.htpasswd"
|
||||||
|
- "traefik.quantum.frontend.rule=Host:warp10.monitoring.arnaud-pc.fr"
|
||||||
|
- "traefik.quantum.port=8081"
|
||||||
|
- "traefik.quantum.docker.network=dmz"
|
||||||
|
- "traefik.quantum.passHostHeader=true"
|
||||||
|
- "traefik.warp10.frontend.rule=Host:warp10.monitoring.arnaud-pc.fr;PathPrefix:/api"
|
||||||
|
- "traefik.warp10.port=8080"
|
||||||
|
- "traefik.warp10.docker.network=dmz"
|
||||||
|
- "traefik.frontend.headers.customRequestHeaders=accept-encoding: identity"
|
||||||
|
- "traefik.backend.loadbalancer.swarm=true"
|
||||||
|
- "traefik.backend.loadbalancer.method=drr"
|
||||||
|
- "traefik.enable=false"
|
||||||
|
placement:
|
||||||
|
constraints:
|
||||||
|
- node.labels.nas == true
|
||||||
|
|
||||||
|
grafana:
|
||||||
|
image: grafana/grafana
|
||||||
|
user: 1000:1000
|
||||||
|
networks:
|
||||||
|
- monitoring
|
||||||
|
- dmz
|
||||||
|
volumes:
|
||||||
|
- grafana:/var/lib/grafana
|
||||||
|
deploy:
|
||||||
|
mode: replicated
|
||||||
|
replicas: 0
|
||||||
|
placement:
|
||||||
|
constraints:
|
||||||
|
- node.role == manager
|
||||||
|
resources:
|
||||||
|
limits:
|
||||||
|
memory: 128M
|
||||||
|
reservations:
|
||||||
|
memory: 64M
|
||||||
|
labels:
|
||||||
|
# - "traefik.frontend.auth.basic.usersFile=/etc/traefik/.htpasswd"
|
||||||
|
- "traefik.frontend.rule=Host:grafana.monitoring.arnaud-pc.fr"
|
||||||
|
- "traefik.port=3000"
|
||||||
|
- "traefik.docker.network=dmz"
|
||||||
|
- "traefik.passHostHeader=true"
|
||||||
|
- "traefik.backend.loadbalancer.swarm=true"
|
||||||
|
- "traefik.backend.loadbalancer.method=drr"
|
||||||
|
- "traefik.enable=false"
|
||||||
|
|
||||||
|
networks:
|
||||||
|
monitoring:
|
||||||
|
driver: overlay
|
||||||
|
dmz:
|
||||||
|
external: true
|
||||||
|
|
||||||
|
configs:
|
||||||
|
beamium_monitoring_conf:
|
||||||
|
file: ./beamium/monitoring.yml
|
||||||
|
|
||||||
|
volumes:
|
||||||
|
grafana:
|
||||||
|
driver: convoy
|
@@ -1,61 +0,0 @@
|
|||||||
version: '3.5'
|
|
||||||
|
|
||||||
services:
|
|
||||||
beamium:
|
|
||||||
image: ministicraft/beamium
|
|
||||||
command: beamium -c /etc/beamium/scraper.yml
|
|
||||||
networks:
|
|
||||||
- monitoring
|
|
||||||
configs:
|
|
||||||
- source: beamium_monitoring_conf
|
|
||||||
target: /etc/beamium/scraper.yml
|
|
||||||
deploy:
|
|
||||||
mode: replicated
|
|
||||||
replicas: 1
|
|
||||||
|
|
||||||
cadvisor:
|
|
||||||
image: google/cadvisor
|
|
||||||
volumes:
|
|
||||||
- /var/run/docker.sock:/var/lib/docker.sock:ro
|
|
||||||
- /:/rootfs:ro
|
|
||||||
- /var/run:/var/run:ro
|
|
||||||
- /sys:/sys:ro
|
|
||||||
- /var/lib/docker/:/var/lib/docker:ro
|
|
||||||
networks:
|
|
||||||
- monitoring
|
|
||||||
deploy:
|
|
||||||
mode: global
|
|
||||||
placement:
|
|
||||||
constraints: [node.platform.os == linux]
|
|
||||||
|
|
||||||
warp10:
|
|
||||||
image: warp10io/warp10
|
|
||||||
volumes:
|
|
||||||
- /var/warp10:/data
|
|
||||||
networks:
|
|
||||||
- monitoring
|
|
||||||
- dmz
|
|
||||||
deploy:
|
|
||||||
mode: replicated
|
|
||||||
replicas: 1
|
|
||||||
labels:
|
|
||||||
- "traefik.frontend.rule=Host:warp10.cloud.arnaud-pc.fr"
|
|
||||||
- "traefik.port=8081"
|
|
||||||
- "traefik.docker.network=dmz"
|
|
||||||
- "traefik.passHostHeader=true"
|
|
||||||
- "traefik.backend.loadbalancer.swarm=true"
|
|
||||||
- "traefik.backend.loadbalancer.method=drr"
|
|
||||||
- "traefik.enable=true"
|
|
||||||
placement:
|
|
||||||
constraints:
|
|
||||||
- node.labels.nas == true
|
|
||||||
|
|
||||||
networks:
|
|
||||||
monitoring:
|
|
||||||
driver: overlay
|
|
||||||
dmz:
|
|
||||||
external: true
|
|
||||||
|
|
||||||
configs:
|
|
||||||
beamium_monitoring_conf:
|
|
||||||
file: ./beamium/monitoring.yml
|
|
@@ -2,17 +2,22 @@ version: '3'
|
|||||||
|
|
||||||
services:
|
services:
|
||||||
web:
|
web:
|
||||||
image: nextcloud
|
image: ministicraft/nextcloud:stable
|
||||||
depends_on:
|
depends_on:
|
||||||
- db
|
- db
|
||||||
environment:
|
environment:
|
||||||
- POSTGRES_DB=xxx
|
- "POSTGRES_DB=nextcloud"
|
||||||
- POSTGRES_USER=xxx
|
- "POSTGRES_USER=user"
|
||||||
- POSTGRES_PASSWORD=xxx
|
- "POSTGRES_PASSWORD=pwd"
|
||||||
- POSTGRES_HOST=db
|
- "POSTGRES_HOST=db"
|
||||||
volumes:
|
volumes:
|
||||||
- /storage/:/data/
|
- /storage/plex/:/data/Plex
|
||||||
- nextcloud_data:/var/www/html/data/
|
- /storage/download/:/data/download
|
||||||
|
- /storage/Upload/:/data/Upload
|
||||||
|
- /storage/Games/:/data/Games
|
||||||
|
- /storage/MusicLossy/:/data/Music_lossy
|
||||||
|
- /storage/syncthing/:/data/syncthing
|
||||||
|
- /storage/cloud/:/var/www/html/data/
|
||||||
- nextcloud_config:/var/www/html/config
|
- nextcloud_config:/var/www/html/config
|
||||||
networks:
|
networks:
|
||||||
- dmz
|
- dmz
|
||||||
@@ -22,12 +27,20 @@ services:
|
|||||||
replicas: 1
|
replicas: 1
|
||||||
placement:
|
placement:
|
||||||
constraints: [node.role == manager]
|
constraints: [node.role == manager]
|
||||||
|
resources:
|
||||||
|
limits:
|
||||||
|
cpus: '1.0'
|
||||||
|
memory: 1G
|
||||||
|
reservations:
|
||||||
|
cpus: '0.1'
|
||||||
|
memory: 100M
|
||||||
labels:
|
labels:
|
||||||
- "traefik.frontend.rule=Host:nextcloud.cloud.arnaud-pc.fr,cloud.arnaud-pc.fr"
|
- "traefik.frontend.rule=Host:nextcloud.cloud.arnaud-pc.fr,cloud.arnaud-pc.fr"
|
||||||
- "traefik.port=80"
|
- "traefik.port=80"
|
||||||
- "traefik.docker.network=dmz"
|
- "traefik.docker.network=dmz"
|
||||||
- "traefik.passHostHeader=true"
|
- "traefik.passHostHeader=true"
|
||||||
|
- "traefik.frontend.headers.customRequestHeaders=X_FORWARDED_PROTO:https"
|
||||||
|
- "traefik.frontend.headers.SSLProxyHeaders=X_FORWARDED_PROTO:https"
|
||||||
- "traefik.backend.loadbalancer.swarm=true"
|
- "traefik.backend.loadbalancer.swarm=true"
|
||||||
- "traefik.backend.loadbalancer.method=drr"
|
- "traefik.backend.loadbalancer.method=drr"
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
@@ -35,9 +48,9 @@ services:
|
|||||||
db:
|
db:
|
||||||
image: postgres:9.6
|
image: postgres:9.6
|
||||||
environment:
|
environment:
|
||||||
- POSTGRES_USER=xxx
|
- "POSTGRES_USER=user"
|
||||||
- POSTGRES_PASSWORD=xxx
|
- "POSTGRES_PASSWORD=pwd"
|
||||||
- POSTGRES_DB=xxx
|
- "POSTGRES_DB=nextcloud"
|
||||||
volumes:
|
volumes:
|
||||||
- postgres_nextcloud_data:/var/lib/postgresql/data
|
- postgres_nextcloud_data:/var/lib/postgresql/data
|
||||||
networks:
|
networks:
|
||||||
@@ -45,6 +58,13 @@ services:
|
|||||||
deploy:
|
deploy:
|
||||||
mode: replicated
|
mode: replicated
|
||||||
replicas: 1
|
replicas: 1
|
||||||
|
resources:
|
||||||
|
limits:
|
||||||
|
cpus: '0.5'
|
||||||
|
memory: 500M
|
||||||
|
reservations:
|
||||||
|
cpus: '0.1'
|
||||||
|
memory: 100M
|
||||||
|
|
||||||
networks:
|
networks:
|
||||||
dmz:
|
dmz:
|
52
phantombot/docker-compose.yml
Normal file
52
phantombot/docker-compose.yml
Normal file
@@ -0,0 +1,52 @@
|
|||||||
|
version: '3'
|
||||||
|
|
||||||
|
services:
|
||||||
|
phantombot:
|
||||||
|
image: ministicraft/phantombot:v3.0.0
|
||||||
|
networks:
|
||||||
|
- dmz
|
||||||
|
ports:
|
||||||
|
- 25004:25004
|
||||||
|
volumes:
|
||||||
|
- phantombot_addons:/opt/PhantomBot/addons
|
||||||
|
- phantombot_logs:/opt/PhantomBot/logs
|
||||||
|
- phantombot_conf:/opt/PhantomBot/config
|
||||||
|
environment:
|
||||||
|
- "PHANTOMBOT_USER=wreckstream"
|
||||||
|
- "PHANTOMBOT_OAUTH=oauth"
|
||||||
|
- "PHANTOMBOT_APIOAUTH=oauth"
|
||||||
|
- "PHANTOMBOT_CHANNEL=wreckstream"
|
||||||
|
- "PHANTOMBOT_PANELUSER=wreckstream"
|
||||||
|
- "PHANTOMBOT_PANELPASSWORD=wreckstream"
|
||||||
|
deploy:
|
||||||
|
mode: replicated
|
||||||
|
replicas: 1
|
||||||
|
placement:
|
||||||
|
constraints: [node.role == manager]
|
||||||
|
resources:
|
||||||
|
limits:
|
||||||
|
cpus: '0.5'
|
||||||
|
memory: 250M
|
||||||
|
reservations:
|
||||||
|
cpus: '0.1'
|
||||||
|
memory: 100M
|
||||||
|
labels:
|
||||||
|
- "traefik.frontend.rule=Host:phantombot.arnaud-pc.fr"
|
||||||
|
- "traefik.port=25000"
|
||||||
|
- "traefik.docker.network=dmz"
|
||||||
|
- "traefik.passHostHeader=true"
|
||||||
|
- "traefik.backend.loadbalancer.swarm=true"
|
||||||
|
- "traefik.backend.loadbalancer.method=drr"
|
||||||
|
- "traefik.enable=true"
|
||||||
|
|
||||||
|
networks:
|
||||||
|
dmz:
|
||||||
|
external: true
|
||||||
|
|
||||||
|
volumes:
|
||||||
|
phantombot_logs:
|
||||||
|
driver: convoy
|
||||||
|
phantombot_conf:
|
||||||
|
driver: convoy
|
||||||
|
phantombot_addons:
|
||||||
|
driver: convoy
|
78
plex/docker-compose.yml
Normal file
78
plex/docker-compose.yml
Normal file
@@ -0,0 +1,78 @@
|
|||||||
|
version: '3.4'
|
||||||
|
|
||||||
|
services:
|
||||||
|
reverse_proxy_plex:
|
||||||
|
image: nginx
|
||||||
|
volumes:
|
||||||
|
- nginx_plex:/etc/nginx/
|
||||||
|
- /rapidStorage/nginxCache:/cache
|
||||||
|
- ssl:/traefik/
|
||||||
|
networks:
|
||||||
|
- plex
|
||||||
|
- dmz
|
||||||
|
deploy:
|
||||||
|
mode: replicated
|
||||||
|
replicas: 1
|
||||||
|
placement:
|
||||||
|
constraints: [node.role == manager]
|
||||||
|
resources:
|
||||||
|
limits:
|
||||||
|
cpus: '0.5'
|
||||||
|
memory: 50M
|
||||||
|
reservations:
|
||||||
|
cpus: '0.1'
|
||||||
|
memory: 10M
|
||||||
|
labels:
|
||||||
|
- "traefik.frontend.rule=Host:plex.arnaud-pc.fr"
|
||||||
|
- "traefik.port=443"
|
||||||
|
- "traefik.protocol=https"
|
||||||
|
- "traefik.docker.network=dmz"
|
||||||
|
- "traefik.passHostHeader=true"
|
||||||
|
- "traefik.backend.loadbalancer.swarm=true"
|
||||||
|
- "traefik.backend.loadbalancer.method=drr"
|
||||||
|
- "traefik.enable=true"
|
||||||
|
|
||||||
|
tautulli:
|
||||||
|
image: linuxserver/tautulli
|
||||||
|
environment:
|
||||||
|
TZ: Europe/Paris
|
||||||
|
volumes:
|
||||||
|
- tautulli_logs:/logs
|
||||||
|
- tautulli_conf:/config
|
||||||
|
networks:
|
||||||
|
- dmz
|
||||||
|
deploy:
|
||||||
|
mode: replicated
|
||||||
|
replicas: 1
|
||||||
|
resources:
|
||||||
|
limits:
|
||||||
|
cpus: '0.5'
|
||||||
|
memory: 500M
|
||||||
|
reservations:
|
||||||
|
cpus: '0.1'
|
||||||
|
memory: 200M
|
||||||
|
labels:
|
||||||
|
- "traefik.frontend.rule=Host:plex.arnaud-pc.fr;PathPrefix:/plexpy"
|
||||||
|
- "traefik.port=8181"
|
||||||
|
- "traefik.docker.network=dmz"
|
||||||
|
- "traefik.passHostHeader=true"
|
||||||
|
- "traefik.backend.loadbalancer.swarm=true"
|
||||||
|
- "traefik.backend.loadbalancer.method=drr"
|
||||||
|
- "traefik.enable=true"
|
||||||
|
|
||||||
|
networks:
|
||||||
|
dmz:
|
||||||
|
external: true
|
||||||
|
plex:
|
||||||
|
external: true
|
||||||
|
|
||||||
|
volumes:
|
||||||
|
tautulli_logs:
|
||||||
|
driver: convoy
|
||||||
|
tautulli_conf:
|
||||||
|
driver: convoy
|
||||||
|
nginx_plex:
|
||||||
|
driver: convoy
|
||||||
|
ssl:
|
||||||
|
external: true
|
||||||
|
name: traefik_traefik_conf
|
386
plex/plex-automation/docker-compose.yml
Normal file
386
plex/plex-automation/docker-compose.yml
Normal file
@@ -0,0 +1,386 @@
|
|||||||
|
version: '3'
|
||||||
|
|
||||||
|
services:
|
||||||
|
syncthing:
|
||||||
|
image: linuxserver/syncthing
|
||||||
|
environment:
|
||||||
|
- PUID=1000
|
||||||
|
- PGID=1000
|
||||||
|
- UMASK=<022>
|
||||||
|
ports:
|
||||||
|
- "22000:22000"
|
||||||
|
- "21027:21027/udp"
|
||||||
|
volumes:
|
||||||
|
- syncthing_conf:/config
|
||||||
|
- /storage/syncthing:/mnt/storage/syncthing
|
||||||
|
networks:
|
||||||
|
- plex
|
||||||
|
deploy:
|
||||||
|
mode: replicated
|
||||||
|
replicas: 1
|
||||||
|
resources:
|
||||||
|
limits:
|
||||||
|
cpus: '1.0'
|
||||||
|
memory: 1G
|
||||||
|
reservations:
|
||||||
|
cpus: '0.1'
|
||||||
|
memory: 500M
|
||||||
|
|
||||||
|
jackett:
|
||||||
|
image: linuxserver/jackett
|
||||||
|
environment:
|
||||||
|
- PUID=1000
|
||||||
|
- PGID=1000
|
||||||
|
- TZ=Europe/Paris
|
||||||
|
volumes:
|
||||||
|
- jackett_conf:/config
|
||||||
|
networks:
|
||||||
|
- plex
|
||||||
|
deploy:
|
||||||
|
mode: replicated
|
||||||
|
replicas: 1
|
||||||
|
resources:
|
||||||
|
limits:
|
||||||
|
cpus: '0.5'
|
||||||
|
memory: 50M
|
||||||
|
reservations:
|
||||||
|
cpus: '0.1'
|
||||||
|
memory: 10M
|
||||||
|
|
||||||
|
|
||||||
|
lidarr:
|
||||||
|
image: linuxserver/lidarr
|
||||||
|
environment:
|
||||||
|
- PUID=1000
|
||||||
|
- PGID=1000
|
||||||
|
- TZ=Europe/Paris
|
||||||
|
volumes:
|
||||||
|
- lidarr_conf:/config
|
||||||
|
- /storage/plex/Musique:/music
|
||||||
|
- /storage/syncthing/torrents/musique:/torrents
|
||||||
|
networks:
|
||||||
|
- plex
|
||||||
|
deploy:
|
||||||
|
mode: replicated
|
||||||
|
replicas: 1
|
||||||
|
resources:
|
||||||
|
limits:
|
||||||
|
cpus: '0.5'
|
||||||
|
memory: 3G
|
||||||
|
reservations:
|
||||||
|
cpus: '0.1'
|
||||||
|
memory: 1G
|
||||||
|
|
||||||
|
radarr:
|
||||||
|
image: linuxserver/radarr
|
||||||
|
environment:
|
||||||
|
- PUID=1000
|
||||||
|
- PGID=1000
|
||||||
|
- TZ=Europe/Paris
|
||||||
|
volumes:
|
||||||
|
- radarr_conf:/config
|
||||||
|
- /storage/plex/Video/Movies:/movies
|
||||||
|
networks:
|
||||||
|
- plex
|
||||||
|
deploy:
|
||||||
|
mode: replicated
|
||||||
|
replicas: 1
|
||||||
|
resources:
|
||||||
|
limits:
|
||||||
|
cpus: '0.5'
|
||||||
|
memory: 750M
|
||||||
|
reservations:
|
||||||
|
cpus: '0.1'
|
||||||
|
memory: 250M
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=false"
|
||||||
|
- "traefik.frontend.rule=Host:radarr.media.arnaud-pc.fr"
|
||||||
|
- "traefik.port=7878"
|
||||||
|
- "traefik.docker.network=dmz"
|
||||||
|
- "traefik.backend.loadbalancer.swarm=true"
|
||||||
|
- "traefik.backend.loadbalancer.method=drr"
|
||||||
|
|
||||||
|
sonarr-tv:
|
||||||
|
image: linuxserver/sonarr:preview
|
||||||
|
environment:
|
||||||
|
- PUID=1000
|
||||||
|
- PGID=1000
|
||||||
|
- TZ=Europe/Paris
|
||||||
|
volumes:
|
||||||
|
- sonarr-tv_conf:/config
|
||||||
|
- /storage/plex/Video/Tv Shows:/tv
|
||||||
|
- /storage/syncthing/torrents/tv:/torrents
|
||||||
|
networks:
|
||||||
|
- plex
|
||||||
|
deploy:
|
||||||
|
mode: replicated
|
||||||
|
replicas: 1
|
||||||
|
resources:
|
||||||
|
limits:
|
||||||
|
cpus: '1.0'
|
||||||
|
memory: 1G
|
||||||
|
reservations:
|
||||||
|
cpus: '0.1'
|
||||||
|
memory: 500M
|
||||||
|
|
||||||
|
sonarr-anime:
|
||||||
|
image: linuxserver/sonarr:preview
|
||||||
|
environment:
|
||||||
|
- PUID=1000
|
||||||
|
- PGID=1000
|
||||||
|
- TZ=Europe/Paris
|
||||||
|
volumes:
|
||||||
|
- sonarr-anime_conf:/config
|
||||||
|
- /storage/plex/Video/Anime:/anime
|
||||||
|
- /storage/syncthing/torrents/anime:/torrents
|
||||||
|
networks:
|
||||||
|
- plex
|
||||||
|
deploy:
|
||||||
|
mode: replicated
|
||||||
|
replicas: 1
|
||||||
|
resources:
|
||||||
|
limits:
|
||||||
|
cpus: '1.0'
|
||||||
|
memory: 500M
|
||||||
|
reservations:
|
||||||
|
cpus: '0.1'
|
||||||
|
memory: 250M
|
||||||
|
|
||||||
|
gatekeeper_sonarr-anime:
|
||||||
|
image: keycloak/keycloak-gatekeeper
|
||||||
|
networks:
|
||||||
|
- plex
|
||||||
|
- dmz
|
||||||
|
command: |
|
||||||
|
--discovery-url=https://auth.arnaud-pc.fr/auth/realms/cloud
|
||||||
|
--client-id=sonarr-anime_proxy
|
||||||
|
--client-secret=secret
|
||||||
|
--listen=:3000
|
||||||
|
--redirection-url=https://sonarr-anime.media.arnaud-pc.fr
|
||||||
|
--enable-refresh-tokens=true
|
||||||
|
--encryption-key=key
|
||||||
|
--upstream-url=http://sonarr-anime:8989
|
||||||
|
--enable-default-deny=true
|
||||||
|
--resources="uri=/*|roles=sonarr-anime"
|
||||||
|
deploy:
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.frontend.rule=Host:sonarr-anime.media.arnaud-pc.fr"
|
||||||
|
- "traefik.port=3000"
|
||||||
|
- "traefik.docker.network=dmz"
|
||||||
|
- "traefik.backend.loadbalancer.swarm=true"
|
||||||
|
- "traefik.backend.loadbalancer.method=drr"
|
||||||
|
|
||||||
|
gatekeeper_sonarr-tv:
|
||||||
|
image: keycloak/keycloak-gatekeeper
|
||||||
|
networks:
|
||||||
|
- plex
|
||||||
|
- dmz
|
||||||
|
command: |
|
||||||
|
--discovery-url=https://auth.arnaud-pc.fr/auth/realms/cloud
|
||||||
|
--client-id=sonarr-tv_proxy
|
||||||
|
--client-secret=secret
|
||||||
|
--listen=:3000
|
||||||
|
--redirection-url=https://sonarr-tv.media.arnaud-pc.fr
|
||||||
|
--enable-refresh-tokens=true
|
||||||
|
--encryption-key=key
|
||||||
|
--upstream-url=http://sonarr-tv:8989
|
||||||
|
--enable-default-deny=true
|
||||||
|
--resources="uri=/*|roles=sonarr-tv"
|
||||||
|
--skip-upstream-tls-verify=true
|
||||||
|
deploy:
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.frontend.rule=Host:sonarr-tv.media.arnaud-pc.fr"
|
||||||
|
- "traefik.port=3000"
|
||||||
|
- "traefik.docker.network=dmz"
|
||||||
|
- "traefik.backend.loadbalancer.swarm=true"
|
||||||
|
- "traefik.backend.loadbalancer.method=drr"
|
||||||
|
|
||||||
|
gatekeeper_radarr:
|
||||||
|
image: keycloak/keycloak-gatekeeper
|
||||||
|
networks:
|
||||||
|
- plex
|
||||||
|
- dmz
|
||||||
|
command: |
|
||||||
|
--discovery-url=https://auth.arnaud-pc.fr/auth/realms/cloud
|
||||||
|
--client-id=radarr_proxy
|
||||||
|
--client-secret=secret
|
||||||
|
--listen=:3000
|
||||||
|
--redirection-url=https://radarr.media.arnaud-pc.fr
|
||||||
|
--enable-refresh-tokens=true
|
||||||
|
--encryption-key=key
|
||||||
|
--upstream-url=http://radarr:7878
|
||||||
|
--enable-default-deny=true
|
||||||
|
--resources="uri=/*|roles=radarr"
|
||||||
|
--skip-upstream-tls-verify=true
|
||||||
|
deploy:
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.frontend.rule=Host:radarr.media.arnaud-pc.fr"
|
||||||
|
- "traefik.port=3000"
|
||||||
|
- "traefik.docker.network=dmz"
|
||||||
|
- "traefik.backend.loadbalancer.swarm=true"
|
||||||
|
- "traefik.backend.loadbalancer.method=drr"
|
||||||
|
|
||||||
|
gatekeeper_lidarr:
|
||||||
|
image: keycloak/keycloak-gatekeeper
|
||||||
|
networks:
|
||||||
|
- plex
|
||||||
|
- dmz
|
||||||
|
command: |
|
||||||
|
--discovery-url=https://auth.arnaud-pc.fr/auth/realms/cloud
|
||||||
|
--client-id=lidarr_proxy
|
||||||
|
--client-secret=secret
|
||||||
|
--listen=:3000
|
||||||
|
--redirection-url=https://lidarr.media.arnaud-pc.fr
|
||||||
|
--enable-refresh-tokens=true
|
||||||
|
--encryption-key=key
|
||||||
|
--upstream-url=http://lidarr:8686
|
||||||
|
--enable-default-deny=true
|
||||||
|
--resources="uri=/*|roles=lidarr"
|
||||||
|
--skip-upstream-tls-verify=true
|
||||||
|
deploy:
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.frontend.rule=Host:lidarr.media.arnaud-pc.fr"
|
||||||
|
- "traefik.port=3000"
|
||||||
|
- "traefik.docker.network=dmz"
|
||||||
|
- "traefik.backend.loadbalancer.swarm=true"
|
||||||
|
- "traefik.backend.loadbalancer.method=drr"
|
||||||
|
|
||||||
|
gatekeeper_jackett:
|
||||||
|
image: keycloak/keycloak-gatekeeper
|
||||||
|
networks:
|
||||||
|
- plex
|
||||||
|
- dmz
|
||||||
|
command: |
|
||||||
|
--discovery-url=https://auth.arnaud-pc.fr/auth/realms/cloud
|
||||||
|
--client-id=jackett_proxy
|
||||||
|
--client-secret=secret
|
||||||
|
--listen=:3000
|
||||||
|
--redirection-url=https://jackett.media.arnaud-pc.fr
|
||||||
|
--enable-refresh-tokens=true
|
||||||
|
--encryption-key=key
|
||||||
|
--upstream-url=http://jackett:9117
|
||||||
|
--enable-default-deny=true
|
||||||
|
--resources="uri=/*|roles=jackett"
|
||||||
|
--skip-upstream-tls-verify=true
|
||||||
|
deploy:
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.frontend.rule=Host:jackett.media.arnaud-pc.fr"
|
||||||
|
- "traefik.port=3000"
|
||||||
|
- "traefik.docker.network=dmz"
|
||||||
|
- "traefik.backend.loadbalancer.swarm=true"
|
||||||
|
- "traefik.backend.loadbalancer.method=drr"
|
||||||
|
|
||||||
|
gatekeeper_syncthing:
|
||||||
|
image: keycloak/keycloak-gatekeeper
|
||||||
|
networks:
|
||||||
|
- plex
|
||||||
|
- dmz
|
||||||
|
command: |
|
||||||
|
--discovery-url=https://auth.arnaud-pc.fr/auth/realms/cloud
|
||||||
|
--client-id=syncthing_proxy
|
||||||
|
--client-secret=secret
|
||||||
|
--listen=:3000
|
||||||
|
--redirection-url=https://syncthing.media.arnaud-pc.fr
|
||||||
|
--enable-refresh-tokens=true
|
||||||
|
--encryption-key=key
|
||||||
|
--upstream-url=http://syncthing:8384
|
||||||
|
--enable-default-deny=true
|
||||||
|
--resources="uri=/*|roles=syncthing"
|
||||||
|
--skip-upstream-tls-verify=true
|
||||||
|
deploy:
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.frontend.rule=Host:syncthing.media.arnaud-pc.fr"
|
||||||
|
- "traefik.port=3000"
|
||||||
|
- "traefik.docker.network=dmz"
|
||||||
|
- "traefik.backend.loadbalancer.swarm=true"
|
||||||
|
- "traefik.backend.loadbalancer.method=drr"
|
||||||
|
|
||||||
|
ombi:
|
||||||
|
image: linuxserver/ombi
|
||||||
|
environment:
|
||||||
|
TZ: Europe/Paris
|
||||||
|
PGID: 1000
|
||||||
|
PUID: 1000
|
||||||
|
volumes:
|
||||||
|
- ombi_conf:/config
|
||||||
|
networks:
|
||||||
|
- dmz
|
||||||
|
- plex
|
||||||
|
deploy:
|
||||||
|
mode: replicated
|
||||||
|
replicas: 1
|
||||||
|
resources:
|
||||||
|
limits:
|
||||||
|
cpus: '0.5'
|
||||||
|
memory: 350M
|
||||||
|
reservations:
|
||||||
|
cpus: '0.1'
|
||||||
|
memory: 100M
|
||||||
|
labels:
|
||||||
|
- "traefik.frontend.rule=Host:plex.arnaud-pc.fr;PathPrefix:/request"
|
||||||
|
- "traefik.port=3579"
|
||||||
|
- "traefik.docker.network=dmz"
|
||||||
|
- "traefik.passHostHeader=true"
|
||||||
|
- "traefik.backend.loadbalancer.swarm=true"
|
||||||
|
- "traefik.backend.loadbalancer.method=drr"
|
||||||
|
- "traefik.enable=true"
|
||||||
|
|
||||||
|
ombi-anime:
|
||||||
|
image: linuxserver/ombi
|
||||||
|
environment:
|
||||||
|
TZ: Europe/Paris
|
||||||
|
PGID: 1000
|
||||||
|
PUID: 1000
|
||||||
|
volumes:
|
||||||
|
- ombi-anime_conf:/config
|
||||||
|
networks:
|
||||||
|
- dmz
|
||||||
|
- plex
|
||||||
|
deploy:
|
||||||
|
mode: replicated
|
||||||
|
replicas: 1
|
||||||
|
resources:
|
||||||
|
limits:
|
||||||
|
cpus: '0.5'
|
||||||
|
memory: 350M
|
||||||
|
reservations:
|
||||||
|
cpus: '0.1'
|
||||||
|
memory: 100M
|
||||||
|
labels:
|
||||||
|
- "traefik.frontend.rule=Host:plex.arnaud-pc.fr;PathPrefix:/anime-request"
|
||||||
|
- "traefik.port=3579"
|
||||||
|
- "traefik.docker.network=dmz"
|
||||||
|
- "traefik.passHostHeader=true"
|
||||||
|
- "traefik.backend.loadbalancer.swarm=true"
|
||||||
|
- "traefik.backend.loadbalancer.method=drr"
|
||||||
|
- "traefik.enable=true"
|
||||||
|
|
||||||
|
networks:
|
||||||
|
dmz:
|
||||||
|
external: true
|
||||||
|
plex:
|
||||||
|
driver: overlay
|
||||||
|
|
||||||
|
volumes:
|
||||||
|
syncthing_conf:
|
||||||
|
driver: convoy
|
||||||
|
jackett_conf:
|
||||||
|
driver: convoy
|
||||||
|
lidarr_conf:
|
||||||
|
driver: convoy
|
||||||
|
radarr_conf:
|
||||||
|
driver: convoy
|
||||||
|
sonarr-tv_conf:
|
||||||
|
driver: convoy
|
||||||
|
sonarr-anime_conf:
|
||||||
|
driver: convoy
|
||||||
|
ombi_conf:
|
||||||
|
driver: convoy
|
||||||
|
ombi-anime_conf:
|
||||||
|
driver: convoy
|
40
plex/plex/docker-compose.yml
Normal file
40
plex/plex/docker-compose.yml
Normal file
@@ -0,0 +1,40 @@
|
|||||||
|
version: '3.5'
|
||||||
|
|
||||||
|
services:
|
||||||
|
plex:
|
||||||
|
image: ministicraft/plex
|
||||||
|
container_name: plex
|
||||||
|
restart: always
|
||||||
|
environment:
|
||||||
|
TZ: Europe/Paris
|
||||||
|
ADVERTISE_IP: https://plex.arnaud-pc.fr:32400
|
||||||
|
PLEX_CLAIM: claim
|
||||||
|
PLEX_UID: 1000
|
||||||
|
PLEX_GID: 1000
|
||||||
|
ports:
|
||||||
|
- "32400:32400"
|
||||||
|
- "33400:33400"
|
||||||
|
volumes:
|
||||||
|
- /storage/plex/:/data/
|
||||||
|
- /rapidStorage/PlexConfig/:/config
|
||||||
|
- /tmp:/transcode
|
||||||
|
networks:
|
||||||
|
- plex
|
||||||
|
labels:
|
||||||
|
- "traefik.frontend.rule=Host:plex.arnaud-pc.fr"
|
||||||
|
- "traefik.port=32400"
|
||||||
|
- "traefik.docker.network=dmz"
|
||||||
|
- "traefik.passHostHeader=true"
|
||||||
|
- "traefik.backend.loadbalancer.swarm=true"
|
||||||
|
- "traefik.backend.loadbalancer.method=drr"
|
||||||
|
- "traefik.enable=true"
|
||||||
|
# TODO change devices
|
||||||
|
# when gpu import is implemented
|
||||||
|
devices:
|
||||||
|
- "/dev/dri/card0:/dev/dri/card0"
|
||||||
|
- "/dev/dri/renderD128:/dev/dri/renderD128"
|
||||||
|
|
||||||
|
networks:
|
||||||
|
plex:
|
||||||
|
driver: overlay
|
||||||
|
name: plex
|
@@ -4,7 +4,11 @@ services:
|
|||||||
agent:
|
agent:
|
||||||
image: portainer/agent
|
image: portainer/agent
|
||||||
environment:
|
environment:
|
||||||
|
# REQUIRED: Should be equal to the service name prefixed by "tasks." when
|
||||||
|
# deployed inside an overlay network
|
||||||
AGENT_CLUSTER_ADDR: tasks.agent
|
AGENT_CLUSTER_ADDR: tasks.agent
|
||||||
|
# AGENT_PORT: 9001
|
||||||
|
# LOG_LEVEL: debug
|
||||||
volumes:
|
volumes:
|
||||||
- /var/run/docker.sock:/var/run/docker.sock
|
- /var/run/docker.sock:/var/run/docker.sock
|
||||||
- /var/lib/docker/volumes:/var/lib/docker/volumes
|
- /var/lib/docker/volumes:/var/lib/docker/volumes
|
@@ -4,12 +4,13 @@ services:
|
|||||||
image: traefik
|
image: traefik
|
||||||
environment:
|
environment:
|
||||||
- OVH_ENDPOINT=ovh-eu
|
- OVH_ENDPOINT=ovh-eu
|
||||||
- OVH_APPLICATION_KEY=xxx
|
- OVH_APPLICATION_KEY=key
|
||||||
- OVH_APPLICATION_SECRET=xxx
|
- OVH_APPLICATION_SECRET=secret
|
||||||
- OVH_CONSUMER_KEY=xxx
|
- OVH_CONSUMER_KEY=key
|
||||||
ports:
|
ports:
|
||||||
- "80:80"
|
- "80:80"
|
||||||
- "443:443"
|
- "443:443"
|
||||||
|
- "8080:8080"
|
||||||
volumes:
|
volumes:
|
||||||
- /var/run/docker.sock:/var/run/docker.sock
|
- /var/run/docker.sock:/var/run/docker.sock
|
||||||
- traefik_conf:/etc/traefik
|
- traefik_conf:/etc/traefik
|
||||||
@@ -31,6 +32,7 @@ services:
|
|||||||
--acme.onhostrule
|
--acme.onhostrule
|
||||||
--acme.dnschallenge
|
--acme.dnschallenge
|
||||||
--acme.dnschallenge.provider=ovh
|
--acme.dnschallenge.provider=ovh
|
||||||
|
--insecureskipverify=true
|
||||||
deploy:
|
deploy:
|
||||||
mode: replicated
|
mode: replicated
|
||||||
replicas: 1
|
replicas: 1
|
||||||
@@ -46,6 +48,14 @@ services:
|
|||||||
- "traefik.backend.loadbalancer.method=drr"
|
- "traefik.backend.loadbalancer.method=drr"
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
|
|
||||||
|
certdumper:
|
||||||
|
image: ldez/traefik-certs-dumper
|
||||||
|
depends_on:
|
||||||
|
- traefik
|
||||||
|
volumes:
|
||||||
|
- traefik_conf:/traefik
|
||||||
|
command: file --source /traefik/acme/acme.json --dest /traefik/ssl/ --domain-subdir=true --crt-ext=.pem --key-ext=.pem
|
||||||
|
|
||||||
networks:
|
networks:
|
||||||
traefik_network:
|
traefik_network:
|
||||||
name: dmz
|
name: dmz
|
10
traefik/traefik-certs-dumper/.dockerignore
Normal file
10
traefik/traefik-certs-dumper/.dockerignore
Normal file
@@ -0,0 +1,10 @@
|
|||||||
|
.idea/
|
||||||
|
vendor/
|
||||||
|
dist/
|
||||||
|
dump/
|
||||||
|
dumpcerts.sh
|
||||||
|
acme.json
|
||||||
|
acme-backup.json
|
||||||
|
traefik-certs-dumper
|
||||||
|
manifest.json
|
||||||
|
*.Dockerfile
|
10
traefik/traefik-certs-dumper/.gitignore
vendored
Normal file
10
traefik/traefik-certs-dumper/.gitignore
vendored
Normal file
@@ -0,0 +1,10 @@
|
|||||||
|
.idea/
|
||||||
|
vendor/
|
||||||
|
dist/
|
||||||
|
dump/
|
||||||
|
dumpcerts.sh
|
||||||
|
acme.json
|
||||||
|
acme-backup.json
|
||||||
|
traefik-certs-dumper
|
||||||
|
manifest.json
|
||||||
|
/linux-*.Dockerfile
|
41
traefik/traefik-certs-dumper/.golangci.toml
Normal file
41
traefik/traefik-certs-dumper/.golangci.toml
Normal file
@@ -0,0 +1,41 @@
|
|||||||
|
[run]
|
||||||
|
deadline = "2m"
|
||||||
|
skip-files = []
|
||||||
|
|
||||||
|
[linters-settings]
|
||||||
|
|
||||||
|
[linters-settings.govet]
|
||||||
|
check-shadowing = true
|
||||||
|
|
||||||
|
[linters-settings.gocyclo]
|
||||||
|
min-complexity = 12.0
|
||||||
|
|
||||||
|
[linters-settings.maligned]
|
||||||
|
suggest-new = true
|
||||||
|
|
||||||
|
[linters-settings.goconst]
|
||||||
|
min-len = 3.0
|
||||||
|
min-occurrences = 3.0
|
||||||
|
|
||||||
|
[linters-settings.misspell]
|
||||||
|
locale = "US"
|
||||||
|
|
||||||
|
[linters]
|
||||||
|
enable-all = true
|
||||||
|
disable = [
|
||||||
|
"maligned",
|
||||||
|
"lll",
|
||||||
|
"gas",
|
||||||
|
"dupl",
|
||||||
|
"prealloc",
|
||||||
|
"scopelint",
|
||||||
|
]
|
||||||
|
|
||||||
|
[issues]
|
||||||
|
exclude-use-default = false
|
||||||
|
max-per-linter = 0
|
||||||
|
max-same-issues = 0
|
||||||
|
exclude = []
|
||||||
|
[[issues.exclude-rules]]
|
||||||
|
path = "cmd/"
|
||||||
|
linters = ["gochecknoglobals", "gochecknoinits"]
|
49
traefik/traefik-certs-dumper/.goreleaser.yml
Normal file
49
traefik/traefik-certs-dumper/.goreleaser.yml
Normal file
@@ -0,0 +1,49 @@
|
|||||||
|
project_name: traefik-certs-dumper
|
||||||
|
|
||||||
|
builds:
|
||||||
|
- binary: traefik-certs-dumper
|
||||||
|
ldflags:
|
||||||
|
- -s -w -X github.com/ldez/traefik-certs-dumper/cmd.version={{.Version}} -X github.com/ldez/traefik-certs-dumper/cmd.commit={{.ShortCommit}} -X github.com/ldez/traefik-certs-dumper/cmd.date={{.Date}}
|
||||||
|
env:
|
||||||
|
- GO111MODULE=on
|
||||||
|
goos:
|
||||||
|
- linux
|
||||||
|
- darwin
|
||||||
|
- windows
|
||||||
|
- freebsd
|
||||||
|
- openbsd
|
||||||
|
goarch:
|
||||||
|
- amd64
|
||||||
|
- 386
|
||||||
|
- arm
|
||||||
|
- arm64
|
||||||
|
goarm:
|
||||||
|
- 7
|
||||||
|
- 6
|
||||||
|
- 5
|
||||||
|
|
||||||
|
ignore:
|
||||||
|
- goos: darwin
|
||||||
|
goarch: 386
|
||||||
|
|
||||||
|
changelog:
|
||||||
|
sort: asc
|
||||||
|
filters:
|
||||||
|
exclude:
|
||||||
|
- '^docs:'
|
||||||
|
- '^doc:'
|
||||||
|
- '^chore:'
|
||||||
|
- '^test:'
|
||||||
|
- '^tests:'
|
||||||
|
|
||||||
|
archive:
|
||||||
|
name_template: '{{ .ProjectName }}_v{{ .Version }}_{{ .Os }}_{{ .Arch }}{{ if .Arm }}v{{ .Arm }}{{ end }}'
|
||||||
|
format: tar.gz
|
||||||
|
format_overrides:
|
||||||
|
- goos: windows
|
||||||
|
format: zip
|
||||||
|
files:
|
||||||
|
- LICENSE
|
||||||
|
|
||||||
|
#release:
|
||||||
|
# disable: true
|
51
traefik/traefik-certs-dumper/.travis.yml
Normal file
51
traefik/traefik-certs-dumper/.travis.yml
Normal file
@@ -0,0 +1,51 @@
|
|||||||
|
language: go
|
||||||
|
|
||||||
|
go:
|
||||||
|
- 1.12.x
|
||||||
|
- 1.x
|
||||||
|
|
||||||
|
dist: xenial
|
||||||
|
|
||||||
|
services:
|
||||||
|
- docker
|
||||||
|
|
||||||
|
env:
|
||||||
|
- GO111MODULE=on
|
||||||
|
|
||||||
|
notifications:
|
||||||
|
email:
|
||||||
|
on_success: never
|
||||||
|
on_failure: change
|
||||||
|
|
||||||
|
before_install:
|
||||||
|
# Install linters and misspell
|
||||||
|
- curl -sfL https://install.goreleaser.com/github.com/golangci/golangci-lint.sh | bash -s -- -b $GOPATH/bin ${GOLANGCI_LINT_VERSION}
|
||||||
|
- golangci-lint --version
|
||||||
|
# Install Docker image multi-arch builder
|
||||||
|
- curl -sfL https://raw.githubusercontent.com/ldez/seihon/master/godownloader.sh | bash -s -- -b "${GOPATH}/bin" ${SEIHON_VERSION}
|
||||||
|
- seihon --version
|
||||||
|
|
||||||
|
install:
|
||||||
|
- echo "TRAVIS_GO_VERSION=$TRAVIS_GO_VERSION"
|
||||||
|
- go mod download
|
||||||
|
|
||||||
|
before_deploy:
|
||||||
|
- >
|
||||||
|
if ! [ "$BEFORE_DEPLOY_RUN" ]; then
|
||||||
|
export BEFORE_DEPLOY_RUN=1;
|
||||||
|
echo "${DOCKER_PASSWORD}" | docker login -u "${DOCKER_USERNAME}" --password-stdin
|
||||||
|
fi
|
||||||
|
|
||||||
|
deploy:
|
||||||
|
- provider: script
|
||||||
|
skip_cleanup: true
|
||||||
|
script: curl -sL https://git.io/goreleaser | bash
|
||||||
|
on:
|
||||||
|
tags: true
|
||||||
|
condition: $TRAVIS_GO_VERSION =~ ^1\.x$
|
||||||
|
- provider: script
|
||||||
|
skip_cleanup: true
|
||||||
|
script: make publish-images
|
||||||
|
on:
|
||||||
|
tags: true
|
||||||
|
condition: $TRAVIS_GO_VERSION =~ ^1\.x$
|
21
traefik/traefik-certs-dumper/Dockerfile
Normal file
21
traefik/traefik-certs-dumper/Dockerfile
Normal file
@@ -0,0 +1,21 @@
|
|||||||
|
FROM golang:1-alpine as builder
|
||||||
|
|
||||||
|
RUN apk --update upgrade \
|
||||||
|
&& apk --no-cache --no-progress add git make gcc musl-dev
|
||||||
|
|
||||||
|
WORKDIR /go/src/github.com/ldez/traefik-certs-dumper
|
||||||
|
|
||||||
|
ENV GO111MODULE on
|
||||||
|
COPY go.mod go.sum ./
|
||||||
|
RUN go mod download
|
||||||
|
|
||||||
|
COPY . .
|
||||||
|
RUN make build
|
||||||
|
|
||||||
|
FROM alpine:3.9
|
||||||
|
RUN apk --update upgrade \
|
||||||
|
&& apk --no-cache --no-progress add ca-certificates
|
||||||
|
|
||||||
|
COPY --from=builder /go/src/github.com/ldez/traefik-certs-dumper/traefik-certs-dumper /usr/bin/traefik-certs-dumper
|
||||||
|
|
||||||
|
ENTRYPOINT ["/usr/bin/traefik-certs-dumper"]
|
13
traefik/traefik-certs-dumper/LICENSE
Normal file
13
traefik/traefik-certs-dumper/LICENSE
Normal file
@@ -0,0 +1,13 @@
|
|||||||
|
Copyright 2019 Fernandez Ludovic
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
25
traefik/traefik-certs-dumper/Makefile
Normal file
25
traefik/traefik-certs-dumper/Makefile
Normal file
@@ -0,0 +1,25 @@
|
|||||||
|
.PHONY: default clean checks test build
|
||||||
|
|
||||||
|
TAG_NAME := $(shell git tag -l --contains HEAD)
|
||||||
|
SHA := $(shell git rev-parse --short HEAD)
|
||||||
|
VERSION := $(if $(TAG_NAME),$(TAG_NAME),$(SHA))
|
||||||
|
|
||||||
|
BUILD_DATE := $(shell date -u '+%Y-%m-%d_%I:%M:%S%p')
|
||||||
|
|
||||||
|
default: clean checks test build
|
||||||
|
|
||||||
|
test: clean
|
||||||
|
go test -v -cover ./...
|
||||||
|
|
||||||
|
clean:
|
||||||
|
rm -rf dist/ cover.out
|
||||||
|
|
||||||
|
build: clean
|
||||||
|
@echo Version: $(VERSION) $(BUILD_DATE)
|
||||||
|
go build -v -ldflags '-X "github.com/ldez/traefik-certs-dumper/cmd.version=${VERSION}" -X "github.com/ldez/traefik-certs-dumper/cmd.commit=${SHA}" -X "github.com/ldez/traefik-certs-dumper/cmd.date=${BUILD_DATE}"' -o traefik-certs-dumper
|
||||||
|
|
||||||
|
checks:
|
||||||
|
golangci-lint run
|
||||||
|
|
||||||
|
publish-images:
|
||||||
|
seihon publish -v "$(TAG_NAME)" -v "latest" --image-name ldez/traefik-certs-dumper --dry-run=false
|
39
traefik/traefik-certs-dumper/cmd/boltdb.go
Normal file
39
traefik/traefik-certs-dumper/cmd/boltdb.go
Normal file
@@ -0,0 +1,39 @@
|
|||||||
|
package cmd
|
||||||
|
|
||||||
|
import (
|
||||||
|
"github.com/abronan/valkeyrie/store"
|
||||||
|
"github.com/abronan/valkeyrie/store/boltdb"
|
||||||
|
"github.com/ldez/traefik-certs-dumper/v2/dumper"
|
||||||
|
"github.com/ldez/traefik-certs-dumper/v2/dumper/kv"
|
||||||
|
"github.com/spf13/cobra"
|
||||||
|
)
|
||||||
|
|
||||||
|
// boltdbCmd represents the boltdb command
|
||||||
|
var boltdbCmd = &cobra.Command{
|
||||||
|
Use: "boltdb",
|
||||||
|
Short: "Dump the content of BoltDB.",
|
||||||
|
Long: `Dump the content of BoltDB.`,
|
||||||
|
RunE: runE(boltdbRun),
|
||||||
|
}
|
||||||
|
|
||||||
|
func init() {
|
||||||
|
kvCmd.AddCommand(boltdbCmd)
|
||||||
|
|
||||||
|
boltdbCmd.Flags().Bool("persist-connection", false, "Persist connection for boltdb.")
|
||||||
|
boltdbCmd.Flags().String("bucket", "traefik", "Bucket for boltdb.")
|
||||||
|
}
|
||||||
|
|
||||||
|
func boltdbRun(baseConfig *dumper.BaseConfig, cmd *cobra.Command) error {
|
||||||
|
config, err := getKvConfig(cmd)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
config.Options.Bucket = cmd.Flag("bucket").Value.String()
|
||||||
|
config.Options.PersistConnection, _ = cmd.Flags().GetBool("persist-connection")
|
||||||
|
|
||||||
|
config.Backend = store.BOLTDB
|
||||||
|
boltdb.Register()
|
||||||
|
|
||||||
|
return kv.Dump(config, baseConfig)
|
||||||
|
}
|
37
traefik/traefik-certs-dumper/cmd/consul.go
Normal file
37
traefik/traefik-certs-dumper/cmd/consul.go
Normal file
@@ -0,0 +1,37 @@
|
|||||||
|
package cmd
|
||||||
|
|
||||||
|
import (
|
||||||
|
"github.com/abronan/valkeyrie/store"
|
||||||
|
"github.com/abronan/valkeyrie/store/consul"
|
||||||
|
"github.com/ldez/traefik-certs-dumper/v2/dumper"
|
||||||
|
"github.com/ldez/traefik-certs-dumper/v2/dumper/kv"
|
||||||
|
"github.com/spf13/cobra"
|
||||||
|
)
|
||||||
|
|
||||||
|
// consulCmd represents the consul command
|
||||||
|
var consulCmd = &cobra.Command{
|
||||||
|
Use: "consul",
|
||||||
|
Short: "Dump the content of Consul.",
|
||||||
|
Long: `Dump the content of Consul.`,
|
||||||
|
RunE: runE(consulRun),
|
||||||
|
}
|
||||||
|
|
||||||
|
func init() {
|
||||||
|
kvCmd.AddCommand(consulCmd)
|
||||||
|
|
||||||
|
consulCmd.Flags().String("token", "", "Token for consul.")
|
||||||
|
}
|
||||||
|
|
||||||
|
func consulRun(baseConfig *dumper.BaseConfig, cmd *cobra.Command) error {
|
||||||
|
config, err := getKvConfig(cmd)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
config.Options.Token = cmd.Flag("token").Value.String()
|
||||||
|
|
||||||
|
config.Backend = store.CONSUL
|
||||||
|
consul.Register()
|
||||||
|
|
||||||
|
return kv.Dump(config, baseConfig)
|
||||||
|
}
|
20
traefik/traefik-certs-dumper/cmd/doc.go
Normal file
20
traefik/traefik-certs-dumper/cmd/doc.go
Normal file
@@ -0,0 +1,20 @@
|
|||||||
|
package cmd
|
||||||
|
|
||||||
|
import (
|
||||||
|
"github.com/spf13/cobra"
|
||||||
|
"github.com/spf13/cobra/doc"
|
||||||
|
)
|
||||||
|
|
||||||
|
// docCmd represents the doc command
|
||||||
|
var docCmd = &cobra.Command{
|
||||||
|
Use: "doc",
|
||||||
|
Short: "Generate documentation",
|
||||||
|
Hidden: true,
|
||||||
|
RunE: func(cmd *cobra.Command, args []string) error {
|
||||||
|
return doc.GenMarkdownTree(rootCmd, "./docs")
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
func init() {
|
||||||
|
rootCmd.AddCommand(docCmd)
|
||||||
|
}
|
43
traefik/traefik-certs-dumper/cmd/etcd.go
Normal file
43
traefik/traefik-certs-dumper/cmd/etcd.go
Normal file
@@ -0,0 +1,43 @@
|
|||||||
|
package cmd
|
||||||
|
|
||||||
|
import (
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/abronan/valkeyrie/store"
|
||||||
|
"github.com/abronan/valkeyrie/store/etcd/v2"
|
||||||
|
"github.com/ldez/traefik-certs-dumper/v2/dumper"
|
||||||
|
"github.com/ldez/traefik-certs-dumper/v2/dumper/kv"
|
||||||
|
"github.com/spf13/cobra"
|
||||||
|
)
|
||||||
|
|
||||||
|
// etcdCmd represents the etcd command
|
||||||
|
var etcdCmd = &cobra.Command{
|
||||||
|
Use: "etcd",
|
||||||
|
Short: "Dump the content of etcd.",
|
||||||
|
Long: `Dump the content of etcd.`,
|
||||||
|
RunE: runE(etcdRun),
|
||||||
|
}
|
||||||
|
|
||||||
|
func init() {
|
||||||
|
kvCmd.AddCommand(etcdCmd)
|
||||||
|
|
||||||
|
etcdCmd.Flags().Int("sync-period", 0, "Sync period for etcd in seconds.")
|
||||||
|
}
|
||||||
|
|
||||||
|
func etcdRun(baseConfig *dumper.BaseConfig, cmd *cobra.Command) error {
|
||||||
|
config, err := getKvConfig(cmd)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
synPeriod, err := cmd.Flags().GetInt("sync-period")
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
config.Options.SyncPeriod = time.Duration(synPeriod) * time.Second
|
||||||
|
|
||||||
|
config.Backend = store.ETCD
|
||||||
|
etcd.Register()
|
||||||
|
|
||||||
|
return kv.Dump(config, baseConfig)
|
||||||
|
}
|
25
traefik/traefik-certs-dumper/cmd/file.go
Normal file
25
traefik/traefik-certs-dumper/cmd/file.go
Normal file
@@ -0,0 +1,25 @@
|
|||||||
|
package cmd
|
||||||
|
|
||||||
|
import (
|
||||||
|
"github.com/ldez/traefik-certs-dumper/v2/dumper"
|
||||||
|
"github.com/ldez/traefik-certs-dumper/v2/dumper/file"
|
||||||
|
"github.com/spf13/cobra"
|
||||||
|
)
|
||||||
|
|
||||||
|
// fileCmd represents the file command
|
||||||
|
var fileCmd = &cobra.Command{
|
||||||
|
Use: "file",
|
||||||
|
Short: `Dump the content of the "acme.json" file.`,
|
||||||
|
Long: `Dump the content of the "acme.json" file from Traefik to certificates.`,
|
||||||
|
RunE: runE(func(baseConfig *dumper.BaseConfig, cmd *cobra.Command) error {
|
||||||
|
acmeFile := cmd.Flag("source").Value.String()
|
||||||
|
|
||||||
|
return file.Dump(acmeFile, baseConfig)
|
||||||
|
}),
|
||||||
|
}
|
||||||
|
|
||||||
|
func init() {
|
||||||
|
rootCmd.AddCommand(fileCmd)
|
||||||
|
|
||||||
|
fileCmd.Flags().String("source", "./acme.json", "Path to 'acme.json' file.")
|
||||||
|
}
|
174
traefik/traefik-certs-dumper/cmd/kv.go
Normal file
174
traefik/traefik-certs-dumper/cmd/kv.go
Normal file
@@ -0,0 +1,174 @@
|
|||||||
|
package cmd
|
||||||
|
|
||||||
|
import (
|
||||||
|
"crypto/tls"
|
||||||
|
"crypto/x509"
|
||||||
|
"fmt"
|
||||||
|
"io/ioutil"
|
||||||
|
"os"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/abronan/valkeyrie/store"
|
||||||
|
"github.com/ldez/traefik-certs-dumper/v2/dumper/kv"
|
||||||
|
"github.com/spf13/cobra"
|
||||||
|
)
|
||||||
|
|
||||||
|
// kvCmd represents the kv command
|
||||||
|
var kvCmd = &cobra.Command{
|
||||||
|
Use: "kv",
|
||||||
|
Short: `Dump the content of a KV store.`,
|
||||||
|
Long: `Dump the content of a KV store.`,
|
||||||
|
}
|
||||||
|
|
||||||
|
func init() {
|
||||||
|
rootCmd.AddCommand(kvCmd)
|
||||||
|
|
||||||
|
kvCmd.PersistentFlags().StringSlice("endpoints", []string{"localhost:8500"}, "List of endpoints.")
|
||||||
|
kvCmd.PersistentFlags().Int("connection-timeout", 0, "Connection timeout in seconds.")
|
||||||
|
kvCmd.PersistentFlags().String("prefix", "traefik", "Prefix used for KV store.")
|
||||||
|
kvCmd.PersistentFlags().String("password", "", "Password for connection.")
|
||||||
|
kvCmd.PersistentFlags().String("username", "", "Username for connection.")
|
||||||
|
|
||||||
|
kvCmd.PersistentFlags().Bool("tls", false, "Enable TLS encryption.")
|
||||||
|
kvCmd.PersistentFlags().String("tls.ca", "", "Root CA for certificate verification if TLS is enabled")
|
||||||
|
kvCmd.PersistentFlags().Bool("tls.ca.optional", false, "")
|
||||||
|
kvCmd.PersistentFlags().String("tls.cert", "", "TLS cert")
|
||||||
|
kvCmd.PersistentFlags().String("tls.key", "", "TLS key")
|
||||||
|
kvCmd.PersistentFlags().Bool("tls.insecureskipverify", false, "Trust unverified certificates if TLS is enabled.")
|
||||||
|
}
|
||||||
|
|
||||||
|
func getKvConfig(cmd *cobra.Command) (*kv.Config, error) {
|
||||||
|
endpoints, err := cmd.Flags().GetStringSlice("endpoints")
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
connectionTimeout, err := cmd.Flags().GetInt("connection-timeout")
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
tlsConfig, err := createTLSConfig(cmd)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
return &kv.Config{
|
||||||
|
Endpoints: endpoints,
|
||||||
|
Prefix: cmd.Flag("prefix").Value.String(),
|
||||||
|
Options: &store.Config{
|
||||||
|
ConnectionTimeout: time.Duration(connectionTimeout) * time.Second,
|
||||||
|
Username: cmd.Flag("password").Value.String(),
|
||||||
|
Password: cmd.Flag("username").Value.String(),
|
||||||
|
TLS: tlsConfig,
|
||||||
|
},
|
||||||
|
}, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func createTLSConfig(cmd *cobra.Command) (*tls.Config, error) {
|
||||||
|
enable, _ := cmd.Flags().GetBool("tls")
|
||||||
|
if !enable {
|
||||||
|
return nil, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
ca := cmd.Flag("tls.ca").Value.String()
|
||||||
|
caPool, err := getCertPool(ca)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
caOptional, _ := cmd.Flags().GetBool("tls.ca.optional")
|
||||||
|
clientAuth := getClientAuth(ca, caOptional)
|
||||||
|
|
||||||
|
insecureSkipVerify, _ := cmd.Flags().GetBool("tls.insecureskipverify")
|
||||||
|
privateKey := cmd.Flag("tls.key").Value.String()
|
||||||
|
certContent := cmd.Flag("tls.cert").Value.String()
|
||||||
|
|
||||||
|
if !insecureSkipVerify && (len(certContent) == 0 || len(privateKey) == 0) {
|
||||||
|
return nil, fmt.Errorf("TLS Certificate or Key file must be set when TLS configuration is created")
|
||||||
|
}
|
||||||
|
|
||||||
|
cert, err := getCertificate(privateKey, certContent)
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("failed to load TLS keypair: %s", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return &tls.Config{
|
||||||
|
Certificates: []tls.Certificate{cert},
|
||||||
|
RootCAs: caPool,
|
||||||
|
InsecureSkipVerify: insecureSkipVerify,
|
||||||
|
ClientAuth: clientAuth,
|
||||||
|
}, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func getCertPool(ca string) (*x509.CertPool, error) {
|
||||||
|
caPool := x509.NewCertPool()
|
||||||
|
|
||||||
|
if ca != "" {
|
||||||
|
caContent, err := getCAContent(ca)
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("failed to read CA. %s", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
if !caPool.AppendCertsFromPEM(caContent) {
|
||||||
|
return nil, fmt.Errorf("failed to parse CA")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return caPool, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func getCAContent(ca string) ([]byte, error) {
|
||||||
|
if _, errCA := os.Stat(ca); errCA != nil {
|
||||||
|
return []byte(ca), nil
|
||||||
|
}
|
||||||
|
|
||||||
|
caContent, err := ioutil.ReadFile(ca)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return caContent, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func getClientAuth(ca string, caOptional bool) tls.ClientAuthType {
|
||||||
|
if ca == "" {
|
||||||
|
return tls.NoClientCert
|
||||||
|
}
|
||||||
|
|
||||||
|
if caOptional {
|
||||||
|
return tls.VerifyClientCertIfGiven
|
||||||
|
}
|
||||||
|
return tls.RequireAndVerifyClientCert
|
||||||
|
}
|
||||||
|
|
||||||
|
func getCertificate(privateKey, certContent string) (tls.Certificate, error) {
|
||||||
|
if certContent == "" || privateKey == "" {
|
||||||
|
return tls.Certificate{}, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
_, errKeyIsFile := os.Stat(privateKey)
|
||||||
|
_, errCertIsFile := os.Stat(certContent)
|
||||||
|
|
||||||
|
if errCertIsFile == nil && os.IsNotExist(errKeyIsFile) {
|
||||||
|
return tls.Certificate{}, fmt.Errorf("tls cert is a file, but tls key is not")
|
||||||
|
}
|
||||||
|
|
||||||
|
if os.IsNotExist(errCertIsFile) && errKeyIsFile == nil {
|
||||||
|
return tls.Certificate{}, fmt.Errorf("TLS key is a file, but tls cert is not")
|
||||||
|
}
|
||||||
|
|
||||||
|
// string
|
||||||
|
if os.IsNotExist(errCertIsFile) && os.IsNotExist(errKeyIsFile) {
|
||||||
|
return tls.X509KeyPair([]byte(certContent), []byte(privateKey))
|
||||||
|
}
|
||||||
|
|
||||||
|
// files
|
||||||
|
if errCertIsFile == nil && errKeyIsFile == nil {
|
||||||
|
return tls.LoadX509KeyPair(certContent, privateKey)
|
||||||
|
}
|
||||||
|
|
||||||
|
if errCertIsFile != nil {
|
||||||
|
return tls.Certificate{}, errCertIsFile
|
||||||
|
}
|
||||||
|
return tls.Certificate{}, errKeyIsFile
|
||||||
|
}
|
180
traefik/traefik-certs-dumper/cmd/root.go
Normal file
180
traefik/traefik-certs-dumper/cmd/root.go
Normal file
@@ -0,0 +1,180 @@
|
|||||||
|
package cmd
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"io/ioutil"
|
||||||
|
"log"
|
||||||
|
"os"
|
||||||
|
"path/filepath"
|
||||||
|
"strconv"
|
||||||
|
|
||||||
|
"github.com/ldez/traefik-certs-dumper/v2/dumper"
|
||||||
|
homedir "github.com/mitchellh/go-homedir"
|
||||||
|
"github.com/spf13/cobra"
|
||||||
|
"github.com/spf13/viper"
|
||||||
|
)
|
||||||
|
|
||||||
|
var cfgFile string
|
||||||
|
|
||||||
|
// rootCmd represents the base command when called without any subcommands
|
||||||
|
var rootCmd = &cobra.Command{
|
||||||
|
Use: "traefik-certs-dumper",
|
||||||
|
Short: "Dump Let's Encrypt certificates from Traefik.",
|
||||||
|
Long: `Dump Let's Encrypt certificates from Traefik.`,
|
||||||
|
PersistentPreRunE: func(cmd *cobra.Command, args []string) error {
|
||||||
|
if cmd.Name() == "version" {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
crtExt := cmd.Flag("crt-ext").Value.String()
|
||||||
|
keyExt := cmd.Flag("key-ext").Value.String()
|
||||||
|
|
||||||
|
subDir, _ := strconv.ParseBool(cmd.Flag("domain-subdir").Value.String())
|
||||||
|
if !subDir {
|
||||||
|
if crtExt == keyExt {
|
||||||
|
return fmt.Errorf("--crt-ext (%q) and --key-ext (%q) are identical, in this case --domain-subdir is required", crtExt, keyExt)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
// Execute adds all child commands to the root command and sets flags appropriately.
|
||||||
|
// This is called by main.main(). It only needs to happen once to the rootCmd.
|
||||||
|
func Execute() {
|
||||||
|
if err := rootCmd.Execute(); err != nil {
|
||||||
|
log.Println(err)
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func init() {
|
||||||
|
cobra.OnInitialize(initConfig)
|
||||||
|
|
||||||
|
rootCmd.PersistentFlags().StringVar(&cfgFile, "config", "", "config file (default is $HOME/.traefik-certs-dumper.yaml)")
|
||||||
|
|
||||||
|
rootCmd.PersistentFlags().String("dest", "./dump", "Path to store the dump content.")
|
||||||
|
rootCmd.PersistentFlags().String("crt-ext", ".crt", "The file extension of the generated certificates.")
|
||||||
|
rootCmd.PersistentFlags().String("crt-name", "certificate", "The file name (without extension) of the generated certificates.")
|
||||||
|
rootCmd.PersistentFlags().String("key-ext", ".key", "The file extension of the generated private keys.")
|
||||||
|
rootCmd.PersistentFlags().String("key-name", "privatekey", "The file name (without extension) of the generated private keys.")
|
||||||
|
rootCmd.PersistentFlags().Bool("domain-subdir", false, "Use domain as sub-directory.")
|
||||||
|
rootCmd.PersistentFlags().Bool("clean", true, "Clean destination folder before dumping content.")
|
||||||
|
rootCmd.PersistentFlags().Bool("watch", false, "Enable watching changes.")
|
||||||
|
rootCmd.PersistentFlags().String("post-hook", "", "Execute a command only if changes occurs on the data source. (works only with the watch mode)")
|
||||||
|
}
|
||||||
|
|
||||||
|
// initConfig reads in config file and ENV variables if set.
|
||||||
|
func initConfig() {
|
||||||
|
if cfgFile != "" {
|
||||||
|
// Use config file from the flag.
|
||||||
|
viper.SetConfigFile(cfgFile)
|
||||||
|
} else {
|
||||||
|
// Find home directory.
|
||||||
|
home, err := homedir.Dir()
|
||||||
|
if err != nil {
|
||||||
|
fmt.Println(err)
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Search config in home directory with name ".traefik-certs-dumper" (without extension).
|
||||||
|
viper.AddConfigPath(home)
|
||||||
|
viper.SetConfigName(".traefik-certs-dumper")
|
||||||
|
}
|
||||||
|
|
||||||
|
viper.AutomaticEnv() // read in environment variables that match
|
||||||
|
|
||||||
|
// If a config file is found, read it in.
|
||||||
|
if err := viper.ReadInConfig(); err == nil {
|
||||||
|
fmt.Println("Using config file:", viper.ConfigFileUsed())
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func runE(apply func(*dumper.BaseConfig, *cobra.Command) error) func(*cobra.Command, []string) error {
|
||||||
|
return func(cmd *cobra.Command, _ []string) error {
|
||||||
|
baseConfig, err := getBaseConfig(cmd)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
err = apply(baseConfig, cmd)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
return tree(baseConfig.DumpPath, "")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func tree(root, indent string) error {
|
||||||
|
fi, err := os.Stat(root)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("could not stat %s: %v", root, err)
|
||||||
|
}
|
||||||
|
|
||||||
|
fmt.Println(fi.Name())
|
||||||
|
if !fi.IsDir() {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
fis, err := ioutil.ReadDir(root)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("could not read dir %s: %v", root, err)
|
||||||
|
}
|
||||||
|
|
||||||
|
var names []string
|
||||||
|
for _, fi := range fis {
|
||||||
|
if fi.Name()[0] != '.' {
|
||||||
|
names = append(names, fi.Name())
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
for i, name := range names {
|
||||||
|
add := "│ "
|
||||||
|
if i == len(names)-1 {
|
||||||
|
fmt.Printf(indent + "└──")
|
||||||
|
add = " "
|
||||||
|
} else {
|
||||||
|
fmt.Printf(indent + "├──")
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := tree(filepath.Join(root, name), indent+add); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func getBaseConfig(cmd *cobra.Command) (*dumper.BaseConfig, error) {
|
||||||
|
subDir, err := strconv.ParseBool(cmd.Flag("domain-subdir").Value.String())
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
clean, err := strconv.ParseBool(cmd.Flag("clean").Value.String())
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
watch, err := strconv.ParseBool(cmd.Flag("watch").Value.String())
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
return &dumper.BaseConfig{
|
||||||
|
DumpPath: cmd.Flag("dest").Value.String(),
|
||||||
|
CrtInfo: dumper.FileInfo{
|
||||||
|
Name: cmd.Flag("crt-name").Value.String(),
|
||||||
|
Ext: cmd.Flag("crt-ext").Value.String(),
|
||||||
|
},
|
||||||
|
KeyInfo: dumper.FileInfo{
|
||||||
|
Name: cmd.Flag("key-name").Value.String(),
|
||||||
|
Ext: cmd.Flag("key-ext").Value.String(),
|
||||||
|
},
|
||||||
|
DomainSubDir: subDir,
|
||||||
|
Clean: clean,
|
||||||
|
Watch: watch,
|
||||||
|
Hook: cmd.Flag("post-hook").Value.String(),
|
||||||
|
}, nil
|
||||||
|
}
|
38
traefik/traefik-certs-dumper/cmd/version.go
Normal file
38
traefik/traefik-certs-dumper/cmd/version.go
Normal file
@@ -0,0 +1,38 @@
|
|||||||
|
package cmd
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"runtime"
|
||||||
|
|
||||||
|
"github.com/spf13/cobra"
|
||||||
|
)
|
||||||
|
|
||||||
|
var (
|
||||||
|
version = "dev"
|
||||||
|
commit = "I don't remember exactly"
|
||||||
|
date = "I don't remember exactly"
|
||||||
|
)
|
||||||
|
|
||||||
|
// versionCmd represents the version command
|
||||||
|
var versionCmd = &cobra.Command{
|
||||||
|
Use: "version",
|
||||||
|
Short: "Display version",
|
||||||
|
Run: func(cmd *cobra.Command, args []string) {
|
||||||
|
displayVersion(rootCmd.Name())
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
func init() {
|
||||||
|
rootCmd.AddCommand(versionCmd)
|
||||||
|
}
|
||||||
|
|
||||||
|
func displayVersion(name string) {
|
||||||
|
fmt.Printf(name+`:
|
||||||
|
version : %s
|
||||||
|
commit : %s
|
||||||
|
build date : %s
|
||||||
|
go version : %s
|
||||||
|
go compiler : %s
|
||||||
|
platform : %s/%s
|
||||||
|
`, version, commit, date, runtime.Version(), runtime.Compiler, runtime.GOOS, runtime.GOARCH)
|
||||||
|
}
|
33
traefik/traefik-certs-dumper/cmd/zookeeper.go
Normal file
33
traefik/traefik-certs-dumper/cmd/zookeeper.go
Normal file
@@ -0,0 +1,33 @@
|
|||||||
|
package cmd
|
||||||
|
|
||||||
|
import (
|
||||||
|
"github.com/abronan/valkeyrie/store"
|
||||||
|
"github.com/abronan/valkeyrie/store/zookeeper"
|
||||||
|
"github.com/ldez/traefik-certs-dumper/v2/dumper"
|
||||||
|
"github.com/ldez/traefik-certs-dumper/v2/dumper/kv"
|
||||||
|
"github.com/spf13/cobra"
|
||||||
|
)
|
||||||
|
|
||||||
|
// zookeeperCmd represents the zookeeper command
|
||||||
|
var zookeeperCmd = &cobra.Command{
|
||||||
|
Use: "zookeeper",
|
||||||
|
Short: "Dump the content of zookeeper.",
|
||||||
|
Long: `Dump the content of zookeeper.`,
|
||||||
|
RunE: runE(zookeeperRun),
|
||||||
|
}
|
||||||
|
|
||||||
|
func init() {
|
||||||
|
kvCmd.AddCommand(zookeeperCmd)
|
||||||
|
}
|
||||||
|
|
||||||
|
func zookeeperRun(baseConfig *dumper.BaseConfig, cmd *cobra.Command) error {
|
||||||
|
config, err := getKvConfig(cmd)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
config.Backend = store.ZK
|
||||||
|
zookeeper.Register()
|
||||||
|
|
||||||
|
return kv.Dump(config, baseConfig)
|
||||||
|
}
|
31
traefik/traefik-certs-dumper/docs/traefik-certs-dumper.md
Normal file
31
traefik/traefik-certs-dumper/docs/traefik-certs-dumper.md
Normal file
@@ -0,0 +1,31 @@
|
|||||||
|
## traefik-certs-dumper
|
||||||
|
|
||||||
|
Dump Let's Encrypt certificates from Traefik.
|
||||||
|
|
||||||
|
### Synopsis
|
||||||
|
|
||||||
|
Dump Let's Encrypt certificates from Traefik.
|
||||||
|
|
||||||
|
### Options
|
||||||
|
|
||||||
|
```
|
||||||
|
--clean Clean destination folder before dumping content. (default true)
|
||||||
|
--config string config file (default is $HOME/.traefik-certs-dumper.yaml)
|
||||||
|
--crt-ext string The file extension of the generated certificates. (default ".crt")
|
||||||
|
--crt-name string The file name (without extension) of the generated certificates. (default "certificate")
|
||||||
|
--dest string Path to store the dump content. (default "./dump")
|
||||||
|
--domain-subdir Use domain as sub-directory.
|
||||||
|
-h, --help help for traefik-certs-dumper
|
||||||
|
--key-ext string The file extension of the generated private keys. (default ".key")
|
||||||
|
--key-name string The file name (without extension) of the generated private keys. (default "privatekey")
|
||||||
|
--post-hook string Execute a command only if changes occurs on the data source. (works only with the watch mode)
|
||||||
|
--watch Enable watching changes.
|
||||||
|
```
|
||||||
|
|
||||||
|
### SEE ALSO
|
||||||
|
|
||||||
|
* [traefik-certs-dumper file](traefik-certs-dumper_file.md) - Dump the content of the "acme.json" file.
|
||||||
|
* [traefik-certs-dumper kv](traefik-certs-dumper_kv.md) - Dump the content of a KV store.
|
||||||
|
* [traefik-certs-dumper version](traefik-certs-dumper_version.md) - Display version
|
||||||
|
|
||||||
|
###### Auto generated by spf13/cobra on 25-Apr-2019
|
@@ -0,0 +1,39 @@
|
|||||||
|
## traefik-certs-dumper file
|
||||||
|
|
||||||
|
Dump the content of the "acme.json" file.
|
||||||
|
|
||||||
|
### Synopsis
|
||||||
|
|
||||||
|
Dump the content of the "acme.json" file from Traefik to certificates.
|
||||||
|
|
||||||
|
```
|
||||||
|
traefik-certs-dumper file [flags]
|
||||||
|
```
|
||||||
|
|
||||||
|
### Options
|
||||||
|
|
||||||
|
```
|
||||||
|
-h, --help help for file
|
||||||
|
--source string Path to 'acme.json' file. (default "./acme.json")
|
||||||
|
```
|
||||||
|
|
||||||
|
### Options inherited from parent commands
|
||||||
|
|
||||||
|
```
|
||||||
|
--clean Clean destination folder before dumping content. (default true)
|
||||||
|
--config string config file (default is $HOME/.traefik-certs-dumper.yaml)
|
||||||
|
--crt-ext string The file extension of the generated certificates. (default ".crt")
|
||||||
|
--crt-name string The file name (without extension) of the generated certificates. (default "certificate")
|
||||||
|
--dest string Path to store the dump content. (default "./dump")
|
||||||
|
--domain-subdir Use domain as sub-directory.
|
||||||
|
--key-ext string The file extension of the generated private keys. (default ".key")
|
||||||
|
--key-name string The file name (without extension) of the generated private keys. (default "privatekey")
|
||||||
|
--post-hook string Execute a command only if changes occurs on the data source. (works only with the watch mode)
|
||||||
|
--watch Enable watching changes.
|
||||||
|
```
|
||||||
|
|
||||||
|
### SEE ALSO
|
||||||
|
|
||||||
|
* [traefik-certs-dumper](traefik-certs-dumper.md) - Dump Let's Encrypt certificates from Traefik.
|
||||||
|
|
||||||
|
###### Auto generated by spf13/cobra on 25-Apr-2019
|
49
traefik/traefik-certs-dumper/docs/traefik-certs-dumper_kv.md
Normal file
49
traefik/traefik-certs-dumper/docs/traefik-certs-dumper_kv.md
Normal file
@@ -0,0 +1,49 @@
|
|||||||
|
## traefik-certs-dumper kv
|
||||||
|
|
||||||
|
Dump the content of a KV store.
|
||||||
|
|
||||||
|
### Synopsis
|
||||||
|
|
||||||
|
Dump the content of a KV store.
|
||||||
|
|
||||||
|
### Options
|
||||||
|
|
||||||
|
```
|
||||||
|
--connection-timeout int Connection timeout in seconds.
|
||||||
|
--endpoints strings List of endpoints. (default [localhost:8500])
|
||||||
|
-h, --help help for kv
|
||||||
|
--password string Password for connection.
|
||||||
|
--prefix string Prefix used for KV store. (default "traefik")
|
||||||
|
--tls Enable TLS encryption.
|
||||||
|
--tls.ca string Root CA for certificate verification if TLS is enabled
|
||||||
|
--tls.ca.optional
|
||||||
|
--tls.cert string TLS cert
|
||||||
|
--tls.insecureskipverify Trust unverified certificates if TLS is enabled.
|
||||||
|
--tls.key string TLS key
|
||||||
|
--username string Username for connection.
|
||||||
|
```
|
||||||
|
|
||||||
|
### Options inherited from parent commands
|
||||||
|
|
||||||
|
```
|
||||||
|
--clean Clean destination folder before dumping content. (default true)
|
||||||
|
--config string config file (default is $HOME/.traefik-certs-dumper.yaml)
|
||||||
|
--crt-ext string The file extension of the generated certificates. (default ".crt")
|
||||||
|
--crt-name string The file name (without extension) of the generated certificates. (default "certificate")
|
||||||
|
--dest string Path to store the dump content. (default "./dump")
|
||||||
|
--domain-subdir Use domain as sub-directory.
|
||||||
|
--key-ext string The file extension of the generated private keys. (default ".key")
|
||||||
|
--key-name string The file name (without extension) of the generated private keys. (default "privatekey")
|
||||||
|
--post-hook string Execute a command only if changes occurs on the data source. (works only with the watch mode)
|
||||||
|
--watch Enable watching changes.
|
||||||
|
```
|
||||||
|
|
||||||
|
### SEE ALSO
|
||||||
|
|
||||||
|
* [traefik-certs-dumper](traefik-certs-dumper.md) - Dump Let's Encrypt certificates from Traefik.
|
||||||
|
* [traefik-certs-dumper kv boltdb](traefik-certs-dumper_kv_boltdb.md) - Dump the content of BoltDB.
|
||||||
|
* [traefik-certs-dumper kv consul](traefik-certs-dumper_kv_consul.md) - Dump the content of Consul.
|
||||||
|
* [traefik-certs-dumper kv etcd](traefik-certs-dumper_kv_etcd.md) - Dump the content of etcd.
|
||||||
|
* [traefik-certs-dumper kv zookeeper](traefik-certs-dumper_kv_zookeeper.md) - Dump the content of zookeeper.
|
||||||
|
|
||||||
|
###### Auto generated by spf13/cobra on 25-Apr-2019
|
@@ -0,0 +1,51 @@
|
|||||||
|
## traefik-certs-dumper kv boltdb
|
||||||
|
|
||||||
|
Dump the content of BoltDB.
|
||||||
|
|
||||||
|
### Synopsis
|
||||||
|
|
||||||
|
Dump the content of BoltDB.
|
||||||
|
|
||||||
|
```
|
||||||
|
traefik-certs-dumper kv boltdb [flags]
|
||||||
|
```
|
||||||
|
|
||||||
|
### Options
|
||||||
|
|
||||||
|
```
|
||||||
|
--bucket string Bucket for boltdb. (default "traefik")
|
||||||
|
-h, --help help for boltdb
|
||||||
|
--persist-connection Persist connection for boltdb.
|
||||||
|
```
|
||||||
|
|
||||||
|
### Options inherited from parent commands
|
||||||
|
|
||||||
|
```
|
||||||
|
--clean Clean destination folder before dumping content. (default true)
|
||||||
|
--config string config file (default is $HOME/.traefik-certs-dumper.yaml)
|
||||||
|
--connection-timeout int Connection timeout in seconds.
|
||||||
|
--crt-ext string The file extension of the generated certificates. (default ".crt")
|
||||||
|
--crt-name string The file name (without extension) of the generated certificates. (default "certificate")
|
||||||
|
--dest string Path to store the dump content. (default "./dump")
|
||||||
|
--domain-subdir Use domain as sub-directory.
|
||||||
|
--endpoints strings List of endpoints. (default [localhost:8500])
|
||||||
|
--key-ext string The file extension of the generated private keys. (default ".key")
|
||||||
|
--key-name string The file name (without extension) of the generated private keys. (default "privatekey")
|
||||||
|
--password string Password for connection.
|
||||||
|
--post-hook string Execute a command only if changes occurs on the data source. (works only with the watch mode)
|
||||||
|
--prefix string Prefix used for KV store. (default "traefik")
|
||||||
|
--tls Enable TLS encryption.
|
||||||
|
--tls.ca string Root CA for certificate verification if TLS is enabled
|
||||||
|
--tls.ca.optional
|
||||||
|
--tls.cert string TLS cert
|
||||||
|
--tls.insecureskipverify Trust unverified certificates if TLS is enabled.
|
||||||
|
--tls.key string TLS key
|
||||||
|
--username string Username for connection.
|
||||||
|
--watch Enable watching changes.
|
||||||
|
```
|
||||||
|
|
||||||
|
### SEE ALSO
|
||||||
|
|
||||||
|
* [traefik-certs-dumper kv](traefik-certs-dumper_kv.md) - Dump the content of a KV store.
|
||||||
|
|
||||||
|
###### Auto generated by spf13/cobra on 25-Apr-2019
|
@@ -0,0 +1,50 @@
|
|||||||
|
## traefik-certs-dumper kv consul
|
||||||
|
|
||||||
|
Dump the content of Consul.
|
||||||
|
|
||||||
|
### Synopsis
|
||||||
|
|
||||||
|
Dump the content of Consul.
|
||||||
|
|
||||||
|
```
|
||||||
|
traefik-certs-dumper kv consul [flags]
|
||||||
|
```
|
||||||
|
|
||||||
|
### Options
|
||||||
|
|
||||||
|
```
|
||||||
|
-h, --help help for consul
|
||||||
|
--token string Token for consul.
|
||||||
|
```
|
||||||
|
|
||||||
|
### Options inherited from parent commands
|
||||||
|
|
||||||
|
```
|
||||||
|
--clean Clean destination folder before dumping content. (default true)
|
||||||
|
--config string config file (default is $HOME/.traefik-certs-dumper.yaml)
|
||||||
|
--connection-timeout int Connection timeout in seconds.
|
||||||
|
--crt-ext string The file extension of the generated certificates. (default ".crt")
|
||||||
|
--crt-name string The file name (without extension) of the generated certificates. (default "certificate")
|
||||||
|
--dest string Path to store the dump content. (default "./dump")
|
||||||
|
--domain-subdir Use domain as sub-directory.
|
||||||
|
--endpoints strings List of endpoints. (default [localhost:8500])
|
||||||
|
--key-ext string The file extension of the generated private keys. (default ".key")
|
||||||
|
--key-name string The file name (without extension) of the generated private keys. (default "privatekey")
|
||||||
|
--password string Password for connection.
|
||||||
|
--post-hook string Execute a command only if changes occurs on the data source. (works only with the watch mode)
|
||||||
|
--prefix string Prefix used for KV store. (default "traefik")
|
||||||
|
--tls Enable TLS encryption.
|
||||||
|
--tls.ca string Root CA for certificate verification if TLS is enabled
|
||||||
|
--tls.ca.optional
|
||||||
|
--tls.cert string TLS cert
|
||||||
|
--tls.insecureskipverify Trust unverified certificates if TLS is enabled.
|
||||||
|
--tls.key string TLS key
|
||||||
|
--username string Username for connection.
|
||||||
|
--watch Enable watching changes.
|
||||||
|
```
|
||||||
|
|
||||||
|
### SEE ALSO
|
||||||
|
|
||||||
|
* [traefik-certs-dumper kv](traefik-certs-dumper_kv.md) - Dump the content of a KV store.
|
||||||
|
|
||||||
|
###### Auto generated by spf13/cobra on 25-Apr-2019
|
@@ -0,0 +1,50 @@
|
|||||||
|
## traefik-certs-dumper kv etcd
|
||||||
|
|
||||||
|
Dump the content of etcd.
|
||||||
|
|
||||||
|
### Synopsis
|
||||||
|
|
||||||
|
Dump the content of etcd.
|
||||||
|
|
||||||
|
```
|
||||||
|
traefik-certs-dumper kv etcd [flags]
|
||||||
|
```
|
||||||
|
|
||||||
|
### Options
|
||||||
|
|
||||||
|
```
|
||||||
|
-h, --help help for etcd
|
||||||
|
--sync-period int Sync period for etcd in seconds.
|
||||||
|
```
|
||||||
|
|
||||||
|
### Options inherited from parent commands
|
||||||
|
|
||||||
|
```
|
||||||
|
--clean Clean destination folder before dumping content. (default true)
|
||||||
|
--config string config file (default is $HOME/.traefik-certs-dumper.yaml)
|
||||||
|
--connection-timeout int Connection timeout in seconds.
|
||||||
|
--crt-ext string The file extension of the generated certificates. (default ".crt")
|
||||||
|
--crt-name string The file name (without extension) of the generated certificates. (default "certificate")
|
||||||
|
--dest string Path to store the dump content. (default "./dump")
|
||||||
|
--domain-subdir Use domain as sub-directory.
|
||||||
|
--endpoints strings List of endpoints. (default [localhost:8500])
|
||||||
|
--key-ext string The file extension of the generated private keys. (default ".key")
|
||||||
|
--key-name string The file name (without extension) of the generated private keys. (default "privatekey")
|
||||||
|
--password string Password for connection.
|
||||||
|
--post-hook string Execute a command only if changes occurs on the data source. (works only with the watch mode)
|
||||||
|
--prefix string Prefix used for KV store. (default "traefik")
|
||||||
|
--tls Enable TLS encryption.
|
||||||
|
--tls.ca string Root CA for certificate verification if TLS is enabled
|
||||||
|
--tls.ca.optional
|
||||||
|
--tls.cert string TLS cert
|
||||||
|
--tls.insecureskipverify Trust unverified certificates if TLS is enabled.
|
||||||
|
--tls.key string TLS key
|
||||||
|
--username string Username for connection.
|
||||||
|
--watch Enable watching changes.
|
||||||
|
```
|
||||||
|
|
||||||
|
### SEE ALSO
|
||||||
|
|
||||||
|
* [traefik-certs-dumper kv](traefik-certs-dumper_kv.md) - Dump the content of a KV store.
|
||||||
|
|
||||||
|
###### Auto generated by spf13/cobra on 25-Apr-2019
|
@@ -0,0 +1,49 @@
|
|||||||
|
## traefik-certs-dumper kv zookeeper
|
||||||
|
|
||||||
|
Dump the content of zookeeper.
|
||||||
|
|
||||||
|
### Synopsis
|
||||||
|
|
||||||
|
Dump the content of zookeeper.
|
||||||
|
|
||||||
|
```
|
||||||
|
traefik-certs-dumper kv zookeeper [flags]
|
||||||
|
```
|
||||||
|
|
||||||
|
### Options
|
||||||
|
|
||||||
|
```
|
||||||
|
-h, --help help for zookeeper
|
||||||
|
```
|
||||||
|
|
||||||
|
### Options inherited from parent commands
|
||||||
|
|
||||||
|
```
|
||||||
|
--clean Clean destination folder before dumping content. (default true)
|
||||||
|
--config string config file (default is $HOME/.traefik-certs-dumper.yaml)
|
||||||
|
--connection-timeout int Connection timeout in seconds.
|
||||||
|
--crt-ext string The file extension of the generated certificates. (default ".crt")
|
||||||
|
--crt-name string The file name (without extension) of the generated certificates. (default "certificate")
|
||||||
|
--dest string Path to store the dump content. (default "./dump")
|
||||||
|
--domain-subdir Use domain as sub-directory.
|
||||||
|
--endpoints strings List of endpoints. (default [localhost:8500])
|
||||||
|
--key-ext string The file extension of the generated private keys. (default ".key")
|
||||||
|
--key-name string The file name (without extension) of the generated private keys. (default "privatekey")
|
||||||
|
--password string Password for connection.
|
||||||
|
--post-hook string Execute a command only if changes occurs on the data source. (works only with the watch mode)
|
||||||
|
--prefix string Prefix used for KV store. (default "traefik")
|
||||||
|
--tls Enable TLS encryption.
|
||||||
|
--tls.ca string Root CA for certificate verification if TLS is enabled
|
||||||
|
--tls.ca.optional
|
||||||
|
--tls.cert string TLS cert
|
||||||
|
--tls.insecureskipverify Trust unverified certificates if TLS is enabled.
|
||||||
|
--tls.key string TLS key
|
||||||
|
--username string Username for connection.
|
||||||
|
--watch Enable watching changes.
|
||||||
|
```
|
||||||
|
|
||||||
|
### SEE ALSO
|
||||||
|
|
||||||
|
* [traefik-certs-dumper kv](traefik-certs-dumper_kv.md) - Dump the content of a KV store.
|
||||||
|
|
||||||
|
###### Auto generated by spf13/cobra on 25-Apr-2019
|
@@ -0,0 +1,38 @@
|
|||||||
|
## traefik-certs-dumper version
|
||||||
|
|
||||||
|
Display version
|
||||||
|
|
||||||
|
### Synopsis
|
||||||
|
|
||||||
|
Display version
|
||||||
|
|
||||||
|
```
|
||||||
|
traefik-certs-dumper version [flags]
|
||||||
|
```
|
||||||
|
|
||||||
|
### Options
|
||||||
|
|
||||||
|
```
|
||||||
|
-h, --help help for version
|
||||||
|
```
|
||||||
|
|
||||||
|
### Options inherited from parent commands
|
||||||
|
|
||||||
|
```
|
||||||
|
--clean Clean destination folder before dumping content. (default true)
|
||||||
|
--config string config file (default is $HOME/.traefik-certs-dumper.yaml)
|
||||||
|
--crt-ext string The file extension of the generated certificates. (default ".crt")
|
||||||
|
--crt-name string The file name (without extension) of the generated certificates. (default "certificate")
|
||||||
|
--dest string Path to store the dump content. (default "./dump")
|
||||||
|
--domain-subdir Use domain as sub-directory.
|
||||||
|
--key-ext string The file extension of the generated private keys. (default ".key")
|
||||||
|
--key-name string The file name (without extension) of the generated private keys. (default "privatekey")
|
||||||
|
--post-hook string Execute a command only if changes occurs on the data source. (works only with the watch mode)
|
||||||
|
--watch Enable watching changes.
|
||||||
|
```
|
||||||
|
|
||||||
|
### SEE ALSO
|
||||||
|
|
||||||
|
* [traefik-certs-dumper](traefik-certs-dumper.md) - Dump Let's Encrypt certificates from Traefik.
|
||||||
|
|
||||||
|
###### Auto generated by spf13/cobra on 25-Apr-2019
|
12
traefik/traefik-certs-dumper/dumper/config.go
Normal file
12
traefik/traefik-certs-dumper/dumper/config.go
Normal file
@@ -0,0 +1,12 @@
|
|||||||
|
package dumper
|
||||||
|
|
||||||
|
// BaseConfig Base dump command configuration.
|
||||||
|
type BaseConfig struct {
|
||||||
|
DumpPath string
|
||||||
|
CrtInfo FileInfo
|
||||||
|
KeyInfo FileInfo
|
||||||
|
DomainSubDir bool
|
||||||
|
Clean bool
|
||||||
|
Watch bool
|
||||||
|
Hook string
|
||||||
|
}
|
129
traefik/traefik-certs-dumper/dumper/dumper.go
Normal file
129
traefik/traefik-certs-dumper/dumper/dumper.go
Normal file
@@ -0,0 +1,129 @@
|
|||||||
|
package dumper
|
||||||
|
|
||||||
|
import (
|
||||||
|
"encoding/pem"
|
||||||
|
"io/ioutil"
|
||||||
|
"os"
|
||||||
|
"path/filepath"
|
||||||
|
|
||||||
|
"github.com/go-acme/lego/certcrypto"
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
certsSubDir = "certs"
|
||||||
|
keysSubDir = "private"
|
||||||
|
)
|
||||||
|
|
||||||
|
// FileInfo File information.
|
||||||
|
type FileInfo struct {
|
||||||
|
Name string
|
||||||
|
Ext string
|
||||||
|
}
|
||||||
|
|
||||||
|
// Dump Dumps data to certificates.
|
||||||
|
func Dump(data *StoredData, baseConfig *BaseConfig) error {
|
||||||
|
if baseConfig.Clean {
|
||||||
|
err := cleanDir(baseConfig.DumpPath)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if !baseConfig.DomainSubDir {
|
||||||
|
if err := os.MkdirAll(filepath.Join(baseConfig.DumpPath, certsSubDir), 0755); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := os.MkdirAll(filepath.Join(baseConfig.DumpPath, keysSubDir), 0755); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
privateKeyPem := extractPEMPrivateKey(data.Account)
|
||||||
|
err := ioutil.WriteFile(filepath.Join(baseConfig.DumpPath, keysSubDir, "letsencrypt"+baseConfig.KeyInfo.Ext), privateKeyPem, 0600)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, cert := range data.Certificates {
|
||||||
|
err := writeCert(baseConfig.DumpPath, cert, baseConfig.CrtInfo, baseConfig.DomainSubDir)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
err = writeKey(baseConfig.DumpPath, cert, baseConfig.KeyInfo, baseConfig.DomainSubDir)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func writeCert(dumpPath string, cert *Certificate, info FileInfo, domainSubDir bool) error {
|
||||||
|
certPath := filepath.Join(dumpPath, certsSubDir, safeName(cert.Domain.Main+info.Ext))
|
||||||
|
if domainSubDir {
|
||||||
|
certPath = filepath.Join(dumpPath, safeName(cert.Domain.Main), info.Name+info.Ext)
|
||||||
|
if err := os.MkdirAll(filepath.Join(dumpPath, safeName(cert.Domain.Main)), 0755); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return ioutil.WriteFile(certPath, cert.Certificate, 0666)
|
||||||
|
}
|
||||||
|
|
||||||
|
func writeKey(dumpPath string, cert *Certificate, info FileInfo, domainSubDir bool) error {
|
||||||
|
keyPath := filepath.Join(dumpPath, keysSubDir, safeName(cert.Domain.Main+info.Ext))
|
||||||
|
if domainSubDir {
|
||||||
|
keyPath = filepath.Join(dumpPath, safeName(cert.Domain.Main), info.Name+info.Ext)
|
||||||
|
if err := os.MkdirAll(filepath.Join(dumpPath, safeName(cert.Domain.Main)), 0755); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return ioutil.WriteFile(keyPath, cert.Key, 0600)
|
||||||
|
}
|
||||||
|
|
||||||
|
func extractPEMPrivateKey(account *Account) []byte {
|
||||||
|
var block *pem.Block
|
||||||
|
switch account.KeyType {
|
||||||
|
case certcrypto.RSA2048, certcrypto.RSA4096, certcrypto.RSA8192:
|
||||||
|
block = &pem.Block{
|
||||||
|
Type: "RSA PRIVATE KEY",
|
||||||
|
Bytes: account.PrivateKey,
|
||||||
|
}
|
||||||
|
case certcrypto.EC256, certcrypto.EC384:
|
||||||
|
block = &pem.Block{
|
||||||
|
Type: "EC PRIVATE KEY",
|
||||||
|
Bytes: account.PrivateKey,
|
||||||
|
}
|
||||||
|
default:
|
||||||
|
panic("unsupported key type")
|
||||||
|
}
|
||||||
|
|
||||||
|
return pem.EncodeToMemory(block)
|
||||||
|
}
|
||||||
|
|
||||||
|
func cleanDir(dumpPath string) error {
|
||||||
|
_, errExists := os.Stat(dumpPath)
|
||||||
|
if os.IsNotExist(errExists) {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
if errExists != nil {
|
||||||
|
return errExists
|
||||||
|
}
|
||||||
|
|
||||||
|
dir, err := ioutil.ReadDir(dumpPath)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, f := range dir {
|
||||||
|
if err := os.RemoveAll(filepath.Join(dumpPath, f.Name())); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
167
traefik/traefik-certs-dumper/dumper/file/file.go
Normal file
167
traefik/traefik-certs-dumper/dumper/file/file.go
Normal file
@@ -0,0 +1,167 @@
|
|||||||
|
package file
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bytes"
|
||||||
|
"crypto/md5"
|
||||||
|
"encoding/json"
|
||||||
|
"io"
|
||||||
|
"log"
|
||||||
|
"os"
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
"github.com/fsnotify/fsnotify"
|
||||||
|
"github.com/ldez/traefik-certs-dumper/v2/dumper"
|
||||||
|
"github.com/ldez/traefik-certs-dumper/v2/hook"
|
||||||
|
)
|
||||||
|
|
||||||
|
// Dump Dumps "acme.json" file to certificates.
|
||||||
|
func Dump(acmeFile string, baseConfig *dumper.BaseConfig) error {
|
||||||
|
err := dump(acmeFile, baseConfig)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if baseConfig.Watch {
|
||||||
|
return watch(acmeFile, baseConfig)
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func dump(acmeFile string, baseConfig *dumper.BaseConfig) error {
|
||||||
|
data, err := readFile(acmeFile)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
return dumper.Dump(data, baseConfig)
|
||||||
|
}
|
||||||
|
|
||||||
|
func readFile(acmeFile string) (*dumper.StoredData, error) {
|
||||||
|
source, err := os.Open(acmeFile)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
data := &dumper.StoredData{}
|
||||||
|
if err = json.NewDecoder(source).Decode(data); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
return data, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func watch(acmeFile string, baseConfig *dumper.BaseConfig) error {
|
||||||
|
watcher, err := fsnotify.NewWatcher()
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
defer func() { _ = watcher.Close() }()
|
||||||
|
|
||||||
|
done := make(chan bool)
|
||||||
|
go func() {
|
||||||
|
var previousHash []byte
|
||||||
|
|
||||||
|
for {
|
||||||
|
select {
|
||||||
|
case event, ok := <-watcher.Events:
|
||||||
|
if !ok {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
if isDebug() {
|
||||||
|
log.Println("event:", event)
|
||||||
|
}
|
||||||
|
|
||||||
|
hash, errW := manageEvent(watcher, event, acmeFile, previousHash, baseConfig)
|
||||||
|
if errW != nil {
|
||||||
|
log.Println("error:", errW)
|
||||||
|
done <- true
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
previousHash = hash
|
||||||
|
|
||||||
|
case errW, ok := <-watcher.Errors:
|
||||||
|
if !ok {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
log.Println("error:", errW)
|
||||||
|
done <- true
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
|
||||||
|
err = watcher.Add(acmeFile)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
<-done
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func manageEvent(watcher *fsnotify.Watcher, event fsnotify.Event, acmeFile string, previousHash []byte, baseConfig *dumper.BaseConfig) ([]byte, error) {
|
||||||
|
err := manageRename(watcher, event, acmeFile)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
hash, err := calculateHash(acmeFile)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
if !bytes.Equal(previousHash, hash) {
|
||||||
|
if isDebug() {
|
||||||
|
log.Println("detected changes on file:", event.Name)
|
||||||
|
}
|
||||||
|
|
||||||
|
if errD := dump(acmeFile, baseConfig); errD != nil {
|
||||||
|
return nil, errD
|
||||||
|
}
|
||||||
|
|
||||||
|
if isDebug() {
|
||||||
|
log.Println("Dumped new certificate data.")
|
||||||
|
}
|
||||||
|
|
||||||
|
hook.Exec(baseConfig.Hook)
|
||||||
|
}
|
||||||
|
|
||||||
|
return hash, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func manageRename(watcher *fsnotify.Watcher, event fsnotify.Event, acmeFile string) error {
|
||||||
|
if event.Op&fsnotify.Rename != fsnotify.Rename {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := watcher.Remove(acmeFile); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
return watcher.Add(acmeFile)
|
||||||
|
}
|
||||||
|
|
||||||
|
func calculateHash(acmeFile string) ([]byte, error) {
|
||||||
|
file, err := os.Open(acmeFile)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
defer func() { _ = file.Close() }()
|
||||||
|
|
||||||
|
h := md5.New()
|
||||||
|
_, err = io.Copy(h, file)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
return h.Sum(nil), nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func isDebug() bool {
|
||||||
|
return strings.EqualFold(os.Getenv("TCD_DEBUG"), "true")
|
||||||
|
}
|
7
traefik/traefik-certs-dumper/dumper/filename.go
Normal file
7
traefik/traefik-certs-dumper/dumper/filename.go
Normal file
@@ -0,0 +1,7 @@
|
|||||||
|
// +build !windows
|
||||||
|
|
||||||
|
package dumper
|
||||||
|
|
||||||
|
func safeName(filename string) string {
|
||||||
|
return filename
|
||||||
|
}
|
9
traefik/traefik-certs-dumper/dumper/filename_windows.go
Normal file
9
traefik/traefik-certs-dumper/dumper/filename_windows.go
Normal file
@@ -0,0 +1,9 @@
|
|||||||
|
// +build windows
|
||||||
|
|
||||||
|
package dumper
|
||||||
|
|
||||||
|
import "strings"
|
||||||
|
|
||||||
|
func safeName(filename string) string {
|
||||||
|
return strings.ReplaceAll(filename, "*", "_")
|
||||||
|
}
|
35
traefik/traefik-certs-dumper/dumper/info.go
Normal file
35
traefik/traefik-certs-dumper/dumper/info.go
Normal file
@@ -0,0 +1,35 @@
|
|||||||
|
package dumper
|
||||||
|
|
||||||
|
import (
|
||||||
|
"github.com/go-acme/lego/certcrypto"
|
||||||
|
"github.com/go-acme/lego/registration"
|
||||||
|
)
|
||||||
|
|
||||||
|
// StoredData represents the data managed by the Store
|
||||||
|
type StoredData struct {
|
||||||
|
Account *Account
|
||||||
|
Certificates []*Certificate
|
||||||
|
HTTPChallenges map[string]map[string][]byte
|
||||||
|
TLSChallenges map[string]*Certificate
|
||||||
|
}
|
||||||
|
|
||||||
|
// Certificate is a struct which contains all data needed from an ACME certificate
|
||||||
|
type Certificate struct {
|
||||||
|
Domain Domain
|
||||||
|
Certificate []byte
|
||||||
|
Key []byte
|
||||||
|
}
|
||||||
|
|
||||||
|
// Domain holds a domain name with SANs
|
||||||
|
type Domain struct {
|
||||||
|
Main string
|
||||||
|
SANs []string
|
||||||
|
}
|
||||||
|
|
||||||
|
// Account is used to store lets encrypt registration info
|
||||||
|
type Account struct {
|
||||||
|
Email string
|
||||||
|
Registration *registration.Resource
|
||||||
|
PrivateKey []byte
|
||||||
|
KeyType certcrypto.KeyType
|
||||||
|
}
|
11
traefik/traefik-certs-dumper/dumper/kv/config.go
Normal file
11
traefik/traefik-certs-dumper/dumper/kv/config.go
Normal file
@@ -0,0 +1,11 @@
|
|||||||
|
package kv
|
||||||
|
|
||||||
|
import "github.com/abronan/valkeyrie/store"
|
||||||
|
|
||||||
|
// Config KV configuration.
|
||||||
|
type Config struct {
|
||||||
|
Backend store.Backend
|
||||||
|
Prefix string
|
||||||
|
Endpoints []string
|
||||||
|
Options *store.Config
|
||||||
|
}
|
65
traefik/traefik-certs-dumper/dumper/kv/convert.go
Normal file
65
traefik/traefik-certs-dumper/dumper/kv/convert.go
Normal file
@@ -0,0 +1,65 @@
|
|||||||
|
package kv
|
||||||
|
|
||||||
|
import (
|
||||||
|
"github.com/go-acme/lego/certcrypto"
|
||||||
|
"github.com/go-acme/lego/registration"
|
||||||
|
"github.com/ldez/traefik-certs-dumper/v2/dumper"
|
||||||
|
)
|
||||||
|
|
||||||
|
// CertificateV1 is used to store certificate info
|
||||||
|
type CertificateV1 struct {
|
||||||
|
Domain string
|
||||||
|
CertURL string
|
||||||
|
CertStableURL string
|
||||||
|
PrivateKey []byte
|
||||||
|
Certificate []byte
|
||||||
|
}
|
||||||
|
|
||||||
|
// AccountV1 is used to store lets encrypt registration info
|
||||||
|
type AccountV1 struct {
|
||||||
|
Email string
|
||||||
|
Registration *registration.Resource
|
||||||
|
PrivateKey []byte
|
||||||
|
KeyType certcrypto.KeyType
|
||||||
|
DomainsCertificate DomainsCertificates
|
||||||
|
ChallengeCerts map[string]*ChallengeCert
|
||||||
|
HTTPChallenge map[string]map[string][]byte
|
||||||
|
}
|
||||||
|
|
||||||
|
// DomainsCertificates stores a certificate for multiple domains
|
||||||
|
type DomainsCertificates struct {
|
||||||
|
Certs []*DomainsCertificate
|
||||||
|
}
|
||||||
|
|
||||||
|
// ChallengeCert stores a challenge certificate
|
||||||
|
type ChallengeCert struct {
|
||||||
|
Certificate []byte
|
||||||
|
PrivateKey []byte
|
||||||
|
}
|
||||||
|
|
||||||
|
// DomainsCertificate contains a certificate for multiple domains
|
||||||
|
type DomainsCertificate struct {
|
||||||
|
Domains dumper.Domain
|
||||||
|
Certificate *CertificateV1
|
||||||
|
}
|
||||||
|
|
||||||
|
// convertAccountV1ToV2 converts account information from version 1 to 2
|
||||||
|
func convertAccountV1ToV2(account *AccountV1) *dumper.StoredData {
|
||||||
|
storedData := &dumper.StoredData{}
|
||||||
|
storedData.Account = &dumper.Account{
|
||||||
|
PrivateKey: account.PrivateKey,
|
||||||
|
Registration: account.Registration,
|
||||||
|
Email: account.Email,
|
||||||
|
KeyType: account.KeyType,
|
||||||
|
}
|
||||||
|
var certs []*dumper.Certificate
|
||||||
|
for _, oldCert := range account.DomainsCertificate.Certs {
|
||||||
|
certs = append(certs, &dumper.Certificate{
|
||||||
|
Certificate: oldCert.Certificate.Certificate,
|
||||||
|
Domain: oldCert.Domains,
|
||||||
|
Key: oldCert.Certificate.PrivateKey,
|
||||||
|
})
|
||||||
|
}
|
||||||
|
storedData.Certificates = certs
|
||||||
|
return storedData
|
||||||
|
}
|
99
traefik/traefik-certs-dumper/dumper/kv/kv.go
Normal file
99
traefik/traefik-certs-dumper/dumper/kv/kv.go
Normal file
@@ -0,0 +1,99 @@
|
|||||||
|
package kv
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bytes"
|
||||||
|
"compress/gzip"
|
||||||
|
"encoding/json"
|
||||||
|
"fmt"
|
||||||
|
"io/ioutil"
|
||||||
|
"log"
|
||||||
|
"os"
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
"github.com/abronan/valkeyrie"
|
||||||
|
"github.com/abronan/valkeyrie/store"
|
||||||
|
"github.com/ldez/traefik-certs-dumper/v2/dumper"
|
||||||
|
"github.com/ldez/traefik-certs-dumper/v2/hook"
|
||||||
|
)
|
||||||
|
|
||||||
|
const storeKeySuffix = "/acme/account/object"
|
||||||
|
|
||||||
|
// Dump Dumps KV content to certificates.
|
||||||
|
func Dump(config *Config, baseConfig *dumper.BaseConfig) error {
|
||||||
|
kvStore, err := valkeyrie.NewStore(config.Backend, config.Endpoints, config.Options)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to create client of the store: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
storeKey := config.Prefix + storeKeySuffix
|
||||||
|
|
||||||
|
if baseConfig.Watch {
|
||||||
|
return watch(kvStore, storeKey, baseConfig)
|
||||||
|
}
|
||||||
|
|
||||||
|
pair, err := kvStore.Get(storeKey, nil)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to retrieve %s value: %v", storeKey, err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return dumpPair(pair, baseConfig)
|
||||||
|
}
|
||||||
|
|
||||||
|
func watch(kvStore store.Store, storeKey string, baseConfig *dumper.BaseConfig) error {
|
||||||
|
stopCh := make(<-chan struct{})
|
||||||
|
|
||||||
|
pairs, err := kvStore.Watch(storeKey, stopCh, nil)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
for {
|
||||||
|
pair := <-pairs
|
||||||
|
if pair == nil {
|
||||||
|
return fmt.Errorf("could not fetch Key/Value pair for key %v", storeKey)
|
||||||
|
}
|
||||||
|
|
||||||
|
err = dumpPair(pair, baseConfig)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if isDebug() {
|
||||||
|
log.Println("Dumped new certificate data.")
|
||||||
|
}
|
||||||
|
|
||||||
|
hook.Exec(baseConfig.Hook)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func dumpPair(pair *store.KVPair, baseConfig *dumper.BaseConfig) error {
|
||||||
|
data, err := getStoredDataFromGzip(pair)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
return dumper.Dump(data, baseConfig)
|
||||||
|
}
|
||||||
|
|
||||||
|
func getStoredDataFromGzip(pair *store.KVPair) (*dumper.StoredData, error) {
|
||||||
|
reader, err := gzip.NewReader(bytes.NewBuffer(pair.Value))
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("fail to create GZip reader: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
acmeData, err := ioutil.ReadAll(reader)
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("unable to read the pair content: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
account := &AccountV1{}
|
||||||
|
if err := json.Unmarshal(acmeData, &account); err != nil {
|
||||||
|
return nil, fmt.Errorf("unable marshal AccountV1: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return convertAccountV1ToV2(account), nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func isDebug() bool {
|
||||||
|
return strings.EqualFold(os.Getenv("TCD_DEBUG"), "true")
|
||||||
|
}
|
51
traefik/traefik-certs-dumper/go.mod
Normal file
51
traefik/traefik-certs-dumper/go.mod
Normal file
@@ -0,0 +1,51 @@
|
|||||||
|
module github.com/ldez/traefik-certs-dumper/v2
|
||||||
|
|
||||||
|
go 1.12
|
||||||
|
|
||||||
|
require (
|
||||||
|
github.com/abronan/valkeyrie v0.0.0-20190419181538-ccf7df650fe4
|
||||||
|
github.com/cenkalti/backoff v2.1.1+incompatible // indirect
|
||||||
|
github.com/coreos/bbolt v1.3.2 // indirect
|
||||||
|
github.com/coreos/go-systemd v0.0.0-20190321100706-95778dfbb74e // indirect
|
||||||
|
github.com/coreos/pkg v0.0.0-20180928190104-399ea9e2e55f // indirect
|
||||||
|
github.com/cpuguy83/go-md2man v1.0.10 // indirect
|
||||||
|
github.com/dgrijalva/jwt-go v3.2.0+incompatible // indirect
|
||||||
|
github.com/docker/distribution v2.7.1+incompatible
|
||||||
|
github.com/fsnotify/fsnotify v1.4.7
|
||||||
|
github.com/go-acme/lego v2.5.0+incompatible
|
||||||
|
github.com/golang/groupcache v0.0.0-20190129154638-5b532d6fd5ef // indirect
|
||||||
|
github.com/google/btree v1.0.0 // indirect
|
||||||
|
github.com/gorilla/websocket v1.4.0 // indirect
|
||||||
|
github.com/grpc-ecosystem/go-grpc-middleware v1.0.0 // indirect
|
||||||
|
github.com/grpc-ecosystem/go-grpc-prometheus v1.2.0 // indirect
|
||||||
|
github.com/grpc-ecosystem/grpc-gateway v1.8.5 // indirect
|
||||||
|
github.com/hashicorp/go-msgpack v0.5.4 // indirect
|
||||||
|
github.com/hashicorp/go-uuid v1.0.1 // indirect
|
||||||
|
github.com/hashicorp/memberlist v0.1.3 // indirect
|
||||||
|
github.com/inconshreveable/mousetrap v1.0.0 // indirect
|
||||||
|
github.com/jonboulle/clockwork v0.1.0 // indirect
|
||||||
|
github.com/mitchellh/go-homedir v1.1.0
|
||||||
|
github.com/mitchellh/go-testing-interface v1.0.0 // indirect
|
||||||
|
github.com/opencontainers/go-digest v1.0.0-rc1 // indirect
|
||||||
|
github.com/opencontainers/image-spec v1.0.1 // indirect
|
||||||
|
github.com/pascaldekloe/goe v0.1.0 // indirect
|
||||||
|
github.com/pkg/errors v0.8.1 // indirect
|
||||||
|
github.com/prometheus/client_golang v0.9.2 // indirect
|
||||||
|
github.com/prometheus/client_model v0.0.0-20190129233127-fd36f4220a90 // indirect
|
||||||
|
github.com/sirupsen/logrus v1.4.1 // indirect
|
||||||
|
github.com/soheilhy/cmux v0.1.4 // indirect
|
||||||
|
github.com/spf13/cobra v0.0.3
|
||||||
|
github.com/spf13/viper v1.3.2
|
||||||
|
github.com/tmc/grpc-websocket-proxy v0.0.0-20190109142713-0ad062ec5ee5 // indirect
|
||||||
|
github.com/xiang90/probing v0.0.0-20190116061207-43a291ad63a2 // indirect
|
||||||
|
go.uber.org/atomic v1.3.2 // indirect
|
||||||
|
go.uber.org/multierr v1.1.0 // indirect
|
||||||
|
go.uber.org/zap v1.9.1 // indirect
|
||||||
|
golang.org/x/time v0.0.0-20190308202827-9d24e82272b4 // indirect
|
||||||
|
gopkg.in/square/go-jose.v2 v2.3.1 // indirect
|
||||||
|
)
|
||||||
|
|
||||||
|
replace (
|
||||||
|
github.com/ugorji/go => github.com/ugorji/go v1.1.2-0.20181022190402-e5e69e061d4f
|
||||||
|
github.com/ugorji/go/codec v0.0.0-20181204163529-d75b2dcb6bc8 => github.com/ugorji/go/codec v1.1.2-0.20181022190402-e5e69e061d4f
|
||||||
|
)
|
177
traefik/traefik-certs-dumper/go.sum
Normal file
177
traefik/traefik-certs-dumper/go.sum
Normal file
@@ -0,0 +1,177 @@
|
|||||||
|
cloud.google.com/go v0.26.0/go.mod h1:aQUYkXzVsufM+DwF1aE+0xfcU+56JwCaLick0ClmMTw=
|
||||||
|
github.com/BurntSushi/toml v0.3.1/go.mod h1:xHWCNGjB5oqiDr8zfno3MHue2Ht5sIBksp03qcyfWMU=
|
||||||
|
github.com/abronan/valkeyrie v0.0.0-20190419181538-ccf7df650fe4 h1:DrTAEU8rVfy2tRZObh8Hdjs819By7XfFhoOKh8xqX7Y=
|
||||||
|
github.com/abronan/valkeyrie v0.0.0-20190419181538-ccf7df650fe4/go.mod h1:NOvlKBjVll/vPwdjPHGLNhKk7VrnLzLGU/VGOVPLiog=
|
||||||
|
github.com/armon/consul-api v0.0.0-20180202201655-eb2c6b5be1b6/go.mod h1:grANhF5doyWs3UAsr3K4I6qtAmlQcZDesFNEHPZAzj8=
|
||||||
|
github.com/armon/go-metrics v0.0.0-20180917152333-f0300d1749da/go.mod h1:Q73ZrmVTwzkszR9V5SSuryQ31EELlFMUz1kKyl939pY=
|
||||||
|
github.com/aws/aws-sdk-go v1.16.23/go.mod h1:KmX6BPdI08NWTb3/sm4ZGu5ShLoqVDhKgpiN924inxo=
|
||||||
|
github.com/beorn7/perks v0.0.0-20180321164747-3a771d992973/go.mod h1:Dwedo/Wpr24TaqPxmxbtue+5NUziq4I4S80YR8gNf3Q=
|
||||||
|
github.com/cenkalti/backoff v2.1.1+incompatible h1:tKJnvO2kl0zmb/jA5UKAt4VoEVw1qxKWjE/Bpp46npY=
|
||||||
|
github.com/cenkalti/backoff v2.1.1+incompatible/go.mod h1:90ReRw6GdpyfrHakVjL/QHaoyV4aDUVVkXQJJJ3NXXM=
|
||||||
|
github.com/client9/misspell v0.3.4/go.mod h1:qj6jICC3Q7zFZvVWo7KLAzC3yx5G7kyvSDkc90ppPyw=
|
||||||
|
github.com/coreos/bbolt v1.3.2/go.mod h1:iRUV2dpdMOn7Bo10OQBFzIJO9kkE559Wcmn+qkEiiKk=
|
||||||
|
github.com/coreos/etcd v3.3.10+incompatible/go.mod h1:uF7uidLiAD3TWHmW31ZFd/JWoc32PjwdhPthX9715RE=
|
||||||
|
github.com/coreos/etcd v3.3.11+incompatible h1:0gCnqKsq7XxMi69JsnbmMc1o+RJH3XH64sV9aiTTYko=
|
||||||
|
github.com/coreos/etcd v3.3.11+incompatible/go.mod h1:uF7uidLiAD3TWHmW31ZFd/JWoc32PjwdhPthX9715RE=
|
||||||
|
github.com/coreos/go-etcd v2.0.0+incompatible/go.mod h1:Jez6KQU2B/sWsbdaef3ED8NzMklzPG4d5KIOhIy30Tk=
|
||||||
|
github.com/coreos/go-semver v0.2.0 h1:3Jm3tLmsgAYcjC+4Up7hJrFBPr+n7rAqYeSw/SZazuY=
|
||||||
|
github.com/coreos/go-semver v0.2.0/go.mod h1:nnelYz7RCh+5ahJtPPxZlU+153eP4D4r3EedlOD2RNk=
|
||||||
|
github.com/coreos/go-systemd v0.0.0-20190321100706-95778dfbb74e/go.mod h1:F5haX7vjVVG0kc13fIWeqUViNPyEJxv/OmvnBo0Yme4=
|
||||||
|
github.com/coreos/pkg v0.0.0-20180928190104-399ea9e2e55f/go.mod h1:E3G3o1h8I7cfcXa63jLwjI0eiQQMgzzUDFVpN/nH/eA=
|
||||||
|
github.com/cpuguy83/go-md2man v1.0.10 h1:BSKMNlYxDvnunlTymqtgONjNnaRV1sTpcovwwjF22jk=
|
||||||
|
github.com/cpuguy83/go-md2man v1.0.10/go.mod h1:SmD6nW6nTyfqj6ABTjUi3V3JVMnlJmwcJI5acqYI6dE=
|
||||||
|
github.com/davecgh/go-spew v1.1.0/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
|
||||||
|
github.com/davecgh/go-spew v1.1.1/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
|
||||||
|
github.com/dgrijalva/jwt-go v3.2.0+incompatible/go.mod h1:E3ru+11k8xSBh+hMPgOLZmtrrCbhqsmaPHjLKYnJCaQ=
|
||||||
|
github.com/docker/distribution v2.7.1+incompatible h1:a5mlkVzth6W5A4fOsS3D2EO5BUmsJpcB+cRlLU7cSug=
|
||||||
|
github.com/docker/distribution v2.7.1+incompatible/go.mod h1:J2gT2udsDAN96Uj4KfcMRqY0/ypR+oyYUYmja8H+y+w=
|
||||||
|
github.com/fsnotify/fsnotify v1.4.7 h1:IXs+QLmnXW2CcXuY+8Mzv/fWEsPGWxqefPtCP5CnV9I=
|
||||||
|
github.com/fsnotify/fsnotify v1.4.7/go.mod h1:jwhsz4b93w/PPRr/qN1Yymfu8t87LnFCMoQvtojpjFo=
|
||||||
|
github.com/ghodss/yaml v1.0.0/go.mod h1:4dBDuWmgqj2HViK6kFavaiC9ZROes6MMH2rRYeMEF04=
|
||||||
|
github.com/go-acme/lego v2.5.0+incompatible h1:5fNN9yRQfv8ymH3DSsxla+4aYeQt2IgfZqHKVnK8f0s=
|
||||||
|
github.com/go-acme/lego v2.5.0+incompatible/go.mod h1:yzMNe9CasVUhkquNvti5nAtPmG94USbYxYrZfTkIn0M=
|
||||||
|
github.com/gogo/protobuf v1.2.0 h1:xU6/SpYbvkNYiptHJYEDRseDLvYE7wSqhYYNy0QSUzI=
|
||||||
|
github.com/gogo/protobuf v1.2.0/go.mod h1:r8qH/GZQm5c6nD/R0oafs1akxWv10x8SbQlK7atdtwQ=
|
||||||
|
github.com/golang/glog v0.0.0-20160126235308-23def4e6c14b/go.mod h1:SBH7ygxi8pfUlaOkMMuAQtPIUF8ecWP5IEl/CR7VP2Q=
|
||||||
|
github.com/golang/groupcache v0.0.0-20190129154638-5b532d6fd5ef/go.mod h1:cIg4eruTrX1D+g88fzRXU5OdNfaM+9IcxsU14FzY7Hc=
|
||||||
|
github.com/golang/mock v1.1.1/go.mod h1:oTYuIxOrZwtPieC+H1uAHpcLFnEyAGVDL/k47Jfbm0A=
|
||||||
|
github.com/golang/protobuf v1.2.0 h1:P3YflyNX/ehuJFLhxviNdFxQPkGK5cDcApsge1SqnvM=
|
||||||
|
github.com/golang/protobuf v1.2.0/go.mod h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5yJMmIC1U=
|
||||||
|
github.com/google/btree v0.0.0-20180813153112-4030bb1f1f0c/go.mod h1:lNA+9X1NB3Zf8V7Ke586lFgjr2dZNuvo3lPJSGZ5JPQ=
|
||||||
|
github.com/google/btree v1.0.0/go.mod h1:lNA+9X1NB3Zf8V7Ke586lFgjr2dZNuvo3lPJSGZ5JPQ=
|
||||||
|
github.com/gorilla/websocket v1.4.0/go.mod h1:E7qHFY5m1UJ88s3WnNqhKjPHQ0heANvMoAMk2YaljkQ=
|
||||||
|
github.com/grpc-ecosystem/go-grpc-middleware v1.0.0/go.mod h1:FiyG127CGDf3tlThmgyCl78X/SZQqEOJBCDaAfeWzPs=
|
||||||
|
github.com/grpc-ecosystem/go-grpc-prometheus v1.2.0/go.mod h1:8NvIoxWQoOIhqOTXgfV/d3M/q6VIi02HzZEHgUlZvzk=
|
||||||
|
github.com/grpc-ecosystem/grpc-gateway v1.8.5/go.mod h1:vNeuVxBJEsws4ogUvrchl83t/GYV9WGTSLVdBhOQFDY=
|
||||||
|
github.com/hashicorp/consul v1.4.0 h1:PQTW4xCuAExEiSbhrsFsikzbW5gVBoi74BjUvYFyKHw=
|
||||||
|
github.com/hashicorp/consul v1.4.0/go.mod h1:mFrjN1mfidgJfYP1xrJCF+AfRhr6Eaqhb2+sfyn/OOI=
|
||||||
|
github.com/hashicorp/errwrap v1.0.0/go.mod h1:YH+1FKiLXxHSkmPseP+kNlulaMuP3n2brvKWEqk/Jc4=
|
||||||
|
github.com/hashicorp/go-cleanhttp v0.5.0 h1:wvCrVc9TjDls6+YGAF2hAifE1E5U1+b4tH6KdvN3Gig=
|
||||||
|
github.com/hashicorp/go-cleanhttp v0.5.0/go.mod h1:JpRdi6/HCYpAwUzNwuwqhbovhLtngrth3wmdIIUrZ80=
|
||||||
|
github.com/hashicorp/go-immutable-radix v1.0.0/go.mod h1:0y9vanUI8NX6FsYoO3zeMjhV/C5i9g4Q3DwcSNZ4P60=
|
||||||
|
github.com/hashicorp/go-msgpack v0.5.3/go.mod h1:ahLV/dePpqEmjfWmKiqvPkv/twdG7iPBM1vqhUKIvfM=
|
||||||
|
github.com/hashicorp/go-msgpack v0.5.4/go.mod h1:ahLV/dePpqEmjfWmKiqvPkv/twdG7iPBM1vqhUKIvfM=
|
||||||
|
github.com/hashicorp/go-multierror v1.0.0/go.mod h1:dHtQlpGsu+cZNNAkkCN/P3hoUDHhCYQXV3UM06sGGrk=
|
||||||
|
github.com/hashicorp/go-rootcerts v1.0.0 h1:Rqb66Oo1X/eSV1x66xbDccZjhJigjg0+e82kpwzSwCI=
|
||||||
|
github.com/hashicorp/go-rootcerts v1.0.0/go.mod h1:K6zTfqpRlCUIjkwsN4Z+hiSfzSTQa6eBIzfwKfwNnHU=
|
||||||
|
github.com/hashicorp/go-sockaddr v1.0.0/go.mod h1:7Xibr9yA9JjQq1JpNB2Vw7kxv8xerXegt+ozgdvDeDU=
|
||||||
|
github.com/hashicorp/go-uuid v1.0.0/go.mod h1:6SBZvOh/SIDV7/2o3Jml5SYk/TvGqwFJ/bN7x4byOro=
|
||||||
|
github.com/hashicorp/go-uuid v1.0.1/go.mod h1:6SBZvOh/SIDV7/2o3Jml5SYk/TvGqwFJ/bN7x4byOro=
|
||||||
|
github.com/hashicorp/golang-lru v0.5.0/go.mod h1:/m3WP610KZHVQ1SGc6re/UDhFvYD7pJ4Ao+sR/qLZy8=
|
||||||
|
github.com/hashicorp/hcl v1.0.0 h1:0Anlzjpi4vEasTeNFn2mLJgTSwt0+6sfsiTG8qcWGx4=
|
||||||
|
github.com/hashicorp/hcl v1.0.0/go.mod h1:E5yfLk+7swimpb2L/Alb/PJmXilQ/rhwaUYs4T20WEQ=
|
||||||
|
github.com/hashicorp/memberlist v0.1.3/go.mod h1:ajVTdAv/9Im8oMAAj5G31PhhMCZJV2pPBoIllUwCN7I=
|
||||||
|
github.com/hashicorp/serf v0.8.1 h1:mYs6SMzu72+90OcPa5wr3nfznA4Dw9UyR791ZFNOIf4=
|
||||||
|
github.com/hashicorp/serf v0.8.1/go.mod h1:h/Ru6tmZazX7WO/GDmwdpS975F019L4t5ng5IgwbNrE=
|
||||||
|
github.com/inconshreveable/mousetrap v1.0.0/go.mod h1:PxqpIevigyE2G7u3NXJIT2ANytuPF1OarO4DADm73n8=
|
||||||
|
github.com/jmespath/go-jmespath v0.0.0-20180206201540-c2b33e8439af/go.mod h1:Nht3zPeWKUH0NzdCt2Blrr5ys8VGpn0CEB0cQHVjt7k=
|
||||||
|
github.com/jonboulle/clockwork v0.1.0/go.mod h1:Ii8DK3G1RaLaWxj9trq07+26W01tbo22gdxWY5EU2bo=
|
||||||
|
github.com/kisielk/gotool v1.0.0/go.mod h1:XhKaO+MFFWcvkIS/tQcRk01m1F5IRFswLeQ+oQHNcck=
|
||||||
|
github.com/konsorten/go-windows-terminal-sequences v1.0.1/go.mod h1:T0+1ngSBFLxvqU3pZ+m/2kptfBszLMUkC4ZK/EgS/cQ=
|
||||||
|
github.com/kr/pretty v0.1.0/go.mod h1:dAy3ld7l9f0ibDNOQOHHMYYIIbhfbHSm3C4ZsoJORNo=
|
||||||
|
github.com/kr/pty v1.1.1/go.mod h1:pFQYn66WHrOpPYNljwOMqo10TkYh1fy3cYio2l3bCsQ=
|
||||||
|
github.com/kr/text v0.1.0/go.mod h1:4Jbv+DJW3UT/LiOwJeYQe1efqtUx/iVham/4vfdArNI=
|
||||||
|
github.com/magiconair/properties v1.8.0 h1:LLgXmsheXeRoUOBOjtwPQCWIYqM/LU1ayDtDePerRcY=
|
||||||
|
github.com/magiconair/properties v1.8.0/go.mod h1:PppfXfuXeibc/6YijjN8zIbojt8czPbwD3XqdrwzmxQ=
|
||||||
|
github.com/matttproud/golang_protobuf_extensions v1.0.1/go.mod h1:D8He9yQNgCq6Z5Ld7szi9bcBfOoFv/3dc6xSMkL2PC0=
|
||||||
|
github.com/miekg/dns v1.0.14/go.mod h1:W1PPwlIAgtquWBMBEV9nkV9Cazfe8ScdGz/Lj7v3Nrg=
|
||||||
|
github.com/mitchellh/go-homedir v1.0.0/go.mod h1:SfyaCUpYCn1Vlf4IUYiD9fPX4A5wJrkLzIz1N1q0pr0=
|
||||||
|
github.com/mitchellh/go-homedir v1.1.0 h1:lukF9ziXFxDFPkA1vsr5zpc1XuPDn/wFntq5mG+4E0Y=
|
||||||
|
github.com/mitchellh/go-homedir v1.1.0/go.mod h1:SfyaCUpYCn1Vlf4IUYiD9fPX4A5wJrkLzIz1N1q0pr0=
|
||||||
|
github.com/mitchellh/go-testing-interface v1.0.0/go.mod h1:kRemZodwjscx+RGhAo8eIhFbs2+BFgRtFPeD/KE+zxI=
|
||||||
|
github.com/mitchellh/mapstructure v1.1.2 h1:fmNYVwqnSfB9mZU6OS2O6GsXM+wcskZDuKQzvN1EDeE=
|
||||||
|
github.com/mitchellh/mapstructure v1.1.2/go.mod h1:FVVH3fgwuzCH5S8UJGiWEs2h04kUh9fWfEaFds41c1Y=
|
||||||
|
github.com/opencontainers/go-digest v1.0.0-rc1 h1:WzifXhOVOEOuFYOJAW6aQqW0TooG2iki3E3Ii+WN7gQ=
|
||||||
|
github.com/opencontainers/go-digest v1.0.0-rc1/go.mod h1:cMLVZDEM3+U2I4VmLI6N8jQYUd2OVphdqWwCJHrFt2s=
|
||||||
|
github.com/opencontainers/image-spec v1.0.1 h1:JMemWkRwHx4Zj+fVxWoMCFm/8sYGGrUVojFA6h/TRcI=
|
||||||
|
github.com/opencontainers/image-spec v1.0.1/go.mod h1:BtxoFyWECRxE4U/7sNtV5W15zMzWCbyJoFRP3s7yZA0=
|
||||||
|
github.com/pascaldekloe/goe v0.0.0-20180627143212-57f6aae5913c/go.mod h1:lzWF7FIEvWOWxwDKqyGYQf6ZUaNfKdP144TG7ZOy1lc=
|
||||||
|
github.com/pascaldekloe/goe v0.1.0/go.mod h1:lzWF7FIEvWOWxwDKqyGYQf6ZUaNfKdP144TG7ZOy1lc=
|
||||||
|
github.com/pelletier/go-toml v1.2.0 h1:T5zMGML61Wp+FlcbWjRDT7yAxhJNAiPPLOFECq181zc=
|
||||||
|
github.com/pelletier/go-toml v1.2.0/go.mod h1:5z9KED0ma1S8pY6P1sdut58dfprrGBbd/94hg7ilaic=
|
||||||
|
github.com/pkg/errors v0.8.1/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0=
|
||||||
|
github.com/pmezard/go-difflib v1.0.0/go.mod h1:iKH77koFhYxTK1pcRnkKkqfTogsbg7gZNVY4sRDYZ/4=
|
||||||
|
github.com/prometheus/client_golang v0.9.2/go.mod h1:OsXs2jCmiKlQ1lTBmv21f2mNfw4xf/QclQDMrYNZzcM=
|
||||||
|
github.com/prometheus/client_model v0.0.0-20180712105110-5c3871d89910/go.mod h1:MbSGuTsp3dbXC40dX6PRTWyKYBIrTGTE9sqQNg2J8bo=
|
||||||
|
github.com/prometheus/client_model v0.0.0-20190129233127-fd36f4220a90/go.mod h1:xMI15A0UPsDsEKsMN9yxemIoYk6Tm2C1GtYGdfGttqA=
|
||||||
|
github.com/prometheus/common v0.0.0-20181126121408-4724e9255275/go.mod h1:daVV7qP5qjZbuso7PdcryaAu0sAZbrN9i7WWcTMWvro=
|
||||||
|
github.com/prometheus/procfs v0.0.0-20181204211112-1dc9a6cbc91a/go.mod h1:c3At6R/oaqEKCNdg8wHV1ftS6bRYblBhIjjI8uT2IGk=
|
||||||
|
github.com/rogpeppe/fastuuid v0.0.0-20150106093220-6724a57986af/go.mod h1:XWv6SoW27p1b0cqNHllgS5HIMJraePCO15w5zCzIWYg=
|
||||||
|
github.com/russross/blackfriday v1.5.2 h1:HyvC0ARfnZBqnXwABFeSZHpKvJHJJfPz81GNueLj0oo=
|
||||||
|
github.com/russross/blackfriday v1.5.2/go.mod h1:JO/DiYxRf+HjHt06OyowR9PTA263kcR/rfWxYHBV53g=
|
||||||
|
github.com/samuel/go-zookeeper v0.0.0-20180130194729-c4fab1ac1bec h1:6ncX5ko6B9LntYM0YBRXkiSaZMmLYeZ/NWcmeB43mMY=
|
||||||
|
github.com/samuel/go-zookeeper v0.0.0-20180130194729-c4fab1ac1bec/go.mod h1:gi+0XIa01GRL2eRQVjQkKGqKF3SF9vZR/HnPullcV2E=
|
||||||
|
github.com/sean-/seed v0.0.0-20170313163322-e2103e2c3529/go.mod h1:DxrIzT+xaE7yg65j358z/aeFdxmN0P9QXhEzd20vsDc=
|
||||||
|
github.com/sirupsen/logrus v1.4.1/go.mod h1:ni0Sbl8bgC9z8RoU9G6nDWqqs/fq4eDPysMBDgk/93Q=
|
||||||
|
github.com/soheilhy/cmux v0.1.4/go.mod h1:IM3LyeVVIOuxMH7sFAkER9+bJ4dT7Ms6E4xg4kGIyLM=
|
||||||
|
github.com/spf13/afero v1.1.2 h1:m8/z1t7/fwjysjQRYbP0RD+bUIF/8tJwPdEZsI83ACI=
|
||||||
|
github.com/spf13/afero v1.1.2/go.mod h1:j4pytiNVoe2o6bmDsKpLACNPDBIoEAkihy7loJ1B0CQ=
|
||||||
|
github.com/spf13/cast v1.3.0 h1:oget//CVOEoFewqQxwr0Ej5yjygnqGkvggSE/gB35Q8=
|
||||||
|
github.com/spf13/cast v1.3.0/go.mod h1:Qx5cxh0v+4UWYiBimWS+eyWzqEqokIECu5etghLkUJE=
|
||||||
|
github.com/spf13/cobra v0.0.3 h1:ZlrZ4XsMRm04Fr5pSFxBgfND2EBVa1nLpiy1stUsX/8=
|
||||||
|
github.com/spf13/cobra v0.0.3/go.mod h1:1l0Ry5zgKvJasoi3XT1TypsSe7PqH0Sj9dhYf7v3XqQ=
|
||||||
|
github.com/spf13/jwalterweatherman v1.0.0 h1:XHEdyB+EcvlqZamSM4ZOMGlc93t6AcsBEu9Gc1vn7yk=
|
||||||
|
github.com/spf13/jwalterweatherman v1.0.0/go.mod h1:cQK4TGJAtQXfYWX+Ddv3mKDzgVb68N+wFjFa4jdeBTo=
|
||||||
|
github.com/spf13/pflag v1.0.3 h1:zPAT6CGy6wXeQ7NtTnaTerfKOsV6V6F8agHXFiazDkg=
|
||||||
|
github.com/spf13/pflag v1.0.3/go.mod h1:DYY7MBk1bdzusC3SYhjObp+wFpr4gzcvqqNjLnInEg4=
|
||||||
|
github.com/spf13/viper v1.3.2 h1:VUFqw5KcqRf7i70GOzW7N+Q7+gxVBkSSqiXB12+JQ4M=
|
||||||
|
github.com/spf13/viper v1.3.2/go.mod h1:ZiWeW+zYFKm7srdB9IoDzzZXaJaI5eL9QjNiN/DMA2s=
|
||||||
|
github.com/stretchr/objx v0.1.0/go.mod h1:HFkY916IF+rwdDfMAkV7OtwuqBVzrE8GR6GFx+wExME=
|
||||||
|
github.com/stretchr/objx v0.1.1/go.mod h1:HFkY916IF+rwdDfMAkV7OtwuqBVzrE8GR6GFx+wExME=
|
||||||
|
github.com/stretchr/testify v1.2.2/go.mod h1:a8OnRcib4nhh0OaRAV+Yts87kKdq0PP7pXfy6kDkUVs=
|
||||||
|
github.com/stretchr/testify v1.3.0/go.mod h1:M5WIy9Dh21IEIfnGCwXGc5bZfKNJtfHm1UVUgZn+9EI=
|
||||||
|
github.com/tmc/grpc-websocket-proxy v0.0.0-20190109142713-0ad062ec5ee5/go.mod h1:ncp9v5uamzpCO7NfCPTXjqaC+bZgJeR0sMTm6dMHP7U=
|
||||||
|
github.com/ugorji/go v1.1.2-0.20181022190402-e5e69e061d4f h1:E6ip3gLExd3v9o1iiZMMxOaC/XiWk3mPbDTOPLL0eWw=
|
||||||
|
github.com/ugorji/go v1.1.2-0.20181022190402-e5e69e061d4f/go.mod h1:hnLbHMwcvSihnDhEfx2/BzKp2xb0Y+ErdfYcrs9tkJQ=
|
||||||
|
github.com/ugorji/go/codec v1.1.2-0.20181022190402-e5e69e061d4f h1:CZG9W9a8rpiPXPmkGcyXoD9sLF+JfLh/x+BpYHGhK+o=
|
||||||
|
github.com/ugorji/go/codec v1.1.2-0.20181022190402-e5e69e061d4f/go.mod h1:VFNgLljTbGfSG7qAOspJ7OScBnGdDN/yBr0sguwnwf0=
|
||||||
|
github.com/xiang90/probing v0.0.0-20190116061207-43a291ad63a2/go.mod h1:UETIi67q53MR2AWcXfiuqkDkRtnGDLqkBTpCHuJHxtU=
|
||||||
|
github.com/xordataexchange/crypt v0.0.3-0.20170626215501-b2862e3d0a77/go.mod h1:aYKd//L2LvnjZzWKhF00oedf4jCCReLcmhLdhm1A27Q=
|
||||||
|
go.etcd.io/bbolt v1.3.1-etcd.8 h1:6J7QAKqfFBGnU80KRnuQxfjjeE5xAGE/qB810I3FQHQ=
|
||||||
|
go.etcd.io/bbolt v1.3.1-etcd.8/go.mod h1:IbVyRI1SCnLcuJnV2u8VeU0CEYM7e686BmAb1XKL+uU=
|
||||||
|
go.etcd.io/etcd v3.3.11+incompatible h1:AVwRXu9VIzZcvVe1nSirTVkNv7WT3/hwdMRrDVFsf3A=
|
||||||
|
go.etcd.io/etcd v3.3.11+incompatible/go.mod h1:yaeTdrJi5lOmYerz05bd8+V7KubZs8YSFZfzsF9A6aI=
|
||||||
|
go.uber.org/atomic v1.3.2/go.mod h1:gD2HeocX3+yG+ygLZcrzQJaqmWj9AIm7n08wl/qW/PE=
|
||||||
|
go.uber.org/multierr v1.1.0/go.mod h1:wR5kodmAFQ0UK8QlbwjlSNy0Z68gJhDJUG5sjR94q/0=
|
||||||
|
go.uber.org/zap v1.9.1/go.mod h1:vwi/ZaCAaUcBkycHslxD9B2zi4UTXhF60s6SWpuDF0Q=
|
||||||
|
golang.org/x/crypto v0.0.0-20181029021203-45a5f77698d3/go.mod h1:6SG95UA2DQfeDnfUPMdvaQW0Q7yPrPDi9nlGo2tz2b4=
|
||||||
|
golang.org/x/crypto v0.0.0-20181203042331-505ab145d0a9 h1:mKdxBk7AujPs8kU4m80U72y/zjbZ3UcXC7dClwKbUI0=
|
||||||
|
golang.org/x/crypto v0.0.0-20181203042331-505ab145d0a9/go.mod h1:6SG95UA2DQfeDnfUPMdvaQW0Q7yPrPDi9nlGo2tz2b4=
|
||||||
|
golang.org/x/lint v0.0.0-20181026193005-c67002cb31c3/go.mod h1:UVdnD1Gm6xHRNCYTkRU2/jEulfH38KcIWyp/GAMgvoE=
|
||||||
|
golang.org/x/net v0.0.0-20180826012351-8a410e7b638d/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
|
||||||
|
golang.org/x/net v0.0.0-20181023162649-9b4f9f5ad519/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
|
||||||
|
golang.org/x/net v0.0.0-20181201002055-351d144fa1fc/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
|
||||||
|
golang.org/x/net v0.0.0-20181220203305-927f97764cc3 h1:eH6Eip3UpmR+yM/qI9Ijluzb1bNv/cAU/n+6l8tRSis=
|
||||||
|
golang.org/x/net v0.0.0-20181220203305-927f97764cc3/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4=
|
||||||
|
golang.org/x/oauth2 v0.0.0-20180821212333-d2e6202438be/go.mod h1:N/0e6XlmueqKjAGxoOufVs8QHGRruUQn6yWY3a++T0U=
|
||||||
|
golang.org/x/sync v0.0.0-20180314180146-1d60e4601c6f/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
|
||||||
|
golang.org/x/sync v0.0.0-20181108010431-42b317875d0f/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
|
||||||
|
golang.org/x/sync v0.0.0-20181221193216-37e7f081c4d4/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
|
||||||
|
golang.org/x/sys v0.0.0-20180830151530-49385e6e1522/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
|
||||||
|
golang.org/x/sys v0.0.0-20180905080454-ebe1bf3edb33/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
|
||||||
|
golang.org/x/sys v0.0.0-20181026203630-95b1ffbd15a5/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
|
||||||
|
golang.org/x/sys v0.0.0-20181107165924-66b7b1311ac8/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
|
||||||
|
golang.org/x/sys v0.0.0-20181205085412-a5c9d58dba9a h1:1n5lsVfiQW3yfsRGu98756EH1YthsFqr/5mxHduZW2A=
|
||||||
|
golang.org/x/sys v0.0.0-20181205085412-a5c9d58dba9a/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
|
||||||
|
golang.org/x/text v0.3.0 h1:g61tztE5qeGQ89tm6NTjjM9VPIm088od1l6aSorWRWg=
|
||||||
|
golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
|
||||||
|
golang.org/x/time v0.0.0-20190308202827-9d24e82272b4/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ=
|
||||||
|
golang.org/x/tools v0.0.0-20180828015842-6cd1fcedba52/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
|
||||||
|
golang.org/x/tools v0.0.0-20190114222345-bf090417da8b/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
|
||||||
|
google.golang.org/appengine v1.1.0/go.mod h1:EbEs0AVv82hx2wNQdGPgUI5lhzA/G0D9YwlJXL52JkM=
|
||||||
|
google.golang.org/genproto v0.0.0-20180817151627-c66870c02cf8 h1:Nw54tB0rB7hY/N0NQvRW8DG4Yk3Q6T9cu9RcFQDu1tc=
|
||||||
|
google.golang.org/genproto v0.0.0-20180817151627-c66870c02cf8/go.mod h1:JiN7NxoALGmiZfu7CAH4rXhgtRTLTxftemlI0sWmxmc=
|
||||||
|
google.golang.org/grpc v1.18.0/go.mod h1:6QZJwpn2B+Zp71q/5VxRsJ6NXXVCE5NRUHRo+f3cWCs=
|
||||||
|
google.golang.org/grpc v1.19.0 h1:cfg4PD8YEdSFnm7qLV4++93WcmhH2nIUhMjhdCvl3j8=
|
||||||
|
google.golang.org/grpc v1.19.0/go.mod h1:mqu4LbDTu4XGKhr4mRzUsmM4RtVoemTSY81AxZiDr8c=
|
||||||
|
gopkg.in/check.v1 v0.0.0-20161208181325-20d25e280405/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
|
||||||
|
gopkg.in/check.v1 v1.0.0-20180628173108-788fd7840127/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
|
||||||
|
gopkg.in/redis.v5 v5.2.9/go.mod h1:6gtv0/+A4iM08kdRfocWYB3bLX2tebpNtfKlFT6H4mY=
|
||||||
|
gopkg.in/resty.v1 v1.12.0/go.mod h1:mDo4pnntr5jdWRML875a/NmxYqAlA73dVijT2AXvQQo=
|
||||||
|
gopkg.in/square/go-jose.v2 v2.3.1 h1:SK5KegNXmKmqE342YYN2qPHEnUYeoMiXXl1poUlI+o4=
|
||||||
|
gopkg.in/square/go-jose.v2 v2.3.1/go.mod h1:M9dMgbHiYLoDGQrXy7OpJDJWiKiU//h+vD76mk0e1AI=
|
||||||
|
gopkg.in/yaml.v2 v2.0.0-20170812160011-eb3733d160e7/go.mod h1:JAlM8MvJe8wmxCU4Bli9HhUf9+ttbYbLASfIpnQbh74=
|
||||||
|
gopkg.in/yaml.v2 v2.2.2 h1:ZCJp+EgiOT7lHqUV2J862kp8Qj64Jo6az82+3Td9dZw=
|
||||||
|
gopkg.in/yaml.v2 v2.2.2/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI=
|
||||||
|
honnef.co/go/tools v0.0.0-20180728063816-88497007e858/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4=
|
||||||
|
honnef.co/go/tools v0.0.0-20190102054323-c2f93a96b099/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4=
|
420
traefik/traefik-certs-dumper/godownloader.sh
Normal file
420
traefik/traefik-certs-dumper/godownloader.sh
Normal file
@@ -0,0 +1,420 @@
|
|||||||
|
#!/bin/sh
|
||||||
|
set -e
|
||||||
|
# Code generated by godownloader on 2019-04-04T19:26:29Z. DO NOT EDIT.
|
||||||
|
#
|
||||||
|
|
||||||
|
usage() {
|
||||||
|
this=$1
|
||||||
|
cat <<EOF
|
||||||
|
$this: download go binaries for ldez/traefik-certs-dumper
|
||||||
|
|
||||||
|
Usage: $this [-b] bindir [-d] [tag]
|
||||||
|
-b sets bindir or installation directory, Defaults to ./bin
|
||||||
|
-d turns on debug logging
|
||||||
|
[tag] is a tag from
|
||||||
|
https://github.com/ldez/traefik-certs-dumper/releases
|
||||||
|
If tag is missing, then the latest will be used.
|
||||||
|
|
||||||
|
Generated by godownloader
|
||||||
|
https://github.com/goreleaser/godownloader
|
||||||
|
|
||||||
|
EOF
|
||||||
|
exit 2
|
||||||
|
}
|
||||||
|
|
||||||
|
parse_args() {
|
||||||
|
#BINDIR is ./bin unless set be ENV
|
||||||
|
# over-ridden by flag below
|
||||||
|
|
||||||
|
BINDIR=${BINDIR:-./bin}
|
||||||
|
while getopts "b:dh?x" arg; do
|
||||||
|
case "$arg" in
|
||||||
|
b) BINDIR="$OPTARG" ;;
|
||||||
|
d) log_set_priority 10 ;;
|
||||||
|
h | \?) usage "$0" ;;
|
||||||
|
x) set -x ;;
|
||||||
|
esac
|
||||||
|
done
|
||||||
|
shift $((OPTIND - 1))
|
||||||
|
TAG=$1
|
||||||
|
}
|
||||||
|
# this function wraps all the destructive operations
|
||||||
|
# if a curl|bash cuts off the end of the script due to
|
||||||
|
# network, either nothing will happen or will syntax error
|
||||||
|
# out preventing half-done work
|
||||||
|
execute() {
|
||||||
|
tmpdir=$(mktmpdir)
|
||||||
|
log_debug "downloading files into ${tmpdir}"
|
||||||
|
http_download "${tmpdir}/${TARBALL}" "${TARBALL_URL}"
|
||||||
|
http_download "${tmpdir}/${CHECKSUM}" "${CHECKSUM_URL}"
|
||||||
|
hash_sha256_verify "${tmpdir}/${TARBALL}" "${tmpdir}/${CHECKSUM}"
|
||||||
|
srcdir="${tmpdir}"
|
||||||
|
(cd "${tmpdir}" && untar "${TARBALL}")
|
||||||
|
install -d "${BINDIR}"
|
||||||
|
for binexe in "traefik-certs-dumper" ; do
|
||||||
|
if [ "$OS" = "windows" ]; then
|
||||||
|
binexe="${binexe}.exe"
|
||||||
|
fi
|
||||||
|
install "${srcdir}/${binexe}" "${BINDIR}/"
|
||||||
|
log_info "installed ${BINDIR}/${binexe}"
|
||||||
|
done
|
||||||
|
}
|
||||||
|
is_supported_platform() {
|
||||||
|
platform=$1
|
||||||
|
found=1
|
||||||
|
case "$platform" in
|
||||||
|
windows/amd64) found=0 ;;
|
||||||
|
windows/386) found=0 ;;
|
||||||
|
|
||||||
|
windows/arm64) found=0 ;;
|
||||||
|
darwin/amd64) found=0 ;;
|
||||||
|
darwin/386) found=0 ;;
|
||||||
|
|
||||||
|
darwin/arm64) found=0 ;;
|
||||||
|
linux/amd64) found=0 ;;
|
||||||
|
linux/386) found=0 ;;
|
||||||
|
|
||||||
|
linux/arm64) found=0 ;;
|
||||||
|
freebsd/amd64) found=0 ;;
|
||||||
|
freebsd/386) found=0 ;;
|
||||||
|
|
||||||
|
freebsd/arm64) found=0 ;;
|
||||||
|
openbsd/amd64) found=0 ;;
|
||||||
|
openbsd/386) found=0 ;;
|
||||||
|
|
||||||
|
openbsd/arm64) found=0 ;;
|
||||||
|
windows/armv7) found=0 ;;
|
||||||
|
windows/armv6) found=0 ;;
|
||||||
|
windows/armv5) found=0 ;;
|
||||||
|
darwin/armv7) found=0 ;;
|
||||||
|
darwin/armv6) found=0 ;;
|
||||||
|
darwin/armv5) found=0 ;;
|
||||||
|
linux/armv7) found=0 ;;
|
||||||
|
linux/armv6) found=0 ;;
|
||||||
|
linux/armv5) found=0 ;;
|
||||||
|
freebsd/armv7) found=0 ;;
|
||||||
|
freebsd/armv6) found=0 ;;
|
||||||
|
freebsd/armv5) found=0 ;;
|
||||||
|
openbsd/armv7) found=0 ;;
|
||||||
|
openbsd/armv6) found=0 ;;
|
||||||
|
openbsd/armv5) found=0 ;;
|
||||||
|
esac
|
||||||
|
case "$platform" in
|
||||||
|
darwin/386) found=1 ;;
|
||||||
|
esac
|
||||||
|
return $found
|
||||||
|
}
|
||||||
|
check_platform() {
|
||||||
|
if is_supported_platform "$PLATFORM"; then
|
||||||
|
# optional logging goes here
|
||||||
|
true
|
||||||
|
else
|
||||||
|
log_crit "platform $PLATFORM is not supported. Make sure this script is up-to-date and file request at https://github.com/${PREFIX}/issues/new"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
}
|
||||||
|
tag_to_version() {
|
||||||
|
if [ -z "${TAG}" ]; then
|
||||||
|
log_info "checking GitHub for latest tag"
|
||||||
|
else
|
||||||
|
log_info "checking GitHub for tag '${TAG}'"
|
||||||
|
fi
|
||||||
|
REALTAG=$(github_release "$OWNER/$REPO" "${TAG}") && true
|
||||||
|
if test -z "$REALTAG"; then
|
||||||
|
log_crit "unable to find '${TAG}' - use 'latest' or see https://github.com/${PREFIX}/releases for details"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
# if version starts with 'v', remove it
|
||||||
|
TAG="$REALTAG"
|
||||||
|
VERSION=${TAG#v}
|
||||||
|
}
|
||||||
|
adjust_format() {
|
||||||
|
# change format (tar.gz or zip) based on ARCH
|
||||||
|
case ${ARCH} in
|
||||||
|
windows) FORMAT=zip ;;
|
||||||
|
esac
|
||||||
|
true
|
||||||
|
}
|
||||||
|
adjust_os() {
|
||||||
|
# adjust archive name based on OS
|
||||||
|
true
|
||||||
|
}
|
||||||
|
adjust_arch() {
|
||||||
|
# adjust archive name based on ARCH
|
||||||
|
true
|
||||||
|
}
|
||||||
|
|
||||||
|
cat /dev/null <<EOF
|
||||||
|
------------------------------------------------------------------------
|
||||||
|
https://github.com/client9/shlib - portable posix shell functions
|
||||||
|
Public domain - http://unlicense.org
|
||||||
|
https://github.com/client9/shlib/blob/master/LICENSE.md
|
||||||
|
but credit (and pull requests) appreciated.
|
||||||
|
------------------------------------------------------------------------
|
||||||
|
EOF
|
||||||
|
is_command() {
|
||||||
|
command -v "$1" >/dev/null
|
||||||
|
}
|
||||||
|
echoerr() {
|
||||||
|
echo "$@" 1>&2
|
||||||
|
}
|
||||||
|
log_prefix() {
|
||||||
|
echo "$0"
|
||||||
|
}
|
||||||
|
_logp=6
|
||||||
|
log_set_priority() {
|
||||||
|
_logp="$1"
|
||||||
|
}
|
||||||
|
log_priority() {
|
||||||
|
if test -z "$1"; then
|
||||||
|
echo "$_logp"
|
||||||
|
return
|
||||||
|
fi
|
||||||
|
[ "$1" -le "$_logp" ]
|
||||||
|
}
|
||||||
|
log_tag() {
|
||||||
|
case $1 in
|
||||||
|
0) echo "emerg" ;;
|
||||||
|
1) echo "alert" ;;
|
||||||
|
2) echo "crit" ;;
|
||||||
|
3) echo "err" ;;
|
||||||
|
4) echo "warning" ;;
|
||||||
|
5) echo "notice" ;;
|
||||||
|
6) echo "info" ;;
|
||||||
|
7) echo "debug" ;;
|
||||||
|
*) echo "$1" ;;
|
||||||
|
esac
|
||||||
|
}
|
||||||
|
log_debug() {
|
||||||
|
log_priority 7 || return 0
|
||||||
|
echoerr "$(log_prefix)" "$(log_tag 7)" "$@"
|
||||||
|
}
|
||||||
|
log_info() {
|
||||||
|
log_priority 6 || return 0
|
||||||
|
echoerr "$(log_prefix)" "$(log_tag 6)" "$@"
|
||||||
|
}
|
||||||
|
log_err() {
|
||||||
|
log_priority 3 || return 0
|
||||||
|
echoerr "$(log_prefix)" "$(log_tag 3)" "$@"
|
||||||
|
}
|
||||||
|
log_crit() {
|
||||||
|
log_priority 2 || return 0
|
||||||
|
echoerr "$(log_prefix)" "$(log_tag 2)" "$@"
|
||||||
|
}
|
||||||
|
uname_os() {
|
||||||
|
os=$(uname -s | tr '[:upper:]' '[:lower:]')
|
||||||
|
case "$os" in
|
||||||
|
msys_nt) os="windows" ;;
|
||||||
|
esac
|
||||||
|
echo "$os"
|
||||||
|
}
|
||||||
|
uname_arch() {
|
||||||
|
arch=$(uname -m)
|
||||||
|
case $arch in
|
||||||
|
x86_64) arch="amd64" ;;
|
||||||
|
x86) arch="386" ;;
|
||||||
|
i686) arch="386" ;;
|
||||||
|
i386) arch="386" ;;
|
||||||
|
aarch64) arch="arm64" ;;
|
||||||
|
armv5*) arch="armv5" ;;
|
||||||
|
armv6*) arch="armv6" ;;
|
||||||
|
armv7*) arch="armv7" ;;
|
||||||
|
esac
|
||||||
|
echo ${arch}
|
||||||
|
}
|
||||||
|
uname_os_check() {
|
||||||
|
os=$(uname_os)
|
||||||
|
case "$os" in
|
||||||
|
darwin) return 0 ;;
|
||||||
|
dragonfly) return 0 ;;
|
||||||
|
freebsd) return 0 ;;
|
||||||
|
linux) return 0 ;;
|
||||||
|
android) return 0 ;;
|
||||||
|
nacl) return 0 ;;
|
||||||
|
netbsd) return 0 ;;
|
||||||
|
openbsd) return 0 ;;
|
||||||
|
plan9) return 0 ;;
|
||||||
|
solaris) return 0 ;;
|
||||||
|
windows) return 0 ;;
|
||||||
|
esac
|
||||||
|
log_crit "uname_os_check '$(uname -s)' got converted to '$os' which is not a GOOS value. Please file bug at https://github.com/client9/shlib"
|
||||||
|
return 1
|
||||||
|
}
|
||||||
|
uname_arch_check() {
|
||||||
|
arch=$(uname_arch)
|
||||||
|
case "$arch" in
|
||||||
|
386) return 0 ;;
|
||||||
|
amd64) return 0 ;;
|
||||||
|
arm64) return 0 ;;
|
||||||
|
armv5) return 0 ;;
|
||||||
|
armv6) return 0 ;;
|
||||||
|
armv7) return 0 ;;
|
||||||
|
ppc64) return 0 ;;
|
||||||
|
ppc64le) return 0 ;;
|
||||||
|
mips) return 0 ;;
|
||||||
|
mipsle) return 0 ;;
|
||||||
|
mips64) return 0 ;;
|
||||||
|
mips64le) return 0 ;;
|
||||||
|
s390x) return 0 ;;
|
||||||
|
amd64p32) return 0 ;;
|
||||||
|
esac
|
||||||
|
log_crit "uname_arch_check '$(uname -m)' got converted to '$arch' which is not a GOARCH value. Please file bug report at https://github.com/client9/shlib"
|
||||||
|
return 1
|
||||||
|
}
|
||||||
|
untar() {
|
||||||
|
tarball=$1
|
||||||
|
case "${tarball}" in
|
||||||
|
*.tar.gz | *.tgz) tar -xzf "${tarball}" ;;
|
||||||
|
*.tar) tar -xf "${tarball}" ;;
|
||||||
|
*.zip) unzip "${tarball}" ;;
|
||||||
|
*)
|
||||||
|
log_err "untar unknown archive format for ${tarball}"
|
||||||
|
return 1
|
||||||
|
;;
|
||||||
|
esac
|
||||||
|
}
|
||||||
|
mktmpdir() {
|
||||||
|
test -z "$TMPDIR" && TMPDIR="$(mktemp -d)"
|
||||||
|
mkdir -p "${TMPDIR}"
|
||||||
|
echo "${TMPDIR}"
|
||||||
|
}
|
||||||
|
http_download_curl() {
|
||||||
|
local_file=$1
|
||||||
|
source_url=$2
|
||||||
|
header=$3
|
||||||
|
if [ -z "$header" ]; then
|
||||||
|
code=$(curl -w '%{http_code}' -sL -o "$local_file" "$source_url")
|
||||||
|
else
|
||||||
|
code=$(curl -w '%{http_code}' -sL -H "$header" -o "$local_file" "$source_url")
|
||||||
|
fi
|
||||||
|
if [ "$code" != "200" ]; then
|
||||||
|
log_debug "http_download_curl received HTTP status $code"
|
||||||
|
return 1
|
||||||
|
fi
|
||||||
|
return 0
|
||||||
|
}
|
||||||
|
http_download_wget() {
|
||||||
|
local_file=$1
|
||||||
|
source_url=$2
|
||||||
|
header=$3
|
||||||
|
if [ -z "$header" ]; then
|
||||||
|
wget -q -O "$local_file" "$source_url"
|
||||||
|
else
|
||||||
|
wget -q --header "$header" -O "$local_file" "$source_url"
|
||||||
|
fi
|
||||||
|
}
|
||||||
|
http_download() {
|
||||||
|
log_debug "http_download $2"
|
||||||
|
if is_command curl; then
|
||||||
|
http_download_curl "$@"
|
||||||
|
return
|
||||||
|
elif is_command wget; then
|
||||||
|
http_download_wget "$@"
|
||||||
|
return
|
||||||
|
fi
|
||||||
|
log_crit "http_download unable to find wget or curl"
|
||||||
|
return 1
|
||||||
|
}
|
||||||
|
http_copy() {
|
||||||
|
tmp=$(mktemp)
|
||||||
|
http_download "${tmp}" "$1" "$2" || return 1
|
||||||
|
body=$(cat "$tmp")
|
||||||
|
rm -f "${tmp}"
|
||||||
|
echo "$body"
|
||||||
|
}
|
||||||
|
github_release() {
|
||||||
|
owner_repo=$1
|
||||||
|
version=$2
|
||||||
|
test -z "$version" && version="latest"
|
||||||
|
giturl="https://github.com/${owner_repo}/releases/${version}"
|
||||||
|
json=$(http_copy "$giturl" "Accept:application/json")
|
||||||
|
test -z "$json" && return 1
|
||||||
|
version=$(echo "$json" | tr -s '\n' ' ' | sed 's/.*"tag_name":"//' | sed 's/".*//')
|
||||||
|
test -z "$version" && return 1
|
||||||
|
echo "$version"
|
||||||
|
}
|
||||||
|
hash_sha256() {
|
||||||
|
TARGET=${1:-/dev/stdin}
|
||||||
|
if is_command gsha256sum; then
|
||||||
|
hash=$(gsha256sum "$TARGET") || return 1
|
||||||
|
echo "$hash" | cut -d ' ' -f 1
|
||||||
|
elif is_command sha256sum; then
|
||||||
|
hash=$(sha256sum "$TARGET") || return 1
|
||||||
|
echo "$hash" | cut -d ' ' -f 1
|
||||||
|
elif is_command shasum; then
|
||||||
|
hash=$(shasum -a 256 "$TARGET" 2>/dev/null) || return 1
|
||||||
|
echo "$hash" | cut -d ' ' -f 1
|
||||||
|
elif is_command openssl; then
|
||||||
|
hash=$(openssl -dst openssl dgst -sha256 "$TARGET") || return 1
|
||||||
|
echo "$hash" | cut -d ' ' -f a
|
||||||
|
else
|
||||||
|
log_crit "hash_sha256 unable to find command to compute sha-256 hash"
|
||||||
|
return 1
|
||||||
|
fi
|
||||||
|
}
|
||||||
|
hash_sha256_verify() {
|
||||||
|
TARGET=$1
|
||||||
|
checksums=$2
|
||||||
|
if [ -z "$checksums" ]; then
|
||||||
|
log_err "hash_sha256_verify checksum file not specified in arg2"
|
||||||
|
return 1
|
||||||
|
fi
|
||||||
|
BASENAME=${TARGET##*/}
|
||||||
|
want=$(grep "${BASENAME}" "${checksums}" 2>/dev/null | tr '\t' ' ' | cut -d ' ' -f 1)
|
||||||
|
if [ -z "$want" ]; then
|
||||||
|
log_err "hash_sha256_verify unable to find checksum for '${TARGET}' in '${checksums}'"
|
||||||
|
return 1
|
||||||
|
fi
|
||||||
|
got=$(hash_sha256 "$TARGET")
|
||||||
|
if [ "$want" != "$got" ]; then
|
||||||
|
log_err "hash_sha256_verify checksum for '$TARGET' did not verify ${want} vs $got"
|
||||||
|
return 1
|
||||||
|
fi
|
||||||
|
}
|
||||||
|
cat /dev/null <<EOF
|
||||||
|
------------------------------------------------------------------------
|
||||||
|
End of functions from https://github.com/client9/shlib
|
||||||
|
------------------------------------------------------------------------
|
||||||
|
EOF
|
||||||
|
|
||||||
|
PROJECT_NAME="traefik-certs-dumper"
|
||||||
|
OWNER=ldez
|
||||||
|
REPO="traefik-certs-dumper"
|
||||||
|
BINARY=traefik-certs-dumper
|
||||||
|
FORMAT=tar.gz
|
||||||
|
OS=$(uname_os)
|
||||||
|
ARCH=$(uname_arch)
|
||||||
|
PREFIX="$OWNER/$REPO"
|
||||||
|
|
||||||
|
# use in logging routines
|
||||||
|
log_prefix() {
|
||||||
|
echo "$PREFIX"
|
||||||
|
}
|
||||||
|
PLATFORM="${OS}/${ARCH}"
|
||||||
|
GITHUB_DOWNLOAD=https://github.com/${OWNER}/${REPO}/releases/download
|
||||||
|
|
||||||
|
uname_os_check "$OS"
|
||||||
|
uname_arch_check "$ARCH"
|
||||||
|
|
||||||
|
parse_args "$@"
|
||||||
|
|
||||||
|
check_platform
|
||||||
|
|
||||||
|
tag_to_version
|
||||||
|
|
||||||
|
adjust_format
|
||||||
|
|
||||||
|
adjust_os
|
||||||
|
|
||||||
|
adjust_arch
|
||||||
|
|
||||||
|
log_info "found version: ${VERSION} for ${TAG}/${OS}/${ARCH}"
|
||||||
|
|
||||||
|
NAME=${PROJECT_NAME}_v${VERSION}_${OS}_${ARCH}
|
||||||
|
TARBALL=${NAME}.${FORMAT}
|
||||||
|
TARBALL_URL=${GITHUB_DOWNLOAD}/${TAG}/${TARBALL}
|
||||||
|
CHECKSUM=${PROJECT_NAME}_${VERSION}_checksums.txt
|
||||||
|
CHECKSUM_URL=${GITHUB_DOWNLOAD}/${TAG}/${CHECKSUM}
|
||||||
|
|
||||||
|
|
||||||
|
execute
|
42
traefik/traefik-certs-dumper/hook/hook.go
Normal file
42
traefik/traefik-certs-dumper/hook/hook.go
Normal file
@@ -0,0 +1,42 @@
|
|||||||
|
package hook
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"errors"
|
||||||
|
"fmt"
|
||||||
|
"os"
|
||||||
|
"os/exec"
|
||||||
|
"strings"
|
||||||
|
"time"
|
||||||
|
)
|
||||||
|
|
||||||
|
// Exec Execute a command on a go routine.
|
||||||
|
func Exec(command string) {
|
||||||
|
if command == "" {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
go func() {
|
||||||
|
errH := execute(command)
|
||||||
|
if errH != nil {
|
||||||
|
panic(errH)
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
}
|
||||||
|
|
||||||
|
func execute(command string) error {
|
||||||
|
ctxCmd, cancel := context.WithTimeout(context.Background(), 30*time.Second)
|
||||||
|
defer cancel()
|
||||||
|
|
||||||
|
parts := strings.Fields(os.ExpandEnv(command))
|
||||||
|
output, err := exec.CommandContext(ctxCmd, parts[0], parts[1:]...).CombinedOutput()
|
||||||
|
if len(output) > 0 {
|
||||||
|
fmt.Println(string(output))
|
||||||
|
}
|
||||||
|
|
||||||
|
if ctxCmd.Err() == context.DeadlineExceeded {
|
||||||
|
return errors.New("hook timed out")
|
||||||
|
}
|
||||||
|
|
||||||
|
return err
|
||||||
|
}
|
29
traefik/traefik-certs-dumper/hook/hook_test.go
Normal file
29
traefik/traefik-certs-dumper/hook/hook_test.go
Normal file
@@ -0,0 +1,29 @@
|
|||||||
|
package hook
|
||||||
|
|
||||||
|
import "testing"
|
||||||
|
|
||||||
|
func Test_execute(t *testing.T) {
|
||||||
|
testCases := []struct {
|
||||||
|
desc string
|
||||||
|
command string
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
desc: "expand env vars",
|
||||||
|
command: `echo "${GOPATH} ${GOARCH}"`,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
desc: "simple",
|
||||||
|
command: `echo 'hello'`,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, test := range testCases {
|
||||||
|
t.Run(test.desc, func(t *testing.T) {
|
||||||
|
|
||||||
|
err := execute(test.command)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
@@ -0,0 +1,18 @@
|
|||||||
|
version: '3'
|
||||||
|
|
||||||
|
services:
|
||||||
|
consul-kv:
|
||||||
|
image: consul
|
||||||
|
ports:
|
||||||
|
- "8500:8500"
|
||||||
|
|
||||||
|
zookeeper-kv:
|
||||||
|
image: zookeeper
|
||||||
|
ports:
|
||||||
|
- "2181:2181"
|
||||||
|
|
||||||
|
etcd-kv:
|
||||||
|
image: quay.io/coreos/etcd:v3.3.12
|
||||||
|
command: etcd --listen-client-urls http://0.0.0.0:2379 --advertise-client-urls http://0.0.0.0:2380
|
||||||
|
ports:
|
||||||
|
- "2379:2379"
|
121
traefik/traefik-certs-dumper/integrationtest/loader.go
Normal file
121
traefik/traefik-certs-dumper/integrationtest/loader.go
Normal file
@@ -0,0 +1,121 @@
|
|||||||
|
package main
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bytes"
|
||||||
|
"compress/gzip"
|
||||||
|
"io/ioutil"
|
||||||
|
"log"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/abronan/valkeyrie"
|
||||||
|
"github.com/abronan/valkeyrie/store"
|
||||||
|
"github.com/abronan/valkeyrie/store/boltdb"
|
||||||
|
"github.com/abronan/valkeyrie/store/consul"
|
||||||
|
etcdv3 "github.com/abronan/valkeyrie/store/etcd/v3"
|
||||||
|
"github.com/abronan/valkeyrie/store/zookeeper"
|
||||||
|
)
|
||||||
|
|
||||||
|
const storeKey = "traefik/acme/account/object"
|
||||||
|
|
||||||
|
func main() {
|
||||||
|
log.SetFlags(log.Lshortfile)
|
||||||
|
|
||||||
|
source := "./acme.json"
|
||||||
|
err := loadData(source)
|
||||||
|
if err != nil {
|
||||||
|
log.Fatal(err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func loadData(source string) error {
|
||||||
|
content, err := readFile(source)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Consul
|
||||||
|
err = putData(store.CONSUL, []string{"localhost:8500"}, content)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
// ETCD v3
|
||||||
|
err = putData(store.ETCDV3, []string{"localhost:2379"}, content)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Zookeeper
|
||||||
|
err = putData(store.ZK, []string{"localhost:2181"}, content)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
// BoltDB
|
||||||
|
err = putData(store.BOLTDB, []string{"/tmp/test-traefik-certs-dumper.db"}, content)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func putData(backend store.Backend, addrs []string, content []byte) error {
|
||||||
|
storeConfig := &store.Config{
|
||||||
|
ConnectionTimeout: 3 * time.Second,
|
||||||
|
Bucket: "traefik",
|
||||||
|
}
|
||||||
|
|
||||||
|
switch backend {
|
||||||
|
case store.CONSUL:
|
||||||
|
consul.Register()
|
||||||
|
case store.ETCDV3:
|
||||||
|
etcdv3.Register()
|
||||||
|
case store.ZK:
|
||||||
|
zookeeper.Register()
|
||||||
|
case store.BOLTDB:
|
||||||
|
boltdb.Register()
|
||||||
|
}
|
||||||
|
|
||||||
|
kvStore, err := valkeyrie.NewStore(backend, addrs, storeConfig)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := kvStore.Put(storeKey, content, nil); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
log.Printf("Successfully updated %s.\n", backend)
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func readFile(source string) ([]byte, error) {
|
||||||
|
content, err := ioutil.ReadFile(source)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
var b bytes.Buffer
|
||||||
|
gz := gzip.NewWriter(&b)
|
||||||
|
|
||||||
|
defer func() {
|
||||||
|
if errC := gz.Close(); errC != nil {
|
||||||
|
log.Println(errC)
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
|
||||||
|
if _, err = gz.Write(content); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
if err = gz.Flush(); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := gz.Close(); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
return b.Bytes(), nil
|
||||||
|
}
|
54
traefik/traefik-certs-dumper/integrationtest/readme.md
Normal file
54
traefik/traefik-certs-dumper/integrationtest/readme.md
Normal file
@@ -0,0 +1,54 @@
|
|||||||
|
# Integration testing
|
||||||
|
|
||||||
|
## Preparation
|
||||||
|
|
||||||
|
- Create valid ACME file `./acme.json`
|
||||||
|
|
||||||
|
- Start backends using docker
|
||||||
|
|
||||||
|
```bash
|
||||||
|
docker-compose -f integrationtest/docker-compose.yml up
|
||||||
|
```
|
||||||
|
|
||||||
|
- Initialize backends
|
||||||
|
|
||||||
|
```bash
|
||||||
|
go run integrationtest/loader.go
|
||||||
|
```
|
||||||
|
|
||||||
|
## Run certs dumper without watching
|
||||||
|
|
||||||
|
```bash
|
||||||
|
traefik-certs-dumper file
|
||||||
|
|
||||||
|
# http://localhost:8500/ui/
|
||||||
|
traefik-certs-dumper kv consul --endpoints localhost:8500
|
||||||
|
|
||||||
|
traefik-certs-dumper kv etcd --endpoints localhost:2379
|
||||||
|
|
||||||
|
traefik-certs-dumper kv boltdb --endpoints /tmp/test-traefik-certs-dumper.db
|
||||||
|
|
||||||
|
traefik-certs-dumper kv zookeeper --endpoints localhost:2181
|
||||||
|
```
|
||||||
|
|
||||||
|
## Run certs dumper with watching
|
||||||
|
|
||||||
|
While watching is enabled, manipulate `./acme.json` for file backend or run `loader.go` again for KV backends so that change events are triggered.
|
||||||
|
|
||||||
|
```bash
|
||||||
|
traefik-certs-dumper file --watch
|
||||||
|
|
||||||
|
traefik-certs-dumper kv consul --watch --endpoints localhost:8500
|
||||||
|
|
||||||
|
traefik-certs-dumper kv etcd --watch --endpoints localhost:2379
|
||||||
|
|
||||||
|
traefik-certs-dumper kv zookeeper --watch --endpoints localhost:2181
|
||||||
|
```
|
||||||
|
|
||||||
|
## Cleanup
|
||||||
|
|
||||||
|
- Stop backends
|
||||||
|
|
||||||
|
```bash
|
||||||
|
docker-compose -f integrationtest/docker-compose.yml down
|
||||||
|
```
|
12
traefik/traefik-certs-dumper/main.go
Normal file
12
traefik/traefik-certs-dumper/main.go
Normal file
@@ -0,0 +1,12 @@
|
|||||||
|
package main
|
||||||
|
|
||||||
|
import (
|
||||||
|
"log"
|
||||||
|
|
||||||
|
"github.com/ldez/traefik-certs-dumper/v2/cmd"
|
||||||
|
)
|
||||||
|
|
||||||
|
func main() {
|
||||||
|
log.SetFlags(log.LstdFlags | log.Lshortfile)
|
||||||
|
cmd.Execute()
|
||||||
|
}
|
153
traefik/traefik-certs-dumper/readme.md
Normal file
153
traefik/traefik-certs-dumper/readme.md
Normal file
@@ -0,0 +1,153 @@
|
|||||||
|
# traefik-certs-dumper
|
||||||
|
|
||||||
|
[](https://github.com/ldez/traefik-certs-dumper/releases/latest)
|
||||||
|
[](https://travis-ci.org/ldez/traefik-certs-dumper)
|
||||||
|
[](https://hub.docker.com/r/ldez/traefik-certs-dumper/)
|
||||||
|
[](https://goreportcard.com/report/github.com/ldez/traefik-certs-dumper)
|
||||||
|
|
||||||
|
If you appreciate this project:
|
||||||
|
|
||||||
|
[](https://saythanks.io/to/ldez)
|
||||||
|
|
||||||
|
## Features
|
||||||
|
|
||||||
|
- Supported sources:
|
||||||
|
- file ("acme.json")
|
||||||
|
- KV stores (Consul, Etcd, Zookeeper, Boltdb)
|
||||||
|
- Watch changes:
|
||||||
|
- from file ("acme.json")
|
||||||
|
- from KV stores (Consul, Etcd, Zookeeper)
|
||||||
|
- Output formats:
|
||||||
|
- use domain as sub-directory (allow custom names and extensions)
|
||||||
|
- flat (domain as filename)
|
||||||
|
- Hook (only with watch mode and if the data source changes)
|
||||||
|
|
||||||
|
## Installation
|
||||||
|
|
||||||
|
### Download / CI Integration
|
||||||
|
|
||||||
|
```bash
|
||||||
|
curl -sfL https://raw.githubusercontent.com/ldez/traefik-certs-dumper/master/godownloader.sh | bash -s -- -b $GOPATH/bin v1.5.0
|
||||||
|
```
|
||||||
|
|
||||||
|
<!--
|
||||||
|
To generate the script:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
godownloader --repo=ldez/traefik-certs-dumper -o godownloader.sh
|
||||||
|
|
||||||
|
# or
|
||||||
|
|
||||||
|
godownloader --repo=ldez/traefik-certs-dumper > godownloader.sh
|
||||||
|
```
|
||||||
|
-->
|
||||||
|
|
||||||
|
### From Binaries
|
||||||
|
|
||||||
|
You can use pre-compiled binaries:
|
||||||
|
|
||||||
|
* To get the binary just download the latest release for your OS/Arch from [the releases page](https://github.com/ldez/traefik-certs-dumper/releases/)
|
||||||
|
* Unzip the archive.
|
||||||
|
* Add `traefik-certs-dumper` in your `PATH`.
|
||||||
|
|
||||||
|
### From Docker
|
||||||
|
|
||||||
|
```bash
|
||||||
|
docker run ldez/traefik-certs-dumper:<tag_name>
|
||||||
|
```
|
||||||
|
|
||||||
|
## Usage
|
||||||
|
|
||||||
|
- [traefik-certs-dumper](docs/traefik-certs-dumper.md)
|
||||||
|
- [traefik-certs-dumper file](docs/traefik-certs-dumper_file.md)
|
||||||
|
- [traefik-certs-dumper kv](docs/traefik-certs-dumper_kv.md)
|
||||||
|
|
||||||
|
## Examples
|
||||||
|
|
||||||
|
### Simple Dump
|
||||||
|
|
||||||
|
```console
|
||||||
|
$ traefik-certs-dumper file
|
||||||
|
dump
|
||||||
|
├──certs
|
||||||
|
│ └──my.domain.com.key
|
||||||
|
└──private
|
||||||
|
├──my.domain.com.crt
|
||||||
|
└──letsencrypt.key
|
||||||
|
```
|
||||||
|
|
||||||
|
### Change source and destination
|
||||||
|
|
||||||
|
```console
|
||||||
|
$ traefik-certs-dumper file --source ./acme.json --dest ./dump/test
|
||||||
|
test
|
||||||
|
├──certs
|
||||||
|
│ └──my.domain.com.key
|
||||||
|
└──private
|
||||||
|
├──my.domain.com.crt
|
||||||
|
└──letsencrypt.key
|
||||||
|
```
|
||||||
|
|
||||||
|
### Use domain as sub-directory
|
||||||
|
|
||||||
|
```console
|
||||||
|
$ traefik-certs-dumper file --domain-subdir=true
|
||||||
|
dump
|
||||||
|
├──my.domain.com
|
||||||
|
│ ├──certificate.crt
|
||||||
|
│ └──privatekey.key
|
||||||
|
└──private
|
||||||
|
└──letsencrypt.key
|
||||||
|
```
|
||||||
|
|
||||||
|
#### Change file extension
|
||||||
|
|
||||||
|
```console
|
||||||
|
$ traefik-certs-dumper file --domain-subdir --crt-ext=.pem --key-ext=.pem
|
||||||
|
dump
|
||||||
|
├──my.domain.com
|
||||||
|
│ ├──certificate.pem
|
||||||
|
│ └──privatekey.pem
|
||||||
|
└──private
|
||||||
|
└──letsencrypt.key
|
||||||
|
```
|
||||||
|
|
||||||
|
#### Change file name
|
||||||
|
|
||||||
|
```console
|
||||||
|
$ traefik-certs-dumper file --domain-subdir --crt-name=fullchain --key-name=privkey
|
||||||
|
dump
|
||||||
|
├──my.domain.com
|
||||||
|
│ ├──fullchain.crt
|
||||||
|
│ └──privkey.key
|
||||||
|
└──private
|
||||||
|
└──letsencrypt.key
|
||||||
|
```
|
||||||
|
|
||||||
|
### KV store
|
||||||
|
|
||||||
|
#### Consul
|
||||||
|
|
||||||
|
```console
|
||||||
|
$ traefik-certs-dumper kv consul --endpoints localhost:8500
|
||||||
|
```
|
||||||
|
|
||||||
|
#### Etcd
|
||||||
|
|
||||||
|
```console
|
||||||
|
$ traefik-certs-dumper kv etcd --endpoints localhost:2379
|
||||||
|
```
|
||||||
|
|
||||||
|
#### Boltdb
|
||||||
|
|
||||||
|
```console
|
||||||
|
$ traefik-certs-dumper kv boltdb --endpoints /the/path/to/mydb.db
|
||||||
|
```
|
||||||
|
|
||||||
|
#### Zookeeper
|
||||||
|
|
||||||
|
```console
|
||||||
|
$ traefik-certs-dumper kv zookeeper --endpoints localhost:2181
|
||||||
|
```
|
||||||
|
|
||||||
|
|
24
traefik/traefik-certs-dumper/tmpl.Dockerfile
Normal file
24
traefik/traefik-certs-dumper/tmpl.Dockerfile
Normal file
@@ -0,0 +1,24 @@
|
|||||||
|
FROM golang:1-alpine as builder
|
||||||
|
|
||||||
|
RUN apk --update upgrade \
|
||||||
|
&& apk --no-cache --no-progress add git make gcc musl-dev ca-certificates tzdata
|
||||||
|
|
||||||
|
WORKDIR /go/src/github.com/ldez/traefik-certs-dumper
|
||||||
|
|
||||||
|
ENV GO111MODULE on
|
||||||
|
COPY go.mod go.sum ./
|
||||||
|
RUN go mod download
|
||||||
|
|
||||||
|
COPY . .
|
||||||
|
RUN GOARCH={{ .GoARCH }} GOARM={{ .GoARM }} make build
|
||||||
|
|
||||||
|
FROM {{ .RuntimeImage }}
|
||||||
|
|
||||||
|
# Not supported for multi-arch without Buildkit or QEMU
|
||||||
|
#RUN apk --update upgrade \
|
||||||
|
# && apk --no-cache --no-progress add ca-certificates
|
||||||
|
|
||||||
|
COPY --from=builder /etc/ssl/certs/ca-certificates.crt /etc/ssl/certs/
|
||||||
|
COPY --from=builder /go/src/github.com/ldez/traefik-certs-dumper/traefik-certs-dumper /usr/bin/traefik-certs-dumper
|
||||||
|
|
||||||
|
ENTRYPOINT ["/usr/bin/traefik-certs-dumper"]
|
Reference in New Issue
Block a user