diff --git a/Dockerfile b/Dockerfile index 4a77f3e..496850c 100644 --- a/Dockerfile +++ b/Dockerfile @@ -1,165 +1,333 @@ -FROM mcr.microsoft.com/windows/servercore:ltsc2016 - -#settings -ENV JAVA_OPTS='-Xmx3000m' -ENV TOMCAT_MAJOR_VERSION=9 -ENV TOMCAT_VERSION=9.0.21 -ENV CATALINA_HOME=c:\\Tomcat -ENV IDP_VERSION=3.4.4 -ENV TIERVERSION=20190701 - -### -##below is for Corretto Java -ENV JAVA_HOME='C:\Program Files\Amazon Corretto\jdk1.8.0_212' -ENV CORRETTO_VERSION='8.212.04.2' -##below is for Zulu Java -#ENV JAVA_HOME='c:\zulujava\zulu-8\' -#ENV JAVA_INSTALL_FILENAME=zulu8.36.0.1-ca-jdk8.0.202-win_x64.msi -##below is for Oracle Java -#ENV JAVA_VERSION=8u171 -#ENV JAVA_BUNDLE_ID=233172_512cd62ec5174c3487ac17c61aaa89e8 -#ENV JAVA_INSTALL_FOLDER=jre1.8.0_171 -#ENV JAVA_HOME=c:\\Java\\$JAVA_INSTALL_FOLDER - -RUN powershell [Environment]::SetEnvironmentVariable('JAVA_HOME', '%JAVA_HOME%', [System.EnvironmentVariableTarget]::Machine ) -ENV SHIB_INSTALL_FILE=C:\\shibboleth-identity-provider-$IDP_VERSION-x64.msi - -###install Corretto Java -RUN powershell (new-object System.Net.WebClient).Downloadfile('https://d3pxv6yz143wms.cloudfront.net/%CORRETTO_VERSION%/amazon-corretto-%CORRETTO_VERSION%-1-windows-x64.msi', 'C:\corretto-java-%CORRETTO_VERSION%') -RUN powershell If ((Get-FileHash C:\corretto-java-%CORRETTO_VERSION% -Algorithm MD5).Hash.ToLower() -eq 'a030757f394ffdd73018e24e2ec1991f') { ` \ - start-process -filepath c:\windows\system32\msiexec.exe -passthru -wait -argumentlist '/i','C:\corretto-java-%CORRETTO_VERSION%','/qn' ` \ - } Else { throw 'bad hash comparison on Zulu Java download' } -RUN del C:\corretto-java-%CORRETTO_VERSION% - -###install Zulu Java -#RUN powershell (new-object System.Net.WebClient).Downloadfile('https://cdn.azul.com/zulu/bin/%JAVA_INSTALL_FILENAME%', 'C:\%JAVA_INSTALL_FILENAME%') -#RUN powershell If ((Get-FileHash C:\%JAVA_INSTALL_FILENAME% -Algorithm MD5).Hash.ToLower() -eq 'cf7825107dd71cd9a6455c2855838966') { ` \ -# start-process -filepath c:\windows\system32\msiexec.exe -passthru -wait -argumentlist '/i','C:\%JAVA_INSTALL_FILENAME%','APPLICATIONROOTDIRECTORY=c:\zulujava','/qn' ` \ -# } Else { throw 'bad hash comparison on Zulu Java download' } -#RUN del C:\%JAVA_INSTALL_FILENAME% - -##install Oracle Java -#RUN powershell (new-object System.Net.WebClient).Downloadfile('http://javadl.oracle.com/webapps/download/AutoDL?BundleId=%JAVA_BUNDLE_ID%', 'C:\jre-%JAVA_VERSION%-windows-x64.exe') -#RUN powershell If ((Get-FileHash C:\jre-%JAVA_VERSION%-windows-x64.exe).Hash.ToLower() -eq 'd5256b3d1a6da959ea98ea2a2be3a05a7df9d1a5cd75db3930f935ab71ce43b8') { ` \ -# start-process -filepath C:\jre-%JAVA_VERSION%-windows-x64.exe -passthru -wait -argumentlist '/s',%JAVA_INSTALL_CLI_STRING%,'/L','installj64.log' ` \ -# } Else { throw 'bad hash comparison on Java download' } -#RUN del C:\jre-%JAVA_VERSION%-windows-x64.exe - -##install Oracle Java Cryptography Extensions -#RUN powershell ` \ -# $ws = New-Object Microsoft.PowerShell.Commands.WebRequestSession ; ` \ -# $c = New-Object System.Net.Cookie ; ` \ -# $c.Name = 'oraclelicense' ; ` \ -# $c.Value = 'accept-securebackup-cookie' ; ` \ -# $c.Domain = 'oracle.com' ; ` \ -# $ws.Cookies.Add($c) ; ` \ -# Invoke-WebRequest 'http://download.oracle.com/otn-pub/java/jce/8/jce_policy-8.zip' -WebSession $ws -TimeoutSec 1000 -OutFile 'c:\jce_policy-8.zip' -#RUN powershell If ((Get-FileHash c:\jce_policy-8.zip).Hash.ToLower() -eq 'f3020a3922efd6626c2fff45695d527f34a8020e938a49292561f18ad1320b59') { ` \ -# Add-Type -AssemblyName System.IO.Compression.FileSystem ; [System.IO.Compression.ZipFile]::ExtractToDirectory('c:\jce_policy-8.zip', 'c:\jcepolicy') ; \ -# copy -Force -Path c:\jcepolicy\UnlimitedJCEPolicyJDK8\local_policy.jar -Destination c:\Java\%JAVA_INSTALL_FOLDER%\lib\security ; copy -Force -Path c:\jcepolicy\UnlimitedJCEPolicyJDK8\US_export_policy.jar -Destination c:\Java\%JAVA_INSTALL_FOLDER%\lib\security ; \ -# } Else { throw 'bad hash comparison on JCE download' } -#RUN del c:\jce_policy-8.zip - - -##install Tomcat -COPY container_files/config.ini c:\\config.ini -RUN powershell (new-object System.Net.WebClient).Downloadfile('http://www.apache.org/dist/tomcat/tomcat-%TOMCAT_MAJOR_VERSION%/v%TOMCAT_VERSION%/bin/apache-tomcat-%TOMCAT_VERSION%.exe', 'C:\apache-tomcat-%TOMCAT_VERSION%.exe') -RUN powershell If ((Get-FileHash C:\apache-tomcat-%TOMCAT_VERSION%.exe -Algorithm SHA512).Hash.ToLower() -eq ` \ - '18bb722854b434d11e03e75c04254c095e92716a70d4159331685d4f472640bdb2662f1c013e99fd600112519d2a4ca76f9cf278a59e49ae37b1c76db6995d0d') ` \ - { ` \ - start-process -filepath C:\apache-tomcat-%TOMCAT_VERSION%.exe -passthru -wait -argumentlist '/S','/C=c:\config.ini','/D=c:\Tomcat' ` \ - } Else { throw 'bad hash comparison on Tomcat download' } -RUN del C:\apache-tomcat-%TOMCAT_VERSION%.exe - -#copy temp SSL cert for tomcat in c:\sslcert -COPY container_files/keystore.jks c:\\sslcert\\keystore.jks -#copy temp tomcat config file (listening on 443, cert at c:\sslcert\keystore.jks -COPY container_files/server.xml c:\\Tomcat\\conf\\server.xml -#cleanup tomcat install -RUN rmdir /S /Q c:\Tomcat\webapps\docs && rmdir /S /Q c:\Tomcat\webapps\manager && del /F /Q c:\tomcat\webapps\ROOT\*.* && del /F /Q c:\tomcat\webapps\ROOT\WEB-INF\*.* && rmdir c:\tomcat\webapps\ROOT\WEB-INF - -##install Shibb -RUN powershell (new-object System.Net.WebClient).Downloadfile('https://shibboleth.net/downloads/identity-provider/latest/shibboleth-identity-provider-%IDP_VERSION%-x64.msi', 'C:\shibboleth-identity-provider-%IDP_VERSION%-x64.msi') -RUN powershell If ((Get-FileHash C:\shibboleth-identity-provider-%IDP_VERSION%-x64.msi -Algorithm SHA1).Hash.ToLower() -eq '821fdb7c178a247059142f8fbd6d7a895057e2fe') { ` \ - start-process -filepath c:\windows\system32\msiexec.exe -passthru -wait -argumentlist '/i','C:\shibboleth-identity-provider-%IDP_VERSION%-x64.msi','/qn','INSTALLDIR=c:\opt\shibboleth-idp','NO_FIREWALL_EXCEPTION=true','DNSNAME=shibboleth.example.org','IDP_SCOPE=example.org' ` \ - } Else { throw 'bad hash comparison on IdP download' } -RUN del C:\shibboleth-identity-provider-%IDP_VERSION%-x64.msi - -##add JSTL -ADD https://build.shibboleth.net/nexus/service/local/repositories/thirdparty/content/javax/servlet/jstl/1.2/jstl-1.2.jar c:\\opt\\shibboleth-idp\\edit-webapp\\WEB-INF\\lib\\jstl-1.2.jar -RUN C:/opt/shibboleth-idp/bin/build.bat -noinput -S -q -Didp.target.dir=c:/opt/shibboleth-idp - -#link IdP's war file to Tomcat -RUN mklink c:\Tomcat\webapps\idp.war c:\opt\shibboleth-idp\war\idp.war - -#copy TIER beacon script -RUN mkdir c:\util -RUN mkdir c:\opt\certs -COPY container_files/sendtierbeacon.ps1 c:\\util -#schedule script to run (at random time) -#RUN powershell ($tm=((Get-Random -Minimum 0 -Maximum 4) -as [string]) + ":" + ((Get-Random -Minimum 0 -Maximum 60) -as [string]) ; start-process -filepath schtasks -passthru -wait -argumentlist '/create','/tn','\"Send TIER Beacon\"','/tr','c:\util\sendtierbeacon.ps1','/sc','DAILY','/st',"$tm" -#The line above is triggering an apprent bug in docker or windows core (essentially invalid XML), the 2 lines below are the workaround -COPY container_files/TIER_Beacon_Task.xml c:\\TIER_Beacon_Task.xml -RUN powershell schtasks /Create /XML c:\TIER_Beacon_Task.xml /TN 'TIER Beacon' ; $tm=((Get-Random -Minimum 0 -Maximum 4) -as [string]).padleft(2,'0') + ':' + ((Get-Random -Minimum 0 -Maximum 60) -as [string]).padleft(2,'0') ; schtasks /Change /TN 'TIER Beacon' /ST $tm -RUN del c:\TIER_Beacon_Task.xml - - -################################################# -### Settings for a burned-in config (default) ### -################################################# -# Ensure the following locations are accurate (and uncommented) if you plan to burn your configuration into your containers by uncommenting the relevant section below. -# They represent the folder names/paths on your build host of the relevant config material needed to run the container. You can also specify these -# with --build-arg in your 'docker build' command. - -#ARG TOMCFG=config\\tomcat -#ARG TOMLOG=logs\\tomcat -#ARG TOMCERT=credentials\\tomcat -#ARG TOMWWWROOT=wwwroot -#ARG SHBCFG=config\\shib-idp\\conf -#ARG SHBCREDS=credentials\\shib-idp -#ARG SHBVIEWS=config\\shib-idp\\views -#ARG SHBEDWAPP=config\\shib-idp\\edit-webapp -#ARG SHBMSGS=config\\shib-idp\\messages -#ARG SHBMD=config\\shib-idp\\metadata -#ARG SHBLOG=logs\\shib-idp - -# Also, ***NOTE*** For a burned config, *uncomment* the ADD lines below and *comment* the lines of the VOLUME command above (~ 30 lines up) -# -# consider not doing the one volume below (which maps the IdP's logs folder to a local folder) as it creates a run-time -# dependency and a better solution might be to use syslog from the container -# VOLUME ["c:\\idplogs", "c:\\opt\\shibboleth-idp\\logs"] -# - -#ADD $TOMCFG c:\\Tomcat\\conf -#ADD $TOMCERT c:\\sslcert -#ADD $TOMWWWROOT c:\\Tomcat\\webapps\\ROOT -#ADD $SHBCFG c:\\opt\\shibboleth-idp\\conf -#ADD $SHBCREDS c:\\opt\\shibboleth-idp\\credentials -#ADD $SHBVIEWS c:\\opt\\shibboleth-idp\\views -#ADD $SHBEDWAPP c:\\opt\\shibboleth-idp\\edit-webapp -#ADD $SHBMSGS c:\\opt\\shibboleth-idp\\messages -#ADD $SHBMD c:\\opt\\shibboleth-idp\\metadata -# -############################################################################### - -# remove existing files from the installer so that secrets can propagate (UNCOMMENT if you are using secrets) -#!# RUN del c:\opt\shibboleth-idp\conf\idp.properties -#!# RUN del c:\opt\shibboleth-idp\conf\ldap.properties -#!# RUN del c:\opt\shibboleth-idp\conf\relying-party.xml -#!# RUN del c:\opt\shibboleth-idp\conf\attribute-filter.xml -#!# RUN del c:\opt\shibboleth-idp\conf\attribute-resolver.xml -#!# RUN del c:\opt\shibboleth-idp\conf\metadata-providers.xml -#!# RUN del c:\opt\shibboleth-idp\credentials\idp-signing.key -#!# RUN del c:\opt\shibboleth-idp\credentials\idp-signing.crt -#!# RUN del c:\opt\shibboleth-idp\credentials\idp-encryption.key -#!# RUN del c:\opt\shibboleth-idp\credentials\idp-encryption.crt -#!# RUN del c:\opt\shibboleth-idp\credentials\sealer.jks -#!# RUN del c:\opt\shibboleth-idp\credentials\sealer.kver - -#establish a healthcheck command so that docker might know the container's true state -HEALTHCHECK --interval=2m --timeout=30s \ - CMD powershell [System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true}; (new-object System.Net.WebClient).DownloadString("https://127.0.0.1/idp/status") - -EXPOSE 443 - -CMD [ "cmd /c c:\\Tomcat\\bin\\catalina.bat run" ] + +FROM mcr.microsoft.com/windows/servercore:ltsc2016 + +#settings +ENV JAVA_OPTS='-Xmx3000m' +ENV TOMCAT_MAJOR_VERSION=9 +ENV TOMCAT_VERSION=9.0.21 +ENV CATALINA_HOME=c:\\Tomcat +ENV IDP_VERSION=3.4.4 +ENV TIERVERSION=20190701 + +### +##below is for Corretto Java +ENV JAVA_HOME='C:\Program Files\Amazon Corretto\jdk1.8.0_212' +ENV CORRETTO_VERSION='8.212.04.2' +##below is for Zulu Java +#ENV JAVA_HOME='c:\zulujava\zulu-8\' +#ENV JAVA_INSTALL_FILENAME=zulu8.36.0.1-ca-jdk8.0.202-win_x64.msi +##below is for Oracle Java +#ENV JAVA_VERSION=8u171 +#ENV JAVA_BUNDLE_ID=233172_512cd62ec5174c3487ac17c61aaa89e8 +#ENV JAVA_INSTALL_FOLDER=jre1.8.0_171 +#ENV JAVA_HOME=c:\\Java\\$JAVA_INSTALL_FOLDER + +RUN powershell [Environment]::SetEnvironmentVariable('JAVA_HOME', '%JAVA_HOME%', [System.EnvironmentVariableTarget]::Machine ) +ENV SHIB_INSTALL_FILE=C:\\shibboleth-identity-provider-$IDP_VERSION-x64.msi + +###install Corretto Java +RUN powershell (new-object System.Net.WebClient).Downloadfile('https://d3pxv6yz143wms.cloudfront.net/%CORRETTO_VERSION%/amazon-corretto-%CORRETTO_VERSION%-1-windows-x64.msi', 'C:\corretto-java-%CORRETTO_VERSION%') +RUN powershell If ((Get-FileHash C:\corretto-java-%CORRETTO_VERSION% -Algorithm MD5).Hash.ToLower() -eq 'a030757f394ffdd73018e24e2ec1991f') { ` \ + start-process -filepath c:\windows\system32\msiexec.exe -passthru -wait -argumentlist '/i','C:\corretto-java-%CORRETTO_VERSION%','/qn' ` \ + } Else { throw 'bad hash comparison on Zulu Java download' } +RUN del C:\corretto-java-%CORRETTO_VERSION% + +###install Zulu Java +#RUN powershell (new-object System.Net.WebClient).Downloadfile('https://cdn.azul.com/zulu/bin/%JAVA_INSTALL_FILENAME%', 'C:\%JAVA_INSTALL_FILENAME%') +#RUN powershell If ((Get-FileHash C:\%JAVA_INSTALL_FILENAME% -Algorithm MD5).Hash.ToLower() -eq 'cf7825107dd71cd9a6455c2855838966') { ` \ +# start-process -filepath c:\windows\system32\msiexec.exe -passthru -wait -argumentlist '/i','C:\%JAVA_INSTALL_FILENAME%','APPLICATIONROOTDIRECTORY=c:\zulujava','/qn' ` \ +# } Else { throw 'bad hash comparison on Zulu Java download' } +#RUN del C:\%JAVA_INSTALL_FILENAME% + +##install Oracle Java +#RUN powershell (new-object System.Net.WebClient).Downloadfile('http://javadl.oracle.com/webapps/download/AutoDL?BundleId=%JAVA_BUNDLE_ID%', 'C:\jre-%JAVA_VERSION%-windows-x64.exe') +#RUN powershell If ((Get-FileHash C:\jre-%JAVA_VERSION%-windows-x64.exe).Hash.ToLower() -eq 'd5256b3d1a6da959ea98ea2a2be3a05a7df9d1a5cd75db3930f935ab71ce43b8') { ` \ +# start-process -filepath C:\jre-%JAVA_VERSION%-windows-x64.exe -passthru -wait -argumentlist '/s',%JAVA_INSTALL_CLI_STRING%,'/L','installj64.log' ` \ +# } Else { throw 'bad hash comparison on Java download' } +#RUN del C:\jre-%JAVA_VERSION%-windows-x64.exe + +##install Oracle Java Cryptography Extensions +#RUN powershell ` \ +# $ws = New-Object Microsoft.PowerShell.Commands.WebRequestSession ; ` \ +# $c = New-Object System.Net.Cookie ; ` \ +# $c.Name = 'oraclelicense' ; ` \ +# $c.Value = 'accept-securebackup-cookie' ; ` \ +# $c.Domain = 'oracle.com' ; ` \ +# $ws.Cookies.Add($c) ; ` \ +# Invoke-WebRequest 'http://download.oracle.com/otn-pub/java/jce/8/jce_policy-8.zip' -WebSession $ws -TimeoutSec 1000 -OutFile 'c:\jce_policy-8.zip' +#RUN powershell If ((Get-FileHash c:\jce_policy-8.zip).Hash.ToLower() -eq 'f3020a3922efd6626c2fff45695d527f34a8020e938a49292561f18ad1320b59') { ` \ +# Add-Type -AssemblyName System.IO.Compression.FileSystem ; [System.IO.Compression.ZipFile]::ExtractToDirectory('c:\jce_policy-8.zip', 'c:\jcepolicy') ; \ +# copy -Force -Path c:\jcepolicy\UnlimitedJCEPolicyJDK8\local_policy.jar -Destination c:\Java\%JAVA_INSTALL_FOLDER%\lib\security ; copy -Force -Path c:\jcepolicy\UnlimitedJCEPolicyJDK8\US_export_policy.jar -Destination c:\Java\%JAVA_INSTALL_FOLDER%\lib\security ; \ +# } Else { throw 'bad hash comparison on JCE download' } +#RUN del c:\jce_policy-8.zip + + +##install Tomcat +COPY container_files/config.ini c:\\config.ini +RUN powershell (new-object System.Net.WebClient).Downloadfile('http://www.apache.org/dist/tomcat/tomcat-%TOMCAT_MAJOR_VERSION%/v%TOMCAT_VERSION%/bin/apache-tomcat-%TOMCAT_VERSION%.exe', 'C:\apache-tomcat-%TOMCAT_VERSION%.exe') +RUN powershell If ((Get-FileHash C:\apache-tomcat-%TOMCAT_VERSION%.exe -Algorithm SHA512).Hash.ToLower() -eq ` \ + '18bb722854b434d11e03e75c04254c095e92716a70d4159331685d4f472640bdb2662f1c013e99fd600112519d2a4ca76f9cf278a59e49ae37b1c76db6995d0d') ` \ + { ` \ + start-process -filepath C:\apache-tomcat-%TOMCAT_VERSION%.exe -passthru -wait -argumentlist '/S','/C=c:\config.ini','/D=c:\Tomcat' ` \ + } Else { throw 'bad hash comparison on Tomcat download' } +RUN del C:\apache-tomcat-%TOMCAT_VERSION%.exe + +#copy temp SSL cert for tomcat in c:\sslcert +COPY container_files/keystore.jks c:\\sslcert\\keystore.jks +#copy temp tomcat config file (listening on 443, cert at c:\sslcert\keystore.jks +COPY container_files/server.xml c:\\Tomcat\\conf\\server.xml +#cleanup tomcat install +RUN rmdir /S /Q c:\Tomcat\webapps\docs && rmdir /S /Q c:\Tomcat\webapps\manager && del /F /Q c:\tomcat\webapps\ROOT\*.* && del /F /Q c:\tomcat\webapps\ROOT\WEB-INF\*.* && rmdir c:\tomcat\webapps\ROOT\WEB-INF + +##install Shibb +RUN powershell (new-object System.Net.WebClient).Downloadfile('https://shibboleth.net/downloads/identity-provider/latest/shibboleth-identity-provider-%IDP_VERSION%-x64.msi', 'C:\shibboleth-identity-provider-%IDP_VERSION%-x64.msi') +RUN powershell If ((Get-FileHash C:\shibboleth-identity-provider-%IDP_VERSION%-x64.msi -Algorithm SHA1).Hash.ToLower() -eq '821fdb7c178a247059142f8fbd6d7a895057e2fe') { ` \ + start-process -filepath c:\windows\system32\msiexec.exe -passthru -wait -argumentlist '/i','C:\shibboleth-identity-provider-%IDP_VERSION%-x64.msi','/qn','INSTALLDIR=c:\opt\shibboleth-idp','NO_FIREWALL_EXCEPTION=true','DNSNAME=shibboleth.example.org','IDP_SCOPE=example.org' ` \ + } Else { throw 'bad hash comparison on IdP download' } +RUN del C:\shibboleth-identity-provider-%IDP_VERSION%-x64.msi + +##add JSTL +ADD https://build.shibboleth.net/nexus/service/local/repositories/thirdparty/content/javax/servlet/jstl/1.2/jstl-1.2.jar c:\\opt\\shibboleth-idp\\edit-webapp\\WEB-INF\\lib\\jstl-1.2.jar +RUN C:/opt/shibboleth-idp/bin/build.bat -noinput -S -q -Didp.target.dir=c:/opt/shibboleth-idp + +#link IdP's war file to Tomcat +RUN mklink c:\Tomcat\webapps\idp.war c:\opt\shibboleth-idp\war\idp.war + +#copy TIER beacon script +RUN mkdir c:\util +RUN mkdir c:\opt\certs +COPY container_files/sendtierbeacon.ps1 c:\\util +#schedule script to run (at random time) +#RUN powershell ($tm=((Get-Random -Minimum 0 -Maximum 4) -as [string]) + ":" + ((Get-Random -Minimum 0 -Maximum 60) -as [string]) ; start-process -filepath schtasks -passthru -wait -argumentlist '/create','/tn','\"Send TIER Beacon\"','/tr','c:\util\sendtierbeacon.ps1','/sc','DAILY','/st',"$tm" +#The line above is triggering an apprent bug in docker or windows core (essentially invalid XML), the 2 lines below are the workaround +COPY container_files/TIER_Beacon_Task.xml c:\\TIER_Beacon_Task.xml +RUN powershell schtasks /Create /XML c:\TIER_Beacon_Task.xml /TN 'TIER Beacon' ; $tm=((Get-Random -Minimum 0 -Maximum 4) -as [string]).padleft(2,'0') + ':' + ((Get-Random -Minimum 0 -Maximum 60) -as [string]).padleft(2,'0') ; schtasks /Change /TN 'TIER Beacon' /ST $tm +RUN del c:\TIER_Beacon_Task.xml + + +################################################# +### Settings for a burned-in config (default) ### +################################################# +# Ensure the following locations are accurate (and uncommented) if you plan to burn your configuration into your containers by uncommenting the relevant section below. +# They represent the folder names/paths on your build host of the relevant config material needed to run the container. You can also specify these +# with --build-arg in your 'docker build' command. + +#ARG TOMCFG=config\\tomcat +#ARG TOMLOG=logs\\tomcat +#ARG TOMCERT=credentials\\tomcat +#ARG TOMWWWROOT=wwwroot +#ARG SHBCFG=config\\shib-idp\\conf +#ARG SHBCREDS=credentials\\shib-idp +#ARG SHBVIEWS=config\\shib-idp\\views +#ARG SHBEDWAPP=config\\shib-idp\\edit-webapp +#ARG SHBMSGS=config\\shib-idp\\messages +#ARG SHBMD=config\\shib-idp\\metadata +#ARG SHBLOG=logs\\shib-idp + +# Also, ***NOTE*** For a burned config, *uncomment* the ADD lines below and *comment* the lines of the VOLUME command above (~ 30 lines up) +# +# consider not doing the one volume below (which maps the IdP's logs folder to a local folder) as it creates a run-time +# dependency and a better solution might be to use syslog from the container +# VOLUME ["c:\\idplogs", "c:\\opt\\shibboleth-idp\\logs"] +# + +#ADD $TOMCFG c:\\Tomcat\\conf +#ADD $TOMCERT c:\\sslcert +#ADD $TOMWWWROOT c:\\Tomcat\\webapps\\ROOT +#ADD $SHBCFG c:\\opt\\shibboleth-idp\\conf +#ADD $SHBCREDS c:\\opt\\shibboleth-idp\\credentials +#ADD $SHBVIEWS c:\\opt\\shibboleth-idp\\views +#ADD $SHBEDWAPP c:\\opt\\shibboleth-idp\\edit-webapp +#ADD $SHBMSGS c:\\opt\\shibboleth-idp\\messages +#ADD $SHBMD c:\\opt\\shibboleth-idp\\metadata +# +############################################################################### + +# remove existing files from the installer so that secrets can propagate (UNCOMMENT if you are using secrets) +#!# RUN del c:\opt\shibboleth-idp\conf\idp.properties +#!# RUN del c:\opt\shibboleth-idp\conf\ldap.properties +#!# RUN del c:\opt\shibboleth-idp\conf\relying-party.xml +#!# RUN del c:\opt\shibboleth-idp\conf\attribute-filter.xml +#!# RUN del c:\opt\shibboleth-idp\conf\attribute-resolver.xml +#!# RUN del c:\opt\shibboleth-idp\conf\metadata-providers.xml +#!# RUN del c:\opt\shibboleth-idp\credentials\idp-signing.key +#!# RUN del c:\opt\shibboleth-idp\credentials\idp-signing.crt +#!# RUN del c:\opt\shibboleth-idp\credentials\idp-encryption.key +#!# RUN del c:\opt\shibboleth-idp\credentials\idp-encryption.crt +#!# RUN del c:\opt\shibboleth-idp\credentials\sealer.jks +#!# RUN del c:\opt\shibboleth-idp\credentials\sealer.kver + +#establish a healthcheck command so that docker might know the container's true state +HEALTHCHECK --interval=2m --timeout=30s \ + CMD powershell [System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true}; (new-object System.Net.WebClient).DownloadString("https://127.0.0.1/idp/status") + +EXPOSE 443 + +CMD [ "cmd /c c:\\Tomcat\\bin\\catalina.bat run" ] +======= +FROM mcr.microsoft.com/windows/servercore:ltsc2016 + +#settings +ENV JAVA_OPTS='-Xmx3000m' +ENV TOMCAT_MAJOR_VERSION=9 +ENV TOMCAT_VERSION=9.0.21 +ENV CATALINA_HOME=c:\\Tomcat +ENV IDP_VERSION=3.4.4 +ENV TIERVERSION=20190701 + +### +##below is for Corretto Java +ENV JAVA_HOME='C:\Program Files\Amazon Corretto\jdk1.8.0_212' +ENV CORRETTO_VERSION='8.212.04.2' +##below is for Zulu Java +#ENV JAVA_HOME='c:\zulujava\zulu-8\' +#ENV JAVA_INSTALL_FILENAME=zulu8.36.0.1-ca-jdk8.0.202-win_x64.msi +##below is for Oracle Java +#ENV JAVA_VERSION=8u171 +#ENV JAVA_BUNDLE_ID=233172_512cd62ec5174c3487ac17c61aaa89e8 +#ENV JAVA_INSTALL_FOLDER=jre1.8.0_171 +#ENV JAVA_HOME=c:\\Java\\$JAVA_INSTALL_FOLDER + +RUN powershell [Environment]::SetEnvironmentVariable('JAVA_HOME', '%JAVA_HOME%', [System.EnvironmentVariableTarget]::Machine ) +ENV SHIB_INSTALL_FILE=C:\\shibboleth-identity-provider-$IDP_VERSION-x64.msi + +###install Corretto Java +RUN powershell (new-object System.Net.WebClient).Downloadfile('https://d3pxv6yz143wms.cloudfront.net/%CORRETTO_VERSION%/amazon-corretto-%CORRETTO_VERSION%-1-windows-x64.msi', 'C:\corretto-java-%CORRETTO_VERSION%') +RUN powershell If ((Get-FileHash C:\corretto-java-%CORRETTO_VERSION% -Algorithm MD5).Hash.ToLower() -eq 'a030757f394ffdd73018e24e2ec1991f') { ` \ + start-process -filepath c:\windows\system32\msiexec.exe -passthru -wait -argumentlist '/i','C:\corretto-java-%CORRETTO_VERSION%','/qn' ` \ + } Else { throw 'bad hash comparison on Zulu Java download' } +RUN del C:\corretto-java-%CORRETTO_VERSION% + +###install Zulu Java +#RUN powershell (new-object System.Net.WebClient).Downloadfile('https://cdn.azul.com/zulu/bin/%JAVA_INSTALL_FILENAME%', 'C:\%JAVA_INSTALL_FILENAME%') +#RUN powershell If ((Get-FileHash C:\%JAVA_INSTALL_FILENAME% -Algorithm MD5).Hash.ToLower() -eq 'cf7825107dd71cd9a6455c2855838966') { ` \ +# start-process -filepath c:\windows\system32\msiexec.exe -passthru -wait -argumentlist '/i','C:\%JAVA_INSTALL_FILENAME%','APPLICATIONROOTDIRECTORY=c:\zulujava','/qn' ` \ +# } Else { throw 'bad hash comparison on Zulu Java download' } +#RUN del C:\%JAVA_INSTALL_FILENAME% + +##install Oracle Java +#RUN powershell (new-object System.Net.WebClient).Downloadfile('http://javadl.oracle.com/webapps/download/AutoDL?BundleId=%JAVA_BUNDLE_ID%', 'C:\jre-%JAVA_VERSION%-windows-x64.exe') +#RUN powershell If ((Get-FileHash C:\jre-%JAVA_VERSION%-windows-x64.exe).Hash.ToLower() -eq 'd5256b3d1a6da959ea98ea2a2be3a05a7df9d1a5cd75db3930f935ab71ce43b8') { ` \ +# start-process -filepath C:\jre-%JAVA_VERSION%-windows-x64.exe -passthru -wait -argumentlist '/s',%JAVA_INSTALL_CLI_STRING%,'/L','installj64.log' ` \ +# } Else { throw 'bad hash comparison on Java download' } +#RUN del C:\jre-%JAVA_VERSION%-windows-x64.exe + +##install Oracle Java Cryptography Extensions +#RUN powershell ` \ +# $ws = New-Object Microsoft.PowerShell.Commands.WebRequestSession ; ` \ +# $c = New-Object System.Net.Cookie ; ` \ +# $c.Name = 'oraclelicense' ; ` \ +# $c.Value = 'accept-securebackup-cookie' ; ` \ +# $c.Domain = 'oracle.com' ; ` \ +# $ws.Cookies.Add($c) ; ` \ +# Invoke-WebRequest 'http://download.oracle.com/otn-pub/java/jce/8/jce_policy-8.zip' -WebSession $ws -TimeoutSec 1000 -OutFile 'c:\jce_policy-8.zip' +#RUN powershell If ((Get-FileHash c:\jce_policy-8.zip).Hash.ToLower() -eq 'f3020a3922efd6626c2fff45695d527f34a8020e938a49292561f18ad1320b59') { ` \ +# Add-Type -AssemblyName System.IO.Compression.FileSystem ; [System.IO.Compression.ZipFile]::ExtractToDirectory('c:\jce_policy-8.zip', 'c:\jcepolicy') ; \ +# copy -Force -Path c:\jcepolicy\UnlimitedJCEPolicyJDK8\local_policy.jar -Destination c:\Java\%JAVA_INSTALL_FOLDER%\lib\security ; copy -Force -Path c:\jcepolicy\UnlimitedJCEPolicyJDK8\US_export_policy.jar -Destination c:\Java\%JAVA_INSTALL_FOLDER%\lib\security ; \ +# } Else { throw 'bad hash comparison on JCE download' } +#RUN del c:\jce_policy-8.zip + + +##install Tomcat +COPY container_files/config.ini c:\\config.ini +RUN powershell (new-object System.Net.WebClient).Downloadfile('http://www.apache.org/dist/tomcat/tomcat-%TOMCAT_MAJOR_VERSION%/v%TOMCAT_VERSION%/bin/apache-tomcat-%TOMCAT_VERSION%.exe', 'C:\apache-tomcat-%TOMCAT_VERSION%.exe') +RUN powershell If ((Get-FileHash C:\apache-tomcat-%TOMCAT_VERSION%.exe -Algorithm SHA512).Hash.ToLower() -eq ` \ + '18bb722854b434d11e03e75c04254c095e92716a70d4159331685d4f472640bdb2662f1c013e99fd600112519d2a4ca76f9cf278a59e49ae37b1c76db6995d0d') ` \ + { ` \ + start-process -filepath C:\apache-tomcat-%TOMCAT_VERSION%.exe -passthru -wait -argumentlist '/S','/C=c:\config.ini','/D=c:\Tomcat' ` \ + } Else { throw 'bad hash comparison on Tomcat download' } +RUN del C:\apache-tomcat-%TOMCAT_VERSION%.exe + +#copy temp SSL cert for tomcat in c:\sslcert +COPY container_files/keystore.jks c:\\sslcert\\keystore.jks +#copy temp tomcat config file (listening on 443, cert at c:\sslcert\keystore.jks +COPY container_files/server.xml c:\\Tomcat\\conf\\server.xml +#cleanup tomcat install +RUN rmdir /S /Q c:\Tomcat\webapps\docs && rmdir /S /Q c:\Tomcat\webapps\manager && del /F /Q c:\tomcat\webapps\ROOT\*.* && del /F /Q c:\tomcat\webapps\ROOT\WEB-INF\*.* && rmdir c:\tomcat\webapps\ROOT\WEB-INF + +##install Shibb +RUN powershell (new-object System.Net.WebClient).Downloadfile('https://shibboleth.net/downloads/identity-provider/latest/shibboleth-identity-provider-%IDP_VERSION%-x64.msi', 'C:\shibboleth-identity-provider-%IDP_VERSION%-x64.msi') +RUN powershell If ((Get-FileHash C:\shibboleth-identity-provider-%IDP_VERSION%-x64.msi -Algorithm SHA1).Hash.ToLower() -eq '821fdb7c178a247059142f8fbd6d7a895057e2fe') { ` \ + start-process -filepath c:\windows\system32\msiexec.exe -passthru -wait -argumentlist '/i','C:\shibboleth-identity-provider-%IDP_VERSION%-x64.msi','/qn','INSTALLDIR=c:\opt\shibboleth-idp','NO_FIREWALL_EXCEPTION=true','DNSNAME=shibboleth.example.org','IDP_SCOPE=example.org' ` \ + } Else { throw 'bad hash comparison on IdP download' } +RUN del C:\shibboleth-identity-provider-%IDP_VERSION%-x64.msi + +##add JSTL +ADD https://build.shibboleth.net/nexus/service/local/repositories/thirdparty/content/javax/servlet/jstl/1.2/jstl-1.2.jar c:\\opt\\shibboleth-idp\\edit-webapp\\WEB-INF\\lib\\jstl-1.2.jar +RUN C:/opt/shibboleth-idp/bin/build.bat -noinput -S -q -Didp.target.dir=c:/opt/shibboleth-idp + +#link IdP's war file to Tomcat +RUN mklink c:\Tomcat\webapps\idp.war c:\opt\shibboleth-idp\war\idp.war + +#copy TIER beacon script +RUN mkdir c:\util +RUN mkdir c:\opt\certs +COPY container_files/sendtierbeacon.ps1 c:\\util +#schedule script to run (at random time) +#RUN powershell ($tm=((Get-Random -Minimum 0 -Maximum 4) -as [string]) + ":" + ((Get-Random -Minimum 0 -Maximum 60) -as [string]) ; start-process -filepath schtasks -passthru -wait -argumentlist '/create','/tn','\"Send TIER Beacon\"','/tr','c:\util\sendtierbeacon.ps1','/sc','DAILY','/st',"$tm" +#The line above is triggering an apprent bug in docker or windows core (essentially invalid XML), the 2 lines below are the workaround +COPY container_files/TIER_Beacon_Task.xml c:\\TIER_Beacon_Task.xml +RUN powershell schtasks /Create /XML c:\TIER_Beacon_Task.xml /TN 'TIER Beacon' ; $tm=((Get-Random -Minimum 0 -Maximum 4) -as [string]).padleft(2,'0') + ':' + ((Get-Random -Minimum 0 -Maximum 60) -as [string]).padleft(2,'0') ; schtasks /Change /TN 'TIER Beacon' /ST $tm +RUN del c:\TIER_Beacon_Task.xml + + +################################################# +### Settings for a burned-in config (default) ### +################################################# +# Ensure the following locations are accurate (and uncommented) if you plan to burn your configuration into your containers by uncommenting the relevant section below. +# They represent the folder names/paths on your build host of the relevant config material needed to run the container. You can also specify these +# with --build-arg in your 'docker build' command. + +#ARG TOMCFG=config\\tomcat +#ARG TOMLOG=logs\\tomcat +#ARG TOMCERT=credentials\\tomcat +#ARG TOMWWWROOT=wwwroot +#ARG SHBCFG=config\\shib-idp\\conf +#ARG SHBCREDS=credentials\\shib-idp +#ARG SHBVIEWS=config\\shib-idp\\views +#ARG SHBEDWAPP=config\\shib-idp\\edit-webapp +#ARG SHBMSGS=config\\shib-idp\\messages +#ARG SHBMD=config\\shib-idp\\metadata +#ARG SHBLOG=logs\\shib-idp + +# Also, ***NOTE*** For a burned config, *uncomment* the ADD lines below and *comment* the lines of the VOLUME command above (~ 30 lines up) +# +# consider not doing the one volume below (which maps the IdP's logs folder to a local folder) as it creates a run-time +# dependency and a better solution might be to use syslog from the container +# VOLUME ["c:\\idplogs", "c:\\opt\\shibboleth-idp\\logs"] +# + +#ADD $TOMCFG c:\\Tomcat\\conf +#ADD $TOMCERT c:\\sslcert +#ADD $TOMWWWROOT c:\\Tomcat\\webapps\\ROOT +#ADD $SHBCFG c:\\opt\\shibboleth-idp\\conf +#ADD $SHBCREDS c:\\opt\\shibboleth-idp\\credentials +#ADD $SHBVIEWS c:\\opt\\shibboleth-idp\\views +#ADD $SHBEDWAPP c:\\opt\\shibboleth-idp\\edit-webapp +#ADD $SHBMSGS c:\\opt\\shibboleth-idp\\messages +#ADD $SHBMD c:\\opt\\shibboleth-idp\\metadata +# +############################################################################### + +# remove existing files from the installer so that secrets can propagate (UNCOMMENT if you are using secrets) +#!# RUN del c:\opt\shibboleth-idp\conf\idp.properties +#!# RUN del c:\opt\shibboleth-idp\conf\ldap.properties +#!# RUN del c:\opt\shibboleth-idp\conf\relying-party.xml +#!# RUN del c:\opt\shibboleth-idp\conf\attribute-filter.xml +#!# RUN del c:\opt\shibboleth-idp\conf\attribute-resolver.xml +#!# RUN del c:\opt\shibboleth-idp\conf\metadata-providers.xml +#!# RUN del c:\opt\shibboleth-idp\credentials\idp-signing.key +#!# RUN del c:\opt\shibboleth-idp\credentials\idp-signing.crt +#!# RUN del c:\opt\shibboleth-idp\credentials\idp-encryption.key +#!# RUN del c:\opt\shibboleth-idp\credentials\idp-encryption.crt +#!# RUN del c:\opt\shibboleth-idp\credentials\sealer.jks +#!# RUN del c:\opt\shibboleth-idp\credentials\sealer.kver + +#establish a healthcheck command so that docker might know the container's true state +HEALTHCHECK --interval=2m --timeout=30s \ + CMD powershell [System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true}; (new-object System.Net.WebClient).DownloadString("https://127.0.0.1/idp/status") + +EXPOSE 443 + +CMD [ "cmd /c c:\\Tomcat\\bin\\catalina.bat run" ] + diff --git a/container_files/Sealer_Key_Rotation_Task.xml b/container_files/Sealer_Key_Rotation_Task.xml new file mode 100644 index 0000000..3c3f101 Binary files /dev/null and b/container_files/Sealer_Key_Rotation_Task.xml differ diff --git a/container_files/rotateSealerKey.ps1 b/container_files/rotateSealerKey.ps1 new file mode 100644 index 0000000..c481b1b --- /dev/null +++ b/container_files/rotateSealerKey.ps1 @@ -0,0 +1,77 @@ +#this script reads the sealer key configuration from the IdP's idp.properties file and rotates the sealer key +Try { + $ENABLE_SEALER_KEY_ROTATION = $env:ENABLE_SEALER_KEY_ROTATION + } +Catch { + $ENABLE_SEALER_KEY_ROTATION = 'True' + } + +If ($ENABLE_SEALER_KEY_ROTATION -eq 'True') { + #assure IDP_HOME + Try { + $IDP_HOME = $env:IDP_HOME + If ($IDP_HOME = null$) { + $IDP_HOME="c:\opt\shibboleth-idp" + } + } + Catch { + $IDP_HOME="c:\opt\shibboleth-idp" + } + #assure JAVA_HOME + Try { + $JAVA_HOME = $env:JAVA_HOME + If ($JAVA_HOME = null$) { + $JAVA_HOME="c:\zulujava\zulu-8" + } + } + Catch { + $JAVA_HOME="c:\zulujava\zulu-8" + } + + #settings + $IDPPROP=$IDP_HOME + "\conf\idp.properties" + #item below is only used if you have configured additional hosts to sync your sealer to + $SYNC_CRED="domain\user" + + #get config from properties file + $storefile = (cat $IDPPROP | where { $_ -match "idp.sealer.storeResource"}).Split("=")[1].Trim().Replace("%{idp.home}", $IDP_HOME).Replace("/","\") + $versionfile = (cat $IDPPROP | where { $_ -match "idp.sealer.versionResource"}).Split("=")[1].Trim().Replace("%{idp.home}", $IDP_HOME).Replace("/","\") + $storepass = (cat $IDPPROP | where { $_ -match "idp.sealer.storePassword"}).Split("=")[1].Trim().Replace("{","`{").Replace("}","`}") + $alias = (cat $IDPPROP | where { $_ -match "idp.sealer.aliasBase"}).Split("=")[1].Trim() + try { + $count = (cat $IDPPROP | where { $_ -match "idp.sealer._count"}).Split("=")[1].Trim() + } + catch { + $count = 30 + } + try { + $sync_hosts = (cat $IDPPROP | where { $_ -match "idp.sealer._sync_hosts"}).Split("=")[1].Trim() + } + catch { + $sync_hosts = $env:COMPUTERNAME + } + + #Write-Host "Keystore:" $storefile + #Write-Host "Version File:" $versionfile + #Write-Host "Store Pass:" $storepass + #Write-Host "Alias:" $alias + #Write-Host "Count:" $count + #Write-Host "Sync Hosts:" $sync_hosts + + #rotate key + $cmd = "${IDP_HOME}\bin\runclass.bat net.shibboleth.utilities.java.support.security.BasicKeystoreKeyStrategyTool --storefile $storefile --storepass `$storepass --versionfile $versionfile --alias $alias --count $count" + Invoke-Expression $cmd + + #display current/new version + Write-Host "Current Key Version:" (cat $versionfile).split("=")[2].Trim() + + #sync to other hosts + $sync_hosts.split(" ") | ForEach { + If ($_.Trim() = $env:COMPUTERNAME) {Write-Host "***skipping sync to local host"} Else { + Write-Host "Syncing to: $_" + $Session = New-PSSession -ComputerName "$_" -Credential $SYNC_CRED + Copy-Item $versionfile -Destination $IDP_HOME\credentials -ToSession $Session + } + } + +} \ No newline at end of file diff --git a/test-compose/getIPs.ps1 b/test-compose/getIPs.ps1 index 5209ef6..3cf5c09 100644 --- a/test-compose/getIPs.ps1 +++ b/test-compose/getIPs.ps1 @@ -2,14 +2,14 @@ $idpcid = docker ps | Select-String 'idp' | ForEach-Object { $_.Line.split(' ')[0] } $spcid = docker ps | Select-String 'sp' | ForEach-Object { $_.Line.split(' ')[0] } -$idpip = (docker inspect -f "{{ .NetworkSettings.Networks.nat.IPAddress }}" $idpcid) -$spip = (docker inspect -f "{{ .NetworkSettings.Networks.nat.IPAddress }}" $spcid) +If ($idpcid -ne $null) {$idpip = (docker inspect -f "{{ .NetworkSettings.Networks.nat.IPAddress }}" $idpcid)} Else {$idpip = "Not-Found"} +If ($spcid -ne $null) {$spip = (docker inspect -f "{{ .NetworkSettings.Networks.nat.IPAddress }}" $spcid)} Else {$spip = "Not-Found"} $msg = $($idpip.Trim()) + ' idp.example.edu' + "`r`n" + $($spip.Trim()) + ' sptest.example.edu' Set-Clipboard -Value $msg Write-Host '' -Write-Host $($msg) +Write-Host $($msg + "`r`n") Write-Host ' **above entries copied to clipboard' -Write-Host '' \ No newline at end of file +Write-Host '' diff --git a/test-compose/idp/compose.ps1 b/test-compose/idp/compose.ps1 new file mode 100644 index 0000000..9bd9b42 --- /dev/null +++ b/test-compose/idp/compose.ps1 @@ -0,0 +1 @@ +docker-compose up --build -d diff --git a/test-compose/idp/decompose.ps1 b/test-compose/idp/decompose.ps1 new file mode 100644 index 0000000..a4b3c3f --- /dev/null +++ b/test-compose/idp/decompose.ps1 @@ -0,0 +1,2 @@ +docker-compose kill +docker-compose rm diff --git a/test-compose/idp/docker-compose.yml b/test-compose/idp/docker-compose.yml new file mode 100644 index 0000000..d35db8d --- /dev/null +++ b/test-compose/idp/docker-compose.yml @@ -0,0 +1,29 @@ +version: "3.3" + +services: + idp: + build: + context: . + args: + TOMCFG: ./container_files/config/tomcat + TOMCERT: ./container_files/credentials/tomcat + TOMWWWROOT: ./container_files/wwwroot + SHBCFG: ./container_files/config/shib-idp/conf + SHBCREDS: ./container_files/credentials/shib-idp + SHBVIEWS: ./container_files/config/shib-idp/views + SHBEDWAPP: ./container_files/config/shib-idp/edit-webapp + SHBMSGS: ./container_files/config/shib-idp/messages + SHBMD: ./container_files/config/shib-idp/metadata + expose: + - "443" + ports: + - "443:443" + dns: + - 8.8.8.8 + - 4.4.4.4 + +networks: + default: + external: + name: nat + diff --git a/test-compose/sp/compose.ps1 b/test-compose/sp/compose.ps1 new file mode 100644 index 0000000..9bd9b42 --- /dev/null +++ b/test-compose/sp/compose.ps1 @@ -0,0 +1 @@ +docker-compose up --build -d diff --git a/test-compose/sp/decompose.ps1 b/test-compose/sp/decompose.ps1 new file mode 100644 index 0000000..a4b3c3f --- /dev/null +++ b/test-compose/sp/decompose.ps1 @@ -0,0 +1,2 @@ +docker-compose kill +docker-compose rm