In this blog post, I'm discussing how to utilize Docker Secrets (a Docker Swarm service feature) to manage sensitive data (like password encryption keys, SSH private keys, SSL certificates etc.) for Dockerized application powered by IBM WebSphere Liberty Profile (WLP) application server. Docker Secrets helps to centrally manage these sensitive information while in rest or in transit (encrypted and securely transmitted to only those containers that need access to it and has explicit access to it). It is out of scope for this post to go deep into Docker secretes, however, if you need to familiarize yourself with Docker Secretes, refer to
https://docs.docker.com/engine/swarm/secrets/.
Note: if you like to know how to program encryption/decryption within your Java application using passwordutilities-1.0 feature of WLP, see my blog
How to use WLP passwordUtilities feature for encryption/decryption
I'm going to write this post in a tutorial style, so that anyone interested to try can follow the steps.
Pre-requisite: In order to follow the steps outlined here, you have to have following:
- Good working knowledge of Docker
- Configured Docker Swarm environment (using Docker 1.13 or higher version) with at least one manager and one worker node or Docker Datacenter with Universal Control Plane (UCP) having manager node, worker node(s). It's good to have a separate Docker client node, so that you can remotely connect to manager and execute commands.
- Good working knowledge of IBM WebSphere Liberty Profile (https://developer.ibm.com/wasdev/blog/2013/03/29/introducing_the_liberty_profile/).
Here is brief description, how we are going to utilize Docker Secretes with WLP.
- Password encryption key that is used to encrypt password for WLP KeyStore, TrustStore and any other password(s) used by WLP applications will be externalized and stored as Docker Secretes.
- Private key such as one stored in KeyStore (used to enable secure communication in WLP) will be externalized and stored as Docker Secretes.
Here are some obvious benefits:
- Centrally manage all sensitive data. Since Docker enforces access control, only people with enough/right privilege(s) will have access to sensitive data.
- Only those container(s) and service(s) will have access to private/sensitive data which has explicit access as per need basis.
- Private information remains private while in rest or in transit.
- New Docker image created by 'docker commit' will not contain any sensitive data and also dump/package created by WLP server dump or package command, will not
contain encryption key as it's externalized.
See more insights about WLP password encryption here: https://www.ibm.com/support/knowledgecenter/en/SS7K4U_8.5.5/com.ibm.websphere.wlp.nd.multiplatform.doc/ae/cwlp_pwd_encrypt.html
and managing Docker Secrets here: https://docs.docker.com/engine/swarm/secrets/
Enough talk, now, let's start the real work. Below are the major steps that we'll carry out:
- Create Docker secrets for following that is being used by WLP:
- KeyStore
- Truststore
- Password Encryption key
- Build Docker image based on websphere-liberty:webProfile7
- Create network
- Put together docker-compose.xml for deployment.
- Deploy application as Docker service.
Here, we're going to use Docker
Commandline (CLI) and we'll execute Docker command from Docker client node remotely. You need have following three environment variables correctly setup in order to execute command remotely. Refer to
https://docs.docker.com/engine/reference/commandline/cli/#description for detail.
- DOCKER_TLS_VERIFY
- DOCKER_CERT_PATH
- DOCKER_HOST
If you are using Docker Datacenter, you can use GUI based UCP Admin Console to create the same. Note: label com.docker.ucp.access.label="<value>
" is not mandatory unless you have access constraint defined. For detail refer to Authentication and authorization.
1) Create Docker Secrete with name keystore.jks, which basically is key database that stores private key to be used by WLP.
2) Following command creates secret called truststore.jks using physical Java keystore file which contains trust certificates
Finally create the Docker secret call app_enc_key.xml, which basically refers to the fragment of xml wich contains definintion of password encryption key
Note: Docker secrets are available under '/run/secrets/' at runtime to any container which has explicit access to that secret.
Here is how the /mnt/nfs/dockershared/wlpapp/app_enc_key.xml look like:
Note: Make sure to replace the string '#replaceMe#' with your own password encryption key.
Let's check and make sure all our secrets are properly created and listed:
Building Docker Image:
Now, let's first encrypt our keystore and trusstore passwords using the pre-defined encryption key and put together the server.xml for WLP server. We are going to use
securityUtility tool that ships with IBM WLP to encrypt our password.
Note: make sure your password encryption key matches to the one that is defined by 'wlp.password.encryption.key'
property in app_enc_key.xml.
Here I'm encoding my example password '#myStrongPassw0rd#' using encryption key '#replaceMe#' with encoding option '
aes'.
Please note that encoding option '
xor' ignores the encryption key and uses default.
Now, we have our Docker secrets created and we have encrypted our password. It's time to put together our server.xml for WLP application server and build the Docker image.
Here is how my server.xml looke like.
As you can see, the location of defaultKeyStore, defaultTrustStore, and app_enc_key.xml is pointing to directory '
/run/secrets'. It is, as mentioned before, because all private data created by
Docker Secrets will be available for the assigned services under '
/run/secrets' of the corresponding container.
Now let's put together Dockerfile.
Note: above, I'm copying my server.xml into /opt/ibm/wlp/usr/servers/defaultServer/ before running the installUtility as I'm adding few features required by my application including,
ssl-1.0.
Finally, we're going to build the Docker image.
Note: 192.168.56.102 is my local Docker Trusted Registry (DTR).
Once, the image is successfully built, make sure the image is available on all nodes of Docker Swarm. I'm not going show details how you distribute the image.
> If you are using DTR,
You can first push the image to the registry (using 'docker push ...', then connect to Docker Swarm host and execute 'docker pull ...'),
> Other option is to use 'docker save ...' to save the
image as tar file then load the image into Swarm using 'docker load ...'.
Here, I'm deploying this into Docker Datacenter which has two UCP worker nodes, one UCP manager node and DTR node. I'm also going to use the
HTTP routing mesh (HRM),
and User defined
Overlay networks in swarm mode.
Note: User defined Docker network and HRM are NOT necessary to utilize the Docker secrets.
Create Overlay network:
Note: Label 'com.docker.ucp.mesh.http=true' is required while creating network in order to utilize HRM.
Put together docker-compose.yml
Here is my compose file. Your may look different.
Few notes about the docker-compose.yml
- Volume definition that maps server.xml in the container with the one in the NFS file system is optional. This mapping gives additional flexibility to update the server.xml. You can achieve similar or even better flexibility/portability by using Docker Swarm Config service. See my blog post - How to use Docker Swarm Configs service with WebSphere Liberty Profile for details.
- The secrets definition under service 'wlpappsrv' refers to the secrets definition in the root level, which in it turns refers to externally defined secret.
- "com.docker.ucp.mesh.http." labels are totally optional and only required if you are using HRM.
- "com.docker.ucp.access.label" is also optional and required only if you have defined access constraints.
- Since, I'm using Swarm and HRM, I don't need to explicitly map the internal container ports to host port. If you need to map, you can use something like below for your port definition:
ports:
- 9080:9080
- 9443:9443
- You may encounter situation that your container application is not able to access the secrets created under /run/secrets. It may be related to bug #31006. In order to resolve the issue use 'mode: 0444' while defining your secrets. Something like this:
Deploy the service
Here I'm using "docker stack deploy..." to deploy the service:
Note: In certain cases, you may get "
secrets Additional property secrets is not allowed", error message. In order to resolve, make sure your compose file version to 3.1. In my case, where it's working fine, I've Docker version 17.03.2-ee4, API version: 1.27, Docker-Compose version 1.14.0.
Once the service is deployed. You can list it using 'docker service ls ..." command
And list the replicated containers:
And here is what the WLP messages.log shows (taken from one of the containers log file):
As you can see (messages in
blue), it's able to include the configuration from
/run/secrets/app_enc_key.xml and it also shows that
defaultHttpEndpoint-ssl has been started and listening on port 9443; meaning that
it's able to successfully load and open the
/run/secrets/keystore.jks and
/run/secrets/truststore.jks files using the encrypted password with encryption key defined in
/run/secrets/app_enc_key.xml.
Now, it's time to access the application.
In my case, since, I'm using HRM, I will access it as:
https://mydockertest.com:8443/wlpappctx
If you are not using HRM; you may access it using:
https://<docker-container-host>:9443/<application-context>
Example using Load-Balancer
If you have a load-balancer in front and want to set-up a pass-through SSL, you can use SNI: aka SSL routing. Below is simple example using ha-proxy. You can also refer to HA-Proxy documentation here for details.
Here is haproxy.cfg for our example PoC:
Here is a Dockerfile for custom image:
Build the image:
Note: execute the 'docker build ...' command from the same directory where Dockerbuild file is located.
Once you build the image and start the ha-proxy container like below:
Note: In this case ha-proxy is listening on port 8443.
Access the application:
https://mydockertest.com:8443//wlpappctx
Note: Make sure mydockertest.com resolves to the IP address of ha-proxy.
Looks like you're really into Docker, see my other related blog posts below: