mirror of
https://github.com/outbackdingo/step-ca-webui.git
synced 2026-01-27 10:20:25 +00:00
9e322b70a13078e0c930c35b9892eeebd8cbfe39
About
The project is a web-based interface for managing a smallstep step-ca Certificate Authority.
In other words, it's shell wrapper for step-ca CLI.
It provides a user-friendly way to handle certificate operations, view logs, and manage server access.
The system is designed with security in mind, separating components with different privileges and logging all actions
for audit purposes. Written in python.
Main Functions
Certificate Management
All on one page
- List certificates
- Generate new certificates (with options for key type, duration, etc.)
- Revoke certificates
- Renew certificates
Logging and Monitoring
- Every action such as certificate generation, revocation etc shows it's related logs immediately to user in the UI
- Every action shows shell command that it will execute
- Retrieve logs with filtering
Web UI
- Dashboard + Certificate Management Page
- Logs and Command History Page
Auto Setup
- Install & setup
step-caon host - Create initial root certificate
- Prepare certificates for mTLS
- Run docker-compose.uml
Security Features
- Separation of privileged sudo setup process from main application
- Main application runs in container with limited permissions, only
step-caon host is available - Web UI is in separate basic docker container
- Input value restrictions (eg letters and numbers only for key name)
- Input sanitization in CLIWrapper to prevent command injection
- Use of subprocess module with shell=True for secure command execution
- Logging of all command executions for audit purposes
- Configuration loaded from a separate file
- Use of AppArmor/SELinux profiles for main container
- mTLS for secure communication between web frontend and main app
- Authentication via auth proxy
- Web Firewall
- Internal API keys via secret management
- Security events email alerts
- Read-only filesystem for containers
Tech Stack
- Python
- Flask
- Docker
- Caddy (reverse proxy)
- Authelia (auth proxy)
- Bunkerweb (web firewall)
- step-ca CLI
Additional Notes
- Type hints/dataclasses are used throughout for better code clarity and error checking
- The design allows for easy extension and maintenance
- The AutoSetup component (for initial installation and setup) is designed to be run separately with elevated privileges
- Web app auth is provided via third-party proxy, not required for this project
Architecture
Overview
@startuml
!define RECTANGLE class
!define DOCKER_NETWORK frame
skinparam componentStyle uml2
actor "User" as user
cloud "Internet" as internet
rectangle "Host System" {
[Bunkerweb] as bunkerweb
[Caddy] as caddy
[Authelia] as authelia
DOCKER_NETWORK "Docker Network" {
package "WebFrontend Container" as webfront {
[Flask Web Server]
}
package "Core Container" as coreapp {
[Main Application]
[Logging]
[API Server]
[CLI Wrapper]
}
}
[step-ca CLI] as stepcacli
}
user -down-> internet
internet -down-> bunkerweb
bunkerweb -down-> caddy
caddy -down-> authelia
authelia -down-> webfront
webfront -down-> coreapp : mTLS & authenticated API calls
coreapp -down-> stepcacli : Limited sudo access
note right of bunkerweb : Web Firewall
note right of caddy : HTTPS & Reverse Proxy
note right of authelia : Authentication
note right of webfront : Runs without permissions
note right of coreapp : Runs with limited permissions & AppArmor/SELinux profile
note right of stepcacli : Installed globally on host
@enduml
UI Mockup
Main page:
+--------------------------------------------+
| Logo [Dashboard] [Logs] [Menu] |
+--------------------------------------------+
| |
| Certificate Management |
| +--------------------------------------+ |
| | List of Certificates | |
| | +--------------------------------+ | |
| | | Cert Name | Status | Actions | | |
| | |-----------|---------|----------| | |
| | | Cert 1 | Active | [Renew] | | |
| | | | | [Revoke] | | |
| | |-----------|---------|----------| | |
| | | Cert 2 | Expired | [Delete] | | |
| | +--------------------------------+ | |
| | | |
| | [Generate New Certificate] | |
| +--------------------------------------+ |
+--------------------------------------------+
Generate cert modal dialog:
+------------------------------------------+
| Generate New certificate |
| +------------------------------------+ |
| | Key Name: __ | |
| | Key Type: >RSA | | #dropdown: RSA etc
| | Duration: ___ >days | | #dropdown: minutes, hours etc
| | | |
| | Command that will be executed: | |
| | [Click here to reload preview] | |
| | [Execute!] | | # if preview is loaded and all fields are filled
| | <$ step-ca command ... > | |
| | | |
| | Logs: <In progress...> | |
| | <Action-specific logs appear here> | |
| +------------------------------------+ |
+------------------------------------------+
Logs page:
+-----------------------------------------------------------------+
| Logo [Dashboard] [Logs] [Menu] |
+-----------------------------------------------------------------+
| |
| Logs and Command History |
| +-----------------------------------------------------------+ |
| | Filters: | |
| | Severity: [All v] Type: [All v] | |
| | Date Range: [From] [To] [Apply] | |
| | | |
| | Search: [____________] [Search] | |
| | | |
| | +-------------------------------------------------------+ | |
| | | EntryID | Timestamp | Severity | TraceID | Message | | |
| | |---------|-----------|----------|---------|------------| | |
| | | 00002 | 2023-08-1 | INFO | abc123 | Generating | | |
| | | | 7 10:15 | | | new cert | | |
| | | | $ step ca certificate ... | | |
| | | | [Click to see command output...] | | |
| | |---------|---------------------------------------------| | |
| | | 00003 | 2023-08-1 | WARN | def456 | Cert not | | |
| | | | 7 10:14 | | | exists | | |
| | |---------|--------------------------------|------------| | |
| | | 00004 | 2023-08-1 | DEBUG | def456 | Request | | |
| | | | 7 10:13 | | | revoke | | |
| | |---------|--------------------------------|------------| | |
| | | 00005 | 2023-08-1 | ERROR | ghi789 | Permission | | |
| | | | 7 10:12 | | | denied | | |
| | +-------------------------------------------------------+ | |
| | | |
| | [Load More] | |
| +-----------------------------------------------------------+ |
+-----------------------------------------------------------------+
Logging
Log entry structure:
class LogSeverity(Enum):
DEBUG = "DEBUG"
INFO = "INFO"
WARN = "WARN"
ERROR = "ERROR"
@dataclass
class CommandInfo:
command: str
output: str
exit_code: int
action: str
@dataclass
class LogEntry:
entry_id: int
timestamp: datetime
severity: LogSeverity
message: str
trace_id: UUID
command_info: CommandInfo | None # for entries with command execution
- Logs are stored in file (in future can be stored in database)
- Escaping for JSON serialization
- Log rotation and cleanup support
- Custom logger class for logging
- Special API endpoint for fetching logs, with filtering and pagination
- Scoped logging (trace_id) implemented for tracking actions across multiple log entries
Core API
See docs/core-api.md for OpenAPI specification.
Class Diagram
See XXX
File structure
project_root/
│
├── docker-compose.yml
├── README.md
│
├── shared/
│ ├── __init__.py
│ ├── cli_wrapper.py
│ ├── logger.py
│ └── models.py
│
├── web_frontend/
│ ├── Dockerfile
│ ├── requirements.txt
│ ├── app.py
│ ├── api_client.py
│ ├── ui_components.py
│ └── templates/
│ ├── base.html
│ ├── dashboard.html
│ ├── logs.html
│ ├── certificate_management.html
│ └── modals/
│ └── generate_cert.html
│
├── core/
│ ├── Dockerfile
│ ├── requirements.txt
│ ├── main.py
│ ├── api_server.py
│ └── certificate_manager.py
│
├── auto_setup/
│ ├── auto_setup.py
│ └── requirements.txt
│
└── config/
├── app_config.yml
└── logging_config.yml
TODO
- Adjust class diagram after finalizing the project
Description
Languages
Python
78.6%
CSS
9.4%
Jinja
9.3%
JavaScript
2.4%
Dockerfile
0.3%