Issue #16769 has been updated by Jeremy MAURO.
Hi,
Since the upgrade from puppet 2.7.18 to 3.0.0, I am using puppet+passenger on
debian squeeze with the package from puppetlabs:
<pre><code>
# dpkg -l 'puppet*' |grep ii
ii puppet 3.0.0-1puppetlabs1
Centralized configuration management - agent startup and compatibility
scripts
ii puppet-common 3.0.0-1puppetlabs1
Centralized configuration management
ii puppet-dashboard 1.2.11-1puppetlabs1
Dashboard for Puppet
ii puppetdb 1.0.0-1puppetlabs1
PuppetDB Centralized Storage.
ii puppetdb-terminus 1.0.0-1puppetlabs1
Connect Puppet to PuppetDB by setting up a terminus for PuppetDB.
ii puppetmaster 3.0.0-1puppetlabs1
Centralized configuration management - master startup and compatibility
scripts
ii puppetmaster-common 3.0.0-1puppetlabs1
Puppet master common scripts
</code></pre>
Currently using the following apache configuration file:
<pre><code>
Listen 8140
<VirtualHost *:8140>
ServerName puppetmaster.fqdn
ErrorLog /var/log/apache2/puppetmaster_error.log
LogLevel warn
SetEnvIf Remote_Addr "::1" dontlog
CustomLog /var/log/apache2/puppetmaster_access.log combined env=!dontlog
SSLEngine on
SSLProtocol -ALL +SSLv3 +TLSv1
SSLCipherSuite ALL:!ADH:RC4+RSA:+HIGH:+MEDIUM:-LOW:-SSLv2:-EXP
SSLCertificateFile
/data/local/puppet/ssl/certs/puppetmaster.fqdn.pem
SSLCertificateKeyFile
/data/local/puppet/ssl/private_keys/puppetmaster.fqdn.pem
SSLCertificateChainFile /data/local/puppet/ssl/ca/ca_crt.pem
SSLCACertificateFile /data/local/puppet/ssl/ca/ca_crt.pem
## CRL checking should be enabled; if you have problems with
## Apache complaining about the CRL, disable the next line
SSLCARevocationFile /data/local/puppet/ssl/ca/ca_crl.pem
SSLVerifyClient optional
SSLVerifyDepth 1
SSLOptions +StdEnvVars +ExportCertData
# This header needs to be set if using a loadbalancer or proxy
# RequestHeader unset X-Forwarded-For
## The following client headers allow the same configuration
## to work with Pound.
RequestHeader set X-SSL-Subject %{SSL_CLIENT_S_DN}e
RequestHeader set X-Client-DN %{SSL_CLIENT_S_DN}e
RequestHeader set X-Client-Verify %{SSL_CLIENT_VERIFY}e
RackAutoDetect On
DocumentRoot /var/www/puppetmaster/public/
RackBaseURI /
<Directory /var/www/puppetmaster/public/>
Options None
AllowOverride None
Order allow,deny
allow from all
</Directory>
</VirtualHost>
</code></pre>
And the following config.ru:
<pre><code>
# a config.ru, for use with every rack-compatible webserver.
# SSL needs to be handled outside this, though.
# if puppet is not in your RUBYLIB:
# $LOAD_PATH.unshift('/opt/puppet/lib')
$0 = "master"
# if you want debugging:
# ARGV << "--debug"
ARGV << "--rack"
# Rack applications typically don't start as root. Set --confdir to prevent
# reading configuration from ~/.puppet/puppet.conf
ARGV << "--confdir" << "/etc/puppet" << "--config=/etc/puppet/conf/puppet.conf"
# NOTE: it's unfortunate that we have to use the "CommandLine" class
# here to launch the app, but it contains some initialization logic
# (such as triggering the parsing of the config file) that is very
# important. We should do something less nasty here when we've
# gotten our API and settings initialization logic cleaned up.
#
# Also note that the "$0 = master" line up near the top here is
# the magic that allows the CommandLine class to know that it's
# supposed to be running master.
#
# --cprice 2012-05-22
require 'puppet/util/command_line'
# we're usually running inside a Rack::Builder.new {} block,
# therefore we need to call run *here*.
run Puppet::Util::CommandLine.new.execute
</code></pre>
I having issue when trying to get new certificat:
<pre><code>
info: Creating a new SSL key for linux-install.fqdn
err: Could not request certificate: Error 400 on SERVER: header too long
Exiting; failed to retrieve certificate and waitforcert is disabled
</code></pre>
----------------------------------------
Bug #16769: Apache "SSLOptions +ExportCertData" causes "header too long" error
https://projects.puppetlabs.com/issues/16769#change-72508
Author: eric sorenson
Status: Needs More Information
Priority: Normal
Assignee:
Category:
Target version: 3.0.1
Affected Puppet version: 3.0.0
Keywords: ssl
Branch:
Reported on the mailing list at
https://groups.google.com/forum/?fromgroups=#!topic/puppet-users/tpKvbor15iY
This was added as part of #7962.
--
You have received this notification because you have either subscribed to it,
or are involved in it.
To change your notification preferences, please click here:
http://projects.puppetlabs.com/my/account
--
You received this message because you are subscribed to the Google Groups
"Puppet Bugs" group.
To post to this group, send email to [email protected].
To unsubscribe from this group, send email to
[email protected].
For more options, visit this group at
http://groups.google.com/group/puppet-bugs?hl=en.