Gah, should not end with a question mark -->  "I've personally never used
the allow_duplicate_cert feature, but if it's not working properly then
reporting that in the bug report is totally the best way to go?"

On Fri, Apr 27, 2012 at 6:35 PM, Gary Larizza <g...@puppetlabs.com> wrote:

>
>
> On Fri, Apr 27, 2012 at 2:22 PM, Allister Banks <a...@aru-b.com> wrote:
>
>> Sorry to resurrect an old(er) thread, but:
>> http://projects.puppetlabs.com/issues/3360#note-33
>> leads me to believe none of those workarounds are necessary, just
>> allow_duplicate_cert
>>
>
> Have you tried this out?  I've personally never used the
> allow_duplicate_cert feature, but if it's not working properly then
> reporting that in the bug is totally the best way to go?
>
>
>>
>> However,
>> https://gist.github.com/0c76fb5b28abfcb2f9d6
>> That's a proof of concept that I started testing on the DeployStudio
>> side, and will probably fire up some python (once conference
>> extravaganza passes) to iterate over a csv of serial numbers and
>> therefore generate a bunch of certs at once.
>>
>>
> Commented on the gist - that should work as long as you generate the certs
> ON the puppet master and use the certname of the node you're wanting to
> provision.
>
>
>
>> Allister
>>
>>
>> On Apr 11, 12:32 pm, Gary Larizza <g...@puppetlabs.com> wrote:
>> > Hey Sean,
>> >
>> > First - congrats on wrangling your Macs with Puppet! Next, I understand
>> and
>> > have shared your pain regarding timely imaging of workstations and
>> Puppet
>> > cert-wrangling.  Generally, I've seen folks do one of a couple of
>> things:
>> >
>> >    1. Autosign
>> >    2. Utilize a CGI script to sign/revoke certs on the master (which can
>> >    largely be replaced through the use of the `puppet cert` face)
>> >    3. Use the same private key everywhere and change the individual
>> >    node_name
>> >
>> > Numbers 1 and 2 are largely process around signing individual certs for
>> > every node.  You COULD even backup the $ssldir on your clients, image
>> the
>> > machine, install puppet, restore the $ssldir, and then run Puppet again
>> and
>> > Puppet will work fine for your clients.
>> >
>> > Number 3 is a bit different.  With #3, you would have the SAME private
>> cert
>> > for EVERY node in your infrastructure.  Because of this, the certname
>> must
>> > be THE SAME for every node.  When you do this, however, Puppet treats
>> every
>> > node as if it were the SAME node - so you need a way to de-couple the
>> name
>> > of the node as Puppet knows it with the name of the node as the
>> Certificate
>> > knows it.  The solution is the 'node_name_fact' and 'node_name_value'
>> > configuration item in puppet.conf -->
>> http://docs.puppetlabs.com/references/stable/configuration.html#noden...
>> > You would essentially ship the private cert around to EVERY node, set
>> > the
>> > node_name_{fact,value} in puppet.conf, and then Puppet would treat each
>> > machine as a separate node (even though the certificate is the same
>> > everywhere).  Obviously there are security implications for this, but
>> some
>> > people prefer it to Autosigning.
>> >
>> > Hopefully, this should help you on your way.
>> >
>> > On Wed, Apr 11, 2012 at 8:31 AM, Sean McGrath <seanc.mcgr...@gmail.com
>> >wrote:
>> >
>> >
>> >
>> >
>> >
>> >
>> >
>> >
>> >
>> > > Firstly my apologies for posting this if it has been answered
>> > > elsewhere and I missed it while looking.
>> >
>> > > I'm starting to look at using Puppet to manage our fleet of Mac's
>> > > running OS X in our lab environment and I'm quite impressed with it
>> > > from my testing so far.
>> >
>> > > I have tested the functionality of the autosign.conf file with the
>> > > hostnames of the trusted clients in it.
>> >
>> > > However, if I re-image one of the Mac's as we occasionally do that
>> > > destroys the client certificate that it uses for the puppetca request.
>> > > Thus the puppet master see's a request with a different certificate
>> > > from a node with a hostname that has had its trust relationship
>> > > established with a different certificate.
>> >
>> > > This is probably a noob question but I haven't been able to figure it
>> > > out. How do I get around this in an automated manner. I don't want to
>> > > have to revoke certificates each time I re-image a Mac so they can be
>> > > re-trusted by the puppet master. Is there something like a root
>> > > certificate I could build into the image to establish the trust
>> > > relationship easily and securely each time a Mac is re-imaged?
>> >
>> > > many thanks
>> >
>> > > Sean
>> >
>> > > --
>> > > You received this message because you are subscribed to the Google
>> Groups
>> > > "Puppet Users" group.
>> > > To post to this group, send email to puppet-users@googlegroups.com.
>> > > To unsubscribe from this group, send email to
>> > > puppet-users+unsubscr...@googlegroups.com.
>> > > For more options, visit this group at
>> > >http://groups.google.com/group/puppet-users?hl=en.
>> >
>> > --
>> >
>> > Gary Larizza
>> > Professional Services Engineer
>> > Puppet Labs
>>
>> --
>> You received this message because you are subscribed to the Google Groups
>> "Puppet Users" group.
>> To post to this group, send email to puppet-users@googlegroups.com.
>> To unsubscribe from this group, send email to
>> puppet-users+unsubscr...@googlegroups.com.
>> For more options, visit this group at
>> http://groups.google.com/group/puppet-users?hl=en.
>>
>>
>
>
> --
>
> Gary Larizza
> Professional Services Engineer
> Puppet Labs
>
>


-- 

Gary Larizza
Professional Services Engineer
Puppet Labs

-- 
You received this message because you are subscribed to the Google Groups 
"Puppet Users" group.
To post to this group, send email to puppet-users@googlegroups.com.
To unsubscribe from this group, send email to 
puppet-users+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/puppet-users?hl=en.

Reply via email to