Jira (PDB-108) Allow specification of alternate CA for puppetmaster to use to validate puppetdb server ceritifcate

2023-06-21 Thread 'Claudia Petty (Jira)' via Puppet Bugs
Title: Message Title


 
 
 
 

 
 
 

 
   
 Claudia Petty updated an issue  
 

  
 
 
 
 

 
 
  
 
 
 
 

 
 PuppetDB /  PDB-108  
 
 
  Allow specification of alternate CA for puppetmaster to use to validate puppetdb server ceritifcate   
 

  
 
 
 
 

 
Change By: 
 Claudia Petty  
 
 
Labels: 
 new-feature redmine  
 

  
 
 
 
 

 
 
 

 
 
 Add Comment  
 

  
 

  
 
 
 
  
 

  
 
 
 
 

 
 This message was sent by Atlassian Jira (v8.20.21#820021-sha1:38274c8)  
 
 

 
   
 

  
 

  
 

   





-- 
You received this message because you are subscribed to the Google Groups "Puppet Bugs" group.
To unsubscribe from this group and stop receiving emails from it, send an email to puppet-bugs+unsubscr...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/puppet-bugs/JIRA.19385.1385040192000.2440.1687359428397%40Atlassian.JIRA.


Jira (PDB-108) Allow specification of alternate CA for puppetmaster to use to validate puppetdb server ceritifcate

2014-04-23 Thread Kenneth Barber (JIRA)
Title: Message Title










 

 Kenneth Barber updated an issue


















 PuppetDB /  PDB-108



  Allow specification of alternate CA for puppetmaster to use to validate puppetdb server ceritifcate 










Change By:

 Kenneth Barber




Story Points:

 8












   

 Add Comment






















 This message was sent by Atlassian JIRA (v6.1.4#6159-sha1:44eaede)




 














-- 
You received this message because you are subscribed to the Google Groups Puppet Bugs group.
To unsubscribe from this group and stop receiving emails from it, send an email to puppet-bugs+unsubscr...@googlegroups.com.
To post to this group, send email to puppet-bugs@googlegroups.com.
Visit this group at http://groups.google.com/group/puppet-bugs.
For more options, visit https://groups.google.com/d/optout.


Jira (PDB-108) Allow specification of alternate CA for puppetmaster to use to validate puppetdb server ceritifcate

2014-02-16 Thread Hans Lellelid (JIRA)
Title: Message Title










 

 Hans Lellelid commented on an issue


















  Re: Allow specification of alternate CA for puppetmaster to use to validate puppetdb server ceritifcate 










Just wanting to add my comment from the redmine issue:

Hmmm, my code obviously needed some sort of wrapper tag or something; sorry about that.
Also, I should add that I do not know if changing the Command class is enough. I see there are other puppetdb classes that subclass Indirector::REST; obviously that parent class also uses the Puppet-configured Net::HTTP that will have cert issues. So a more general solution may be required there '
UPDATE: I can confirm what was probably obvious; the command.rb change is not enough. The non-write aspects of puppetdb fail for cert verification. I’ve attempted to override the network() method from the Puppet::Indirector::REST class, but so far not much luck. I’m sure I’ll get to the bottom of it eventually.













   

 Add Comment

























 PuppetDB /  PDB-108



  Allow specification of alternate CA for puppetmaster to use to validate puppetdb server ceritifcate 







 This is from thread: https://groups.google.com/forum/#!topic/puppet-users/kkcOMpw5Rzo   Basically, we need to be able to have the puppetdb server SSL certificates signed by a CA that is *not* our puppetmaster's CA.   We need this for a couple reasons:  - We have dozens of puppetmasters with their own CAs managing their own ecosystems, but we want a sing...














 

Jira (PDB-108) Allow specification of alternate CA for puppetmaster to use to validate puppetdb server ceritifcate

2014-02-16 Thread Hans Lellelid (JIRA)
Title: Message Title










 

 Hans Lellelid updated an issue


















 PuppetDB /  PDB-108



  Allow specification of alternate CA for puppetmaster to use to validate puppetdb server ceritifcate 










Change By:

 Hans Lellelid









 Thisisfromthread:https://groups.google.com/forum/#!topic/puppet-users/kkcOMpw5RzoBasically,weneedtobeabletohavethepuppetdbserverSSLcertificatessignedbyaCAthatis*not*ourpuppetmaster'sCA.Weneedthisforacouplereasons:-WehavedozensofpuppetmasterswiththeirownCAsmanagingtheirownecosystems,butwewantasinglepuppetdb.(Socurrentlywecouldconfigurepuppetdbtoworkforanyoneofourpuppetmasters...butonlyoneofthem.)-Puppetdbisaresourcethatwillbeusedbyworkstations(i.e.openedinthebrowser).OurworkstationsaresettotrusttheCAchainthatweuseforwebsites,butnottotrustthepuppetmastercerts(there'sno[other]placewherewewouldexpecttoseepuppetmaster-issuedcertsinthebrowser.)TherootoftheproblemappearstobetheuseofthePuppet::Network::HttpPool.http_instanceinthePuppet::Util::Puppetdb::Commandclass.TheNet::HTTPinstancethatisconfiguredbyPuppetissettouseaspecificcert_store,andca_filethatwillonlytrustserversthataresignedbythePuppet[:localcacert]ca($certdir/certs/ca.pem).Modifyingtheca.pemtoincludeadditionalcertsdoesnotwork;Ihavenotfullyrunthistoground,butitappearstobeduetothefactthatthecert_storeisalsobeingconfiguredfortheconnection;andthisisoverriding(?)whichcertscanbetrusted.What*does*appeartoworkisreplacingtheuseofthePuppet-configuredhttpclientinCommand.submitwith: {code:none} http=Net::HTTP.new(config.server,config.port)http.use_ssl=truehttp.ca_file=config.cacerthttp.verify_mode=OpenSSL::SSL::VERIFY_PEER#(AndmodifiedPuppet::Util::Puppetdb::Configtosupportanewcacertconfigoption,defaultingittoPuppet[:localcacert]forbackwardscompat) {code}   Thatmaybewhatwehackinuntilthisfeatureis(hopefully!)officiallysupported.












   

 Add Comment






















 This message was sent by Atlassian JIRA (v6.1.4#6159-sha1:44eaede)