Skip to content
This repository was archived by the owner on Aug 29, 2018. It is now read-only.

Conversation

@andrewklau
Copy link

Do not merge, currently untested, will try to test next week.

@andrewklau
Copy link
Author

Works well so far with a single host deployment, following the same puppet ca certs that get provisioned from a foreman install.

Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

In foreman we've seen users who had upper cased hostnames but puppet always lower cases the fqdn in the filename. See https://github.com/theforeman/puppet-foreman/blob/master/manifests/params.pp#L180-L193

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks

@andrewklau
Copy link
Author

@detiber @sdodson Is there anything you guys think I need to change/add?

Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

These values are not defined in init.pp or params.pp

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Oops, looks like I didn't rebase properly. I'll fix this up.

@sdodson
Copy link
Member

sdodson commented Nov 25, 2014

I'll do some functional testing of this after lunch, we'd like to get this and a few other things merged to wrap up another release to puppet forge.

@andrewklau
Copy link
Author

@sdodson I tested this again today and looks like the earlier issues you mentioned should be fixed. Let me know if you want anything else changed.

nvm, the file check doesn't seem to work.

@andrewklau
Copy link
Author

After further tests, none of my attempts seem to work as the certs exist on the client, making it hard to do an actual check the file exists. Only way I could think of is doing something like this:

exec { 'check msgserver_tls_key': command => '/bin/false', unless => "/usr/bin/test -e ${::openshift_origin::msgserver_tls_key}", }

I'm not too sure how that can be chained either. Moreover, someone could pass msgserver_tls_key = 'puppet://....' which again would break. As you want to get this merged for the next version, I'll revert it back to my original test of checking the variable is defined. Also if the file doesn't exist, activemq_keystores.pp will also complain.

Let me know if you perhaps would have a better way, I perhaps may be overlooking something.

@andrewklau
Copy link
Author

I have tested this with aio in all three (enabled, disabled and strict) and they appear to work as expected.

I don't have the resources right now to test an enabled mode of tls_enabled msgserver and standard mcollective client/server

Attempt to split tls_enabled into enabled,disabled,strict

Remove duplication

Add simple certificate file check
@detiber
Copy link

detiber commented Dec 2, 2014

👍

@sdodson
Copy link
Member

sdodson commented Dec 2, 2014

Confirmed in a two host config with both enabled and strict options. Minimal config, assuming puppet certificates exist, is simply msgserver_tls_enabled => 'strict' or 'enabled'. Thanks for the excellet PR and patience while I tested.

👍

sdodson added a commit that referenced this pull request Dec 2, 2014
Adding TLS encryption to Mcollective
@sdodson sdodson merged commit 7dd9d6e into openshift:master Dec 2, 2014
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants