Class/Module Index [+]

Quicksearch

Puppet::Acceptance::CAUtils

Public Instance Methods

clean_cert(host, cn, check = true) click to toggle source
# File acceptance/lib/puppet/acceptance/common_utils.rb, line 70
def clean_cert(host, cn, check = true)
  if host == master && master[:is_puppetserver]
      on master, puppet_resource("service", master['puppetservice'], "ensure=stopped")
  end

  on(host, puppet('cert', 'clean', cn), :acceptable_exit_codes => check ? [0] : [0, 24])
  if check
    assert_match(/remov.*Certificate.*#{cn}/, stdout, "Should see a log message that certificate request was removed.")
    on(host, puppet('cert', 'list', '--all'))
    assert_no_match(/#{cn}/, stdout, "Should not see certificate in list anymore.")
  end
end
clear_agent_ssl() click to toggle source
# File acceptance/lib/puppet/acceptance/common_utils.rb, line 83
def clear_agent_ssl
  return if master.is_pe?
  step "All: Clear agent only ssl settings (do not clear master)"
  hosts.each do |host|
    next if host == master
    ssldir = on(host, puppet('agent --configprint ssldir')).stdout.chomp
    on( host, host_command("rm -rf '#{ssldir}'") )
  end
end
initialize_ssl() click to toggle source
# File acceptance/lib/puppet/acceptance/common_utils.rb, line 23
def initialize_ssl
  hostname = on(master, 'facter hostname').stdout.strip
  fqdn = on(master, 'facter fqdn').stdout.strip

  if master.use_service_scripts?
    step "Ensure puppet is stopped"
    # Passenger, in particular, must be shutdown for the cert setup steps to work,
    # but any running puppet master will interfere with webrick starting up and
    # potentially ignore the puppet.conf changes.
    on(master, puppet('resource', 'service', master['puppetservice'], "ensure=stopped"))
  end

  step "Clear SSL on all hosts"
  hosts.each do |host|
    ssldir = on(host, puppet('agent --configprint ssldir')).stdout.chomp
    on(host, "rm -rf '#{ssldir}'")
  end

  step "Master: Start Puppet Master" do
    master_opts = {
      :main => {
        :dns_alt_names => "puppet,#{hostname},#{fqdn}",
      },
      :__service_args__ => {
        # apache2 service scripts can't restart if we've removed the ssl dir
        :bypass_service_script => true,
      },
    }
    with_puppet_running_on(master, master_opts) do

      hosts.each do |host|
        next if host['roles'].include? 'master'

        step "Agents: Run agent --test first time to gen CSR"
        on host, puppet("agent --test --server #{master}"), :acceptable_exit_codes => [1]
      end

      # Sign all waiting certs
      step "Master: sign all certs"
      on master, puppet("cert --sign --all"), :acceptable_exit_codes => [0,24]

      step "Agents: Run agent --test second time to obtain signed cert"
      on agents, puppet("agent --test --server #{master}"), :acceptable_exit_codes => [0,2]
    end
  end
end
reset_agent_ssl(resign = true) click to toggle source
# File acceptance/lib/puppet/acceptance/common_utils.rb, line 93
def reset_agent_ssl(resign = true)
  return if master.is_pe?
  clear_agent_ssl

  hostname = master.execute('facter hostname')
  fqdn = master.execute('facter fqdn')

  step "Clear old agent certificates from master" do
    agents.each do |agent|
      next if agent == master && agent.is_using_passenger?
      agent_cn = on(agent, puppet('agent --configprint certname')).stdout.chomp
      clean_cert(master, agent_cn, false) if agent_cn
    end
  end

  if resign
    step "Master: Ensure the master is listening and autosigning"
    with_puppet_running_on(master,
                            :master => {
                              :dns_alt_names => "puppet,#{hostname},#{fqdn}",
                              :autosign => true,
                            }
                          ) do

      agents.each do |agent|
        next if agent == master && agent.is_using_passenger?
        step "Agents: Run agent --test once to obtain auto-signed cert" do
          on agent, puppet('agent', "--test --server #{master}"), :acceptable_exit_codes => [0,2]
        end
      end
    end
  end
end

[Validate]

Generated with the Darkfish Rdoc Generator 2.