Skip to content

Commit 75b3db2

Browse files
miharpclaude
andcommitted
openvox_8x: fix commands verified against openvoxserver-ca source
- Replace nonexistent `puppetserver ca print` with `puppet ssl show` (ssl_attributes_extensions, config_file_oid_map); no print action exists in openvoxserver-ca 3.2.0 (current release) - Remove stale OID-mapping limitation bullet: puppet ssl show loads the custom OID file and registers names with OpenSSL, so mapped names do appear in its output - Replace remaining `puppet cert` references in http_certificate_status HTTP API reference with puppetserver ca equivalents All other new commands (ssl clean --localca, puppetserver ca setup, sign/clean/generate --certname, generate --subject-alt-names, list --all) verified against openvoxserver-ca 3.2.0 source. Part of OpenVoxProject#221 Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com> Signed-off-by: Michael Harp <mike@mikeharp.com>
1 parent a231db6 commit 75b3db2

3 files changed

Lines changed: 11 additions & 13 deletions

File tree

docs/_openvox_8x/config_file_oid_map.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,6 @@ title: "Config files: custom_trusted_oid_mapping.yaml"
55

66
[extensions]: ./ssl_attributes_extensions.html
77
[mapping_setting]: ./configuration.html#trustedoidmappingfile
8-
[pup-4617]: https://tickets.puppetlabs.com/browse/PUP-4617
98
[csr_attributes]: ./config_file_csr_attributes.html
109
[trusted]: ./lang_facts_and_builtin_vars.html#trusted-facts
1110
[registered]: ./ssl_attributes_extensions.html#puppet-specific-registered-ids
@@ -33,7 +32,6 @@ For more info, see:
3332
Mapping OIDs in this file _only_ affects the keys in the `$trusted[extensions]` hash. It does not affect:
3433

3534
* What an agent can request in its `csr_attributes.yaml` file --- anything but Puppet-specific registered extensions must still be numerical OIDs.
36-
* What you see when you run `puppetserver ca print` --- mapped extensions will still be displayed as numerical OIDs. (Improving cert display is planned as [PUP-4617][].)
3735

3836
## Location
3937

docs/_openvox_8x/http_api/http_certificate_status.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -22,17 +22,17 @@ Find
2222
GET /puppet-ca/v1/certificate_status/:certname?environment=:environment
2323
Accept: application/json, text/pson
2424

25-
Retrieve information about the specified certificate. Similar to `puppet
26-
cert --list :certname`.
25+
Retrieve information about the specified certificate. Similar to `puppetserver
26+
ca list --certname :certname`.
2727

2828
Search
2929
-----
3030

3131
GET /puppet-ca/v1/certificate_statuses/:any_key?environment=:environment
3232
Accept: application/json, text/pson
3333

34-
Retrieve information about all known certificates. Similar to `puppet
35-
cert --list --all`. A key is required but is ignored.
34+
Retrieve information about all known certificates. Similar to `puppetserver
35+
ca list --all`. A key is required but is ignored.
3636

3737
Save
3838
----
@@ -43,9 +43,9 @@ Save
4343
Change the status of the specified certificate. The desired state
4444
is sent in the body of the PUT request as a one-item PSON hash; the two
4545
allowed complete hashes are `{"desired_state":"signed"}` (for signing a
46-
certificate signing request; similar to `puppet cert --sign`) and
46+
certificate signing request; similar to `puppetserver ca sign`) and
4747
`{"desired_state":"revoked"}` (for revoking a certificate; similar to
48-
`puppet cert --revoke`).
48+
`puppetserver ca revoke`).
4949

5050
Note that revoking a certificate will not clean up other info about the
5151
host - see the DELETE request for more information.
@@ -59,7 +59,7 @@ Delete
5959
Cause the certificate authority to discard all SSL information regarding
6060
a host (including any certificates, certificate requests, and keys).
6161
This does not revoke the certificate if one is present; if you wish to
62-
emulate the behavior of `puppet cert --clean`, you must PUT a
62+
emulate the behavior of `puppetserver ca clean`, you must PUT a
6363
`desired_state` of `revoked` before deleting the host’s SSL information.
6464

6565
If the deletion was successful, it returns a string listing the deleted

docs/_openvox_8x/ssl_attributes_extensions.markdown

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -111,7 +111,7 @@ Visibility of extensions is somewhat limited:
111111
* The `puppetserver ca list` command _does not_ display custom attributes for any pending CSRs, and
112112
[basic autosigning (autosign.conf)][autosign_basic] doesn't check them before signing. Either use
113113
[policy-based autosigning][autosign_policy] or inspect CSRs manually with the `openssl` command (see below).
114-
* The `puppetserver ca print` command _does_ display any extensions in a signed certificate, under the "X509v3 extensions" section.
114+
* The `puppet ssl show` command displays any extensions in the local node's signed certificate, under the "X509v3 extensions" section.
115115

116116
Puppet's authorization system (`auth.conf`) does not use certificate extensions, but [Puppet Server's authorization system](/puppetserver/latest/config_file_auth.html), which is based on `trapperkeeper-authorization`, can use extensions in the ppAuthCertExt OID range, and requires them for requests to write access rules.
117117

@@ -143,9 +143,9 @@ Note that every extension is preceded by any combination of two characters (`.$`
143143

144144
Any Puppet-specific OIDs (see below) appear as numeric strings when using OpenSSL.
145145

146-
You can check for extensions in a signed certificate by running `puppetserver ca print --certname <name>`.
147-
In the output, look for the "X509v3 extensions" section. Any of the Puppet-specific registered OIDs
148-
(see below) appear as their descriptive names:
146+
You can check for extensions in a signed certificate by running `puppet ssl show` on the agent node
147+
that holds the certificate. In the output, look for the "X509v3 extensions" section. Any of the
148+
Puppet-specific registered OIDs (see below) appear as their descriptive names:
149149

150150
```
151151
X509v3 extensions:

0 commit comments

Comments
 (0)