You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Mapping OIDs in this file _only_ affects the keys in the `$trusted[extensions]` hash. It does not affect:
34
33
35
34
* What an agent can request in its `csr_attributes.yaml` file --- anything but Puppet-specific registered extensions must still be numerical OIDs.
36
-
* What you see when you run `puppet cert print` --- mapped extensions will still be displayed as numerical OIDs. (Improving cert display is planned as [PUP-4617][].)
Copy file name to clipboardExpand all lines: docs/_openvox_8x/config_important_settings.markdown
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -148,8 +148,8 @@ These settings should usually go in `[master]`. However, if you're using Puppet
148
148
149
149
*[`dns_alt_names`][dns_alt_names] --- A list of hostnames the server is allowed to use when acting as a Puppet master. The hostname your agents use in their `server` setting **must** be included in either this setting or the master's `certname` setting. Note that this setting is only used when initially generating the Puppet master's certificate --- if you need to change the DNS names, you must:
150
150
1. Turn off the Puppet server service (or your Rack server).
151
-
2. Run `sudo puppet cert clean <MASTER'S CERTNAME>`.
152
-
3. Run `sudo puppet cert generate <MASTER'S CERTNAME> --dns_alt_names <ALT NAME 1>,<ALT NAME 2>,...`.
151
+
2. Run `sudo puppetserver ca clean --certname <SERVER'S CERTNAME>`.
152
+
3. Run `sudo puppetserver ca generate --certname <SERVER'S CERTNAME> --subject-alt-names <ALT NAME 1>,<ALT NAME 2>,...`.
153
153
4. Re-start the Puppet server service.
154
154
*[`environment_timeout`][environment_timeout] --- For better performance, you can set this to `unlimited` and make refreshing the Puppet master a part of your standard code deployment process. See [the timeout section of the Configuring Environments page][configuring_timeout] for more details.
155
155
*[`environmentpath`][environmentpath] --- Controls where Puppet finds directory environments. See [the page on directory environments][environments] for details.
Copy file name to clipboardExpand all lines: docs/_openvox_8x/config_print.markdown
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -51,7 +51,7 @@ This will show `name = value` pairs for all settings.
51
51
The `--section` option specifies which [section of puppet.conf][config_sections] to use when finding settings. It is optional, and defaults to `main`. Valid sections are:
52
52
53
53
*`main`**(default)** --- used by all commands and services
54
-
*`master` --- used by the Puppet master service and the `puppet cert` command
54
+
*`master` --- used by the Puppet master service
55
55
*`agent` --- used by the Puppet agent service
56
56
*`user` --- used by the Puppet apply command and most other commands
57
57
@@ -66,10 +66,10 @@ Note that you can only specify environments that already exist.
66
66
This option is generally only useful when looking up settings used by the Puppet master service, since it's rare to use environment config sections for Puppet apply and Puppet agent.
67
67
68
68
69
-
Imitating Puppet Master and Puppet Cert
69
+
Imitating Puppet Master
70
70
-----
71
71
72
-
To see the settings the Puppet master service and the Puppet cert command would use:
72
+
To see the settings the Puppet master service would use:
73
73
74
74
* Specify `--section master`.
75
75
* Use the `--environment` option to specify the environment you want settings for, or let it default to `production`.
Copy file name to clipboardExpand all lines: docs/_openvox_8x/config_set.markdown
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -34,7 +34,7 @@ This will declaratively set the value of `<SETTING NAME>` to `<VALUE>` (in the s
34
34
The `--section` option specifies which [section of puppet.conf][config_sections] to modify. It is optional, and defaults to `main`. Valid sections are:
35
35
36
36
*`main`**(default)** --- used by all commands and services
37
-
*`master` --- used by the Puppet master service and the `puppet cert` command
37
+
*`master` --- used by the Puppet master service
38
38
*`agent` --- used by the Puppet agent service
39
39
*`user` --- used by the Puppet apply command and most other commands
Copy file name to clipboardExpand all lines: docs/_openvox_8x/dirs_confdir.markdown
+10-3Lines changed: 10 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,16 +18,23 @@ Puppet's confdir can be found at one of the following locations:
18
18
19
19
When Puppet is running as either root, a Windows user with administrator privileges, or the `puppet` user, it will use a system-wide confdir. When running as a non-root user, it will use a confdir in that user's home directory.
20
20
21
-
The system confdir is what you usually want to use, since you will usually run Puppet's commands and services as root or `puppet`. (Note that admin commands like `puppet cert` must be run with `sudo` to use the same confdir as Puppet agent or Puppet master.)
21
+
The system confdir is what you usually want to use, since you will usually run Puppet's commands and
22
+
services as root or `puppet`. (Note that admin commands like `puppetserver ca` must be run with `sudo`
23
+
to use the same confdir as Puppet agent or Puppet master.)
22
24
23
25
> **Note:** When Puppet master is running as a Rack application, the `config.ru` file must explicitly set `--confdir` to the system confdir. The example `config.ru` file provided with the Puppet source does this.
24
26
25
27
{:.section}
26
28
### Configuration
27
29
28
-
Puppet's confdir can be specified on the command line with the `--confdir` option, but it can't be set via puppet.conf. (This is because it needs the `confdir` to even find the config file.) If `--confdir` isn't specified when a Puppet application is started, it will always use the default confdir location.
30
+
Puppet's confdir can be specified on the command line with the `--confdir` option, but it can't be set
31
+
via puppet.conf. (This is because it needs the `confdir` to even find the config file.) If `--confdir`
32
+
isn't specified when a Puppet application is started, it will always use the default confdir location.
29
33
30
-
Puppet Server uses the `jruby-puppet.master-conf-dir` setting [in puppetserver.conf][puppetserver_conf] to configure its confdir. Note that if you're using a non-default confdir, you must also specify `--confdir` whenever you run commands like `puppet module` or `puppet cert` to ensure they use the same directories as Puppet Server.
34
+
Puppet Server uses the `jruby-puppet.master-conf-dir` setting [in puppetserver.conf][puppetserver_conf]
35
+
to configure its confdir. Note that if you're using a non-default confdir, you must also specify
36
+
`--confdir` whenever you run commands like `puppet module` to ensure they use the same directories as
Copy file name to clipboardExpand all lines: docs/_openvox_8x/dirs_ssldir.markdown
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -89,7 +89,10 @@ The `ssldir` has the following structure:
89
89
*`crl.pem` --- A copy of the certificate revocation list (CRL) retrieved from the CA, for use by Puppet agent or Puppet master. Mode: 0644. Setting: [`hostcrl`][hostcrl].
90
90
*`private`_(directory)_ --- Usually does not contain any files. Mode: 0750. Setting: [`privatedir`][privatedir].
91
91
*`password` --- The password to a node's private key. Usually not present. The conditions in which this file would exist are not defined. Mode: 0640. Setting: [`passfile`][passfile].
92
-
*`private_keys`_(directory)_ --- Contains any private keys present on this node. This should generally only include the node's own private key, although on the CA it might also contain any private keys created by the `puppet cert generate` command. It will never contain the private key for the CA certificate. Mode: 0750. Setting: [`privatekeydir`][privatekeydir].
92
+
*`private_keys`_(directory)_ --- Contains any private keys present on this node. This should generally
93
+
only include the node's own private key, although on the CA it might also contain any private keys
94
+
created by the `puppetserver ca generate` command. It will never contain the private key for the CA
*`<certname>.pem` --- This node's private key. Mode: 0600. Setting: [`hostprivkey`][hostprivkey].
94
97
*`public_keys`_(directory)_ --- Contains any public keys generated by this node in preparation for generating a CSR. Mode: 0755. Setting: [`publickeydir`][publickeydir].
95
98
*`<certname>.pem` --- This node's public key. Mode: 0644. Setting: [`hostpubkey`][hostpubkey].
Copy file name to clipboardExpand all lines: docs/_openvox_8x/dirs_vardir.markdown
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,7 +22,9 @@ The cache directory for Puppet agent and Puppet apply can be found at one of the
22
22
23
23
When Puppet is running as either root, a Windows user with administrator privileges, or the `puppet` user, it will use a system-wide cache directory. When running as a non-root user, it will use a cache directory in that user's home directory.
24
24
25
-
The system cache directory is what you usually want to use, since you will usually run Puppet's commands and services as root or `puppet`. (Note that admin commands like `puppet cert` must be run with `sudo` to use the same directories as Puppet agent or Puppet master.)
25
+
The system cache directory is what you usually want to use, since you will usually run Puppet's commands
26
+
and services as root or `puppet`. (Note that admin commands like `puppetserver ca` must be run with
27
+
`sudo` to use the same directories as Puppet agent or Puppet master.)
26
28
27
29
> **Note:** When Puppet master is running as a Rack application, the `config.ru` file must explicitly set `--vardir` to the system cache directory. The example `config.ru` file provided with the Puppet source does this.
Copy file name to clipboardExpand all lines: docs/_openvox_8x/quick_start_master_agent_communication.markdown
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -39,7 +39,7 @@ From the command line on your Puppet master, run:
39
39
40
40
From the command line on each Puppet agent, run `puppet agent -t`.
41
41
42
-
From your Puppet master, run `puppet cert list` and then `puppet cert sign <AGENT NAME>` to sign the certificates of your Puppet agents.
42
+
From your Puppet Server, run `puppetserver ca list` and then `puppetserver ca sign --certname <AGENT NAME>` to sign the certificates of your Puppet agents.
43
43
44
44
> That’s it! Your Puppet configuration is ready to go.
Copy file name to clipboardExpand all lines: docs/_openvox_8x/ssl_attributes_extensions.markdown
+11-6Lines changed: 11 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -55,7 +55,7 @@ See the respective sections below for information about how each hash is used an
55
55
56
56
### Default behavior
57
57
58
-
The `puppet cert list` command doesn't display custom attributes for pending CSRs, and [basic autosigning (autosign.conf)][autosign_basic] doesn't check them before signing.
58
+
The `puppetserver ca list` command doesn't display custom attributes for pending CSRs, and [basic autosigning (autosign.conf)][autosign_basic] doesn't check them before signing.
59
59
60
60
### Configurable behavior
61
61
@@ -65,7 +65,7 @@ The simplest use is to embed a pre-shared key of some kind in the custom attribu
65
65
66
66
A more complex use might be to embed an instance-specific ID and write a policy executable that can check it against a list of your recently requested instances on a public cloud, like EC2 or GCE.
67
67
68
-
If you use Puppet Server 2.5.0 or newer, you can also sign requests using authorization extensions and the `--allow-authorization-extensions` flag for `puppet cert sign`.
68
+
You can also sign requests using authorization extensions and the `--allow-authorization-extensions` flag for `puppetserver ca sign`.
69
69
70
70
### Manually checking for custom attributes in CSRs
71
71
@@ -108,8 +108,10 @@ See [the page on facts and special variables][trusted_hash] for more information
108
108
109
109
Visibility of extensions is somewhat limited:
110
110
111
-
* The `puppet cert list` command _does not_ display custom attributes for any pending CSRs, and [basic autosigning (autosign.conf)][autosign_basic] doesn't check them before signing. Either use [policy-based autosigning][autosign_policy] or inspect CSRs manually with the `openssl` command (see below).
112
-
* The `puppet cert print` command _does_ display any extensions in a signed certificate, under the "X509v3 extensions" section.
111
+
* The `puppetserver ca list` command _does not_ display custom attributes for any pending CSRs, and
112
+
[basic autosigning (autosign.conf)][autosign_basic] doesn't check them before signing. Either use
113
+
[policy-based autosigning][autosign_policy] or inspect CSRs manually with the `openssl` command (see below).
114
+
* The `puppet ssl show` command displays any extensions in the local node's signed certificate, under the "X509v3 extensions" section.
113
115
114
116
Puppet's authorization system (`auth.conf`) does not use certificate extensions, but [Puppet Server's authorization system](/puppetserver/latest/config_file_auth.html), which is based on `trapperkeeper-authorization`, can use extensions in the ppAuthCertExt OID range, and requires them for requests to write access rules.
115
117
@@ -141,7 +143,9 @@ Note that every extension is preceded by any combination of two characters (`.$`
141
143
142
144
Any Puppet-specific OIDs (see below) appear as numeric strings when using OpenSSL.
143
145
144
-
You can check for extensions in a signed certificate by running `puppet cert print <name>`. In the output, look for the "X509v3 extensions" section. Any of the Puppet-specific registered OIDs (see below) appear as their descriptive names:
146
+
You can check for extensions in a signed certificate by running `puppet ssl show` on the agent node
147
+
that holds the certificate. In the output, look for the "X509v3 extensions" section. Any of the
148
+
Puppet-specific registered OIDs (see below) appear as their descriptive names:
145
149
146
150
```
147
151
X509v3 extensions:
@@ -221,7 +225,8 @@ To start over, do the following:
221
225
222
226
**On the CA Puppet master:**
223
227
224
-
* Check whether a signed certificate exists; use `puppet cert list --all` to see the complete list. If it exists, revoke and delete it with `puppet cert clean <name>`.
228
+
* Check whether a signed certificate exists; use `puppetserver ca list --all` to see the complete list.
229
+
If it exists, revoke and delete it with `puppetserver ca clean --certname <name>`.
225
230
* Check whether a CSR for the node exists; it will be in `$ssldir/ca/requests/<name>.pem`. If it exists, delete it.
0 commit comments