Class: Puppet::Application::Cert
- Inherits:
-
Puppet::Application
- Object
- Puppet::Application
- Puppet::Application::Cert
- Defined in:
- lib/puppet/application/cert.rb
Constant Summary
Constants inherited from Puppet::Application
Constants included from Util
Util::AbsolutePathPosix, Util::AbsolutePathWindows, Util::DEFAULT_POSIX_MODE, Util::DEFAULT_WINDOWS_MODE
Constants included from Util::POSIX
Util::POSIX::LOCALE_ENV_VARS, Util::POSIX::USER_ENV_VARS
Constants included from Util::SymbolicFileMode
Util::SymbolicFileMode::SetGIDBit, Util::SymbolicFileMode::SetUIDBit, Util::SymbolicFileMode::StickyBit, Util::SymbolicFileMode::SymbolicMode, Util::SymbolicFileMode::SymbolicSpecialToBit
Instance Attribute Summary collapse
Attributes inherited from Puppet::Application
Instance Method Summary collapse
-
#apply(ca, method, options) ⇒ Object
Create and run an applicator.
- #help ⇒ Object
- #main ⇒ Object
- #parse_options ⇒ Object
- #setup ⇒ Object
- #subcommand ⇒ Object
- #subcommand=(name) ⇒ Object
Methods inherited from Puppet::Application
[], #app_defaults, available_application_names, banner, clear!, clear?, clear_everything_for_tests, #configure_indirector_routes, controlled_run, exit, find, #handle_logdest_arg, #handlearg, #initialize, #initialize_app_defaults, interrupted?, #log_runtime_environment, #name, option, option_parser_commands, #preinit, restart!, restart_requested?, #run, #run_command, run_mode, #set_log_level, #setup_logs, stop!, stop_requested?, try_load_class
Methods included from Util
absolute_path?, benchmark, chuser, deterministic_rand, deterministic_rand_int, exit_on_fail, logmethods, path_to_uri, pretty_backtrace, replace_file, safe_posix_fork, symbolizehash, thinmark, uri_to_path, which, withenv, withumask
Methods included from Util::POSIX
#get_posix_field, #gid, #idfield, #methodbyid, #methodbyname, #search_posix_field, #uid
Methods included from Util::SymbolicFileMode
#normalize_symbolic_mode, #symbolic_mode_to_int, #valid_symbolic_mode?
Constructor Details
This class inherits a constructor from Puppet::Application
Instance Attribute Details
Instance Method Details
#apply(ca, method, options) ⇒ Object
Create and run an applicator. I wanted to build an interface where you could do something like ‘ca.apply(:generate).to(:all) but I don’t think it’s really possible.
291 292 293 294 295 |
# File 'lib/puppet/application/cert.rb', line 291 def apply(ca, method, ) raise ArgumentError, "You must specify the hosts to apply to; valid values are an array or the symbol :all" unless [:to] applier = Puppet::SSL::CertificateAuthority::Interface.new(method, ) applier.apply(ca) end |
#help ⇒ Object
82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 |
# File 'lib/puppet/application/cert.rb', line 82 def help "\npuppet-cert(8) -- Manage certificates and requests\n========\n\nSYNOPSIS\n--------\nStandalone certificate authority. Capable of generating certificates,\nbut mostly used for signing certificate requests from puppet clients.\n\n\nUSAGE\n-----\npuppet cert <action> [-h|--help] [-V|--version] [-d|--debug] [-v|--verbose]\n[--digest <digest>] [<host>]\n\n\nDESCRIPTION\n-----------\nBecause the puppet master service defaults to not signing client\ncertificate requests, this script is available for signing outstanding\nrequests. It can be used to list outstanding requests and then either\nsign them individually or sign all of them.\n\nACTIONS\n-------\n\nEvery action except 'list' and 'generate' requires a hostname to act on,\nunless the '--all' option is set.\n\nThe most important actions for day-to-day use are 'list' and 'sign'.\n\n* clean:\nRevoke a host's certificate (if applicable) and remove all files\nrelated to that host from puppet cert's storage. This is useful when\nrebuilding hosts, since new certificate signing requests will only be\nhonored if puppet cert does not have a copy of a signed certificate\nfor that host. If '--all' is specified then all host certificates,\nboth signed and unsigned, will be removed.\n\n* fingerprint:\nPrint the DIGEST (defaults to the signing algorithm) fingerprint of a\nhost's certificate.\n\n* generate:\nGenerate a certificate for a named client. A certificate/keypair will\nbe generated for each client named on the command line.\n\n* list:\nList outstanding certificate requests. If '--all' is specified, signed\ncertificates are also listed, prefixed by '+', and revoked or invalid\ncertificates are prefixed by '-' (the verification outcome is printed\nin parenthesis).\n\n* print:\nPrint the full-text version of a host's certificate.\n\n* revoke:\nRevoke the certificate of a client. The certificate can be specified either\nby its serial number (given as a hexadecimal number prefixed by '0x') or by its\nhostname. The certificate is revoked by adding it to the Certificate Revocation\nList given by the 'cacrl' configuration option. Note that the puppet master\nneeds to be restarted after revoking certificates.\n\n* sign:\nSign an outstanding certificate request.\n\n* verify:\nVerify the named certificate against the local CA certificate.\n\n* reinventory:\nBuild an inventory of the issued certificates. This will destroy the current\ninventory file specified by 'cert_inventory' and recreate it from the\ncertificates found in the 'certdir'. Ensure the puppet master is stopped\nbefore running this action.\n\nOPTIONS\n-------\nNote that any setting that's valid in the configuration\nfile is also a valid long argument. For example, 'ssldir' is a valid\nsetting, so you can specify '--ssldir <directory>' as an\nargument.\n\nSee the configuration file documentation at\nhttp://docs.puppetlabs.com/references/stable/configuration.html for the\nfull list of acceptable parameters. A commented list of all\nconfiguration options can also be generated by running puppet cert with\n'--genconfig'.\n\n* --all:\nOperate on all items. Currently only makes sense with the 'sign',\n'list', and 'fingerprint' actions.\n\n* --allow-dns-alt-names:\nSign a certificate request even if it contains one or more alternate DNS\nnames. If this option isn't specified, 'puppet cert sign' will ignore any\nrequests that contain alternate names.\n\nIn general, ONLY certs intended for a Puppet master server should include\nalternate DNS names, since Puppet agent relies on those names for identifying\nits rightful server.\n\nYou can make Puppet agent request a certificate with alternate names by\nsetting 'dns_alt_names' in puppet.conf or specifying '--dns_alt_names' on the\ncommand line. The output of 'puppet cert list' shows any requested alt names\nfor pending certificate requests.\n\n* --digest:\nSet the digest for fingerprinting (defaults to the digest used when\nsigning the cert). Valid values depends on your openssl and openssl ruby\nextension version.\n\n* --debug:\nEnable full debugging.\n\n* --help:\nPrint this help message\n\n* --verbose:\nEnable verbosity.\n\n* --version:\nPrint the puppet version number and exit.\n\n\nEXAMPLE\n-------\n $ puppet cert list\n culain.madstop.com\n $ puppet cert sign culain.madstop.com\n\n\nAUTHOR\n------\nLuke Kanies\n\n\nCOPYRIGHT\n---------\nCopyright (c) 2011 Puppet Labs, LLC Licensed under the Apache 2.0 License\n\n HELP\nend\n" |
#main ⇒ Object
227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 |
# File 'lib/puppet/application/cert.rb', line 227 def main if @all hosts = :all elsif @signed hosts = :signed else hosts = command_line.args.collect { |h| h.downcase } end begin apply(@ca, :revoke, .merge(:to => hosts)) if subcommand == :destroy apply(@ca, subcommand, .merge(:to => hosts, :digest => @digest)) rescue => detail Puppet.log_exception(detail) exit(24) end end |
#parse_options ⇒ Object
275 276 277 278 279 280 281 282 283 284 285 286 287 |
# File 'lib/puppet/application/cert.rb', line 275 def # handle the bareword subcommand pattern. result = super unless self.subcommand then if sub = self.command_line.args.shift then self.subcommand = sub else puts help exit end end result end |
#setup ⇒ Object
244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 |
# File 'lib/puppet/application/cert.rb', line 244 def setup require 'puppet/ssl/certificate_authority' exit(Puppet.settings.print_configs ? 0 : 1) if Puppet.settings.print_configs? Puppet::SSL::Oids.register_puppet_oids Puppet::Util::Log.newdestination :console if [:generate, :destroy].include? subcommand Puppet::SSL::Host.ca_location = :local else Puppet::SSL::Host.ca_location = :only end # If we are generating, and the option came from the CLI, it gets added to # the data. This will do the right thing for non-local certificates, in # that the command line but *NOT* the config file option will apply. if subcommand == :generate if Puppet.settings.set_by_cli?(:dns_alt_names) [:dns_alt_names] = Puppet[:dns_alt_names] end end begin @ca = Puppet::SSL::CertificateAuthority.new rescue => detail Puppet.log_exception(detail) exit(23) end end |
#subcommand ⇒ Object
10 11 12 |
# File 'lib/puppet/application/cert.rb', line 10 def subcommand @subcommand end |
#subcommand=(name) ⇒ Object
14 15 16 17 18 |
# File 'lib/puppet/application/cert.rb', line 14 def subcommand=(name) # Handle the nasty, legacy mapping of "clean" to "destroy". sub = name.to_sym @subcommand = (sub == :clean ? :destroy : sub) end |