Project

General

Profile

Download (7.15 KB) Statistics
| Branch: | Tag: | Revision:
# == Class: certs
#
# Base for installing and configuring certs. It holds the basic configuration
# aournd certificates generation and deployment. The per-subsystem configuratoin
# of certificates should go into `subsystem_module/manifests/certs.pp`.
#
# === Parameters:
#
# $log_dir:: When the log files should go
#
# $node_fqdn:: The fqdn of the host the generated certificates
# should be for
#
# $generate:: Should the generation of the certs be part of the
# configuration
# type: boolean
#
# $regenerate:: Force regeneration of the certificates (excluding
# ca certificates)
# type: boolean
#
# $regenerate_ca:: Force regeneration of the ca certificate
# type: boolean
#
# $deploy:: Deploy the certs on the configured system. False means
# we want apply it on a different system
# type: boolean
#
# $ca_common_name:: Common name for the generated CA certificate
# type: string
#
# $country:: Country attribute for managed certificates
# type: string
#
# $state:: State attribute for managed certificates
# type: string
#
# $city:: City attribute for managed certificates
# type: string
#
# $org:: Org attribute for managed certificates
# type: string
#
# $org_unit:: Org unit attribute for managed certificates
# type: string
#
# $expiration:: Expiration attribute for managed certificates
# type: string
#
# $ca_expiration:: Ca expiration attribute for managed certificates
# type: string
#
# $server_ca_cert:: Path to the CA that issued the ssl certificates for https
# if not specified, the default CA will be used
#
# $server_cert:: Path to the ssl certificate for https
# if not specified, the default CA will generate one
#
# $server_key:: Path to the ssl key for https
# if not specified, the default CA will generate one
#
# $server_cert_req:: Path to the ssl certificate request for https
# if not specified, the default CA will generate one
#
# $pki_dir:: The PKI directory under which to place certs
#
# $ssl_build_dir:: The directory where SSL keys, certs and RPMs will be generated
#
# $user:: The system user name who should own the certs;
#
# $group:: The group who should own the certs;
#
# $password_file_dir:: The location to store password files
#
# $default_ca_name:: The name of the default CA
#
# $server_ca_name:: The name of the server CA (used for https)
#
class certs (

$log_dir = $certs::params::log_dir,
$node_fqdn = $certs::params::node_fqdn,
$generate = $certs::params::generate,
$regenerate = $certs::params::regenerate,
$regenerate_ca = $certs::params::regenerate_ca,
$deploy = $certs::params::deploy,
$ca_common_name = $certs::params::ca_common_name,
$country = $certs::params::country,
$state = $certs::params::state,
$city = $certs::params::city,
$org = $certs::params::org,
$org_unit = $certs::params::org_unit,

$expiration = $certs::params::expiration,
$ca_expiration = $certs::params::ca_expiration,

$server_cert = $certs::params::server_cert,
$server_key = $certs::params::server_key,
$server_cert_req = $certs::params::server_cert_req,
$server_ca_cert = $certs::params::server_ca_cert,

$pki_dir = $certs::params::pki_dir,
$ssl_build_dir = $certs::params::ssl_build_dir,

$password_file_dir = $certs::params::password_file_dir,

$user = $certs::params::user,
$group = $certs::params::group,

$default_ca_name = $certs::params::default_ca_name,
$server_ca_name = $certs::params::server_ca_name
) inherits certs::params {

if $server_cert {
validate_absolute_path($server_cert)
validate_absolute_path($server_cert_req)
validate_absolute_path($server_key)
validate_absolute_path($server_ca_cert)
validate_file_exists($server_cert, $server_cert_req, $server_key, $server_ca_cert)
}

$nss_db_dir = "${pki_dir}/nssdb"

$ca_key = "${certs::pki_dir}/private/${default_ca_name}.key"
$ca_cert = "${certs::pki_dir}/certs/${default_ca_name}.crt"
$ca_cert_stripped = "${certs::pki_dir}/certs/${default_ca_name}-stripped.crt"
$ca_key_password = cache_data('ca_key_password', random_password(24))
$ca_key_password_file = "${certs::pki_dir}/private/${default_ca_name}.pwd"

$katello_server_ca_cert = "${certs::pki_dir}/certs/${server_ca_name}.crt"

class { '::certs::install': } ->
class { '::certs::config': } ->
file { $ca_key_password_file:
ensure => file,
content => $ca_key_password,
owner => 'root',
group => 'root',
mode => '0400',
} ~>
ca { $default_ca_name:
ensure => present,
common_name => $certs::ca_common_name,
country => $certs::country,
state => $certs::state,
city => $certs::city,
org => $certs::org,
org_unit => $certs::org_unit,
expiration => $certs::ca_expiration,
generate => $certs::generate,
deploy => $certs::deploy,
password_file => $ca_key_password_file,
}

$default_ca = Ca[$default_ca_name]

if $certs::server_cert {
ca { $certs::server_ca_name:
ensure => present,
generate => $certs::generate,
deploy => $certs::deploy,
custom_pubkey => $certs::server_ca_cert,
}
} else {
ca { $certs::server_ca_name:
ensure => present,
generate => $certs::generate,
deploy => $certs::deploy,
ca => $certs::default_ca,
}
}
$server_ca = Ca[$certs::server_ca_name]

if $certs::generate {
file { "${ssl_build_dir}/KATELLO-TRUSTED-SSL-CERT":
ensure => link,
target => "${ssl_build_dir}/${certs::server_ca_name}.crt",
require => $server_ca,
}
}

if $deploy {

Ca[$default_ca_name] ~>
pubkey { $ca_cert:
key_pair => $default_ca,
} ~>
pubkey { $ca_cert_stripped:
strip => true,
key_pair => $default_ca,
} ~>
file { $ca_cert:
ensure => file,
owner => 'root',
group => $certs::group,
mode => '0644',
}

Ca[$server_ca_name] ~>
pubkey { $katello_server_ca_cert:
key_pair => $server_ca,
} ~>
file { $katello_server_ca_cert:
ensure => file,
owner => 'root',
group => $certs::group,
mode => '0644',
}

if $generate {
Ca[$default_ca_name] ~>
privkey { $ca_key:
key_pair => $default_ca,
unprotect => true,
password_file => $ca_key_password_file,
} ~>
file { $ca_key:
ensure => file,
owner => 'root',
group => $certs::group,
mode => '0440',
}
}
}
}
(8-8/18)