Skip to content
This repository has been archived by the owner on Jan 21, 2022. It is now read-only.

add self-signed certs for *.bosh-lite.com #405

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

zrob
Copy link
Contributor

@zrob zrob commented Nov 7, 2016

this allows releases to be deployed using a known ca so they can do ssl
with proper cert verification

Signed-off-by: Zach Robinson zrobinson@pivotal.io

this allows releases to be deployed using a known ca so they can do ssl
with proper cert verification

Signed-off-by: Zach Robinson <zrobinson@pivotal.io>
@cfdreddbot
Copy link

Hey zrob!

Thanks for submitting this pull request! I'm here to inform the recipients of the pull request that you and the commit authors have already signed the CLA.

zrob added a commit to cloudfoundry-attic/cf-release that referenced this pull request Nov 7, 2016
so we can eventually use 'skip_cert_verify: false' by default
the ca needs to get into a bosh-lite box

see: cloudfoundry-attic/bosh-lite#405

Signed-off-by: Utako Ueda <uueda@pivotal.io>
@dpb587-pivotal
Copy link
Contributor

I think this already should work when executing something like gobosh -e 192-168-50-4.sslip.io --user admin --password admin --ca-cert ca/certs/ca.crt ... - does this PR add something more than that?

@zrob
Copy link
Contributor Author

zrob commented Nov 29, 2016

This puts the ca into the default cert store for each "vm" that the director creates so that jobs in a deploy can trust each other using certs signed by that ca. Is the ca cert you reference available on all "vms" or is it just the director ca?

If it's available on every vm then it would work.

@zrob
Copy link
Contributor Author

zrob commented Nov 30, 2016

@dpb587-pivotal ping

@zrob
Copy link
Contributor Author

zrob commented Dec 5, 2016

@dpb587-pivotal ping

@cppforlife
Copy link
Contributor

@zrob pipeline for bosh-lite is busted hence no update. it's not trivial to fix it so it's taking time.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants