-
-
Notifications
You must be signed in to change notification settings - Fork 51
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support distrusting ca's on Debian; Changed ca_cert::ca parameter names and meaning #107
Support distrusting ca's on Debian; Changed ca_cert::ca parameter names and meaning #107
Conversation
@@ -2,31 +2,32 @@ | |||
|
|||
case host_inventory['facter']['os']['family'] | |||
when 'Debian' | |||
trusted_ca_file_remote = '/usr/local/share/ca-certificates/Globalsign_Org_Intermediate.crt' | |||
absent_ca_file_remote = '/etc/pki/ca-trust/source/blacklist/CACert.crt' | |||
trusted_ca_file_remote = '/usr/local/share/ca-certificates/DigiCert_G5_TLS_ECC_SHA384_2021_CA1.crt' |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I switch from Globalsign to Digicert certificate here because globalsign certificates are only available for download i DER format.
spec/acceptance/ca_cert_ca_spec.rb
Outdated
trusted_ca_file_text = '/etc/pki/ca-trust/source/anchors/InCommon.crt' | ||
untrusted_ca_file_remote = '/etc/pki/ca-trust/source/blacklist/DigiCert_Global_Root_G3.crt' |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Switched to a ca that actually exists in the trusted list on all distros.
Seems to be some issues with 'distrust' on el9 surfacing because I've added integration tests that verifies the generated trust list. |
fae369e
to
124031e
Compare
578c31a
to
555e05b
Compare
manifests/init.pp
Outdated
@@ -34,6 +34,10 @@ | |||
# Absolute directory path to the folder containing distrusted certificates. | |||
# Default provided by Hiera for supported Operating Systems. | |||
# | |||
# @param ca_certificates_conf | |||
# Some distros uses a configuration file to mark distrusted certificates. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
# Some distros uses a configuration file to mark distrusted certificates. | |
# Some distros use a configuration file to mark distrusted certificates. |
555e05b
to
6dd5a4d
Compare
Pull Request (PR) description
Rework of ca_cert::ca to support trusting and distrusting ca's provided by the ca-certificates package on Debian.
Also makes it possible to move from distrusted to trusted again on other distros ( ensure absent from
distrusted_cert_dir
)To support this I have redefined the meaning of ca_cert::ca::ensure a bit
trusted_cert_dir
distrusted_cert_dir
og Debian'sca_certificates_conf
ca_cert::ca::ca_text
is renamed toca_cert::ca::content
and used directly asfile::content
ca_cert::ca::source
is now used directly asarchive::source
ca_cert::ca::verify_https_cert
parameter is renamed toca_cert::ca::allow_insecure_source
to better align witharchive::allow_insecure
This Pull Request (PR) fixes the following issues
Fixes #96