-
Notifications
You must be signed in to change notification settings - Fork 65
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
PulpCA to "clients"? #320
Comments
Does anybody use https (properly)? |
I missed this due to travel. Usually we deploy this together with Katello which also includes Candlepin. This has its own CA and every client is registered. This allows using SSL connections. pulp-admin can be configured to use a different CA file using |
Hi @ekohl, Thanks for your response! As I mentioned, I was going to try to use the Puppet certs, since every system already had a signed host cert (specifically the pulp server), and the ca.pem is already populated to all hosts too to make it easy to point to in yum.repos.d files. However, that broke the ability to use It appears in my cursory check that candlepin is like a subscription management service? I am not sure if I need or even want a subscription management service. I need to provide local access to software updates, with the ability to control when updates are sync'd (so we can apply updates to non-prod, then a week later to prod and expect that the updates have already been tested). I am not even sure why the hosts need individual certs. The only one that I should have to care about is the pulp server itself, and I could potentially use a 'corpCA' cert for that, but then pulp-admin gets all cranky. I appreciate any advice you can offer :) Thanks in advance, |
Have you had a look at #138? The workaround is to set |
Yes, we have pulp::ssl_username set to false.
|
I think I'm reaching the limit of my pulp knowledge here. Maybe it's best to reach out to the pulp community for this. |
I was thinking of a custom fact that would read the CA certificate into a fact, then I could "export" a "file" resource with the contents of that fact (certificate)... then "realize" it on the agents/clients? ... but that seems rather convoluted too :-/ Is there some way to call Pulp Community over to this thread, context is usually very important for something like this in my experience. ~tommy |
There is a |
In order for the "client" systems to validate the SSL connection to the Pulp Server, the PulpCA needs to be listed in the yumrepo files. How is that handled? Maybe there should be a "custom fact" that exposes the CA Public Cert to puppet so that it can be exported from the pulp server and "imported" on the pulp clients?
How would this normally be handled?
NOTE: I tried to use the Puppet certs, since the puppet CA is already present on all agents, and they already have a signed SSL certificate, but I had trouble making pulp-admin work cleanly (without a bunch of hackery or setting validate_ssl to false). That seems like it would be ideal, but may not work the way Pulp is architected.
The text was updated successfully, but these errors were encountered: