Skip to content

Commit bc29de8

Browse files
committed
(PUP-10589) Print location of CSR
1 parent 54aead0 commit bc29de8

File tree

3 files changed

+11
-7
lines changed

3 files changed

+11
-7
lines changed

lib/puppet/application/ssl.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -209,7 +209,7 @@ def generate_request(certname)
209209

210210
csr = @cert_provider.create_request(certname, key)
211211
@cert_provider.save_request(certname, csr)
212-
Puppet.notice _("Generated certificate request for '%{name}' at %{requestdir}") % { name: certname, requestdir: Puppet[:requestdir] }
212+
Puppet.notice _("Generated certificate request in '%{path}'") % { path: @cert_provider.to_path(Puppet[:requestdir], certname) }
213213
rescue => e
214214
raise Puppet::Error.new(_("Failed to generate certificate request: %{message}") % { message: e.message }, e)
215215
end

lib/puppet/x509/cert_provider.rb

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -346,13 +346,17 @@ def load_request_from_pem(pem)
346346
OpenSSL::X509::Request.new(pem)
347347
end
348348

349-
private
350-
349+
# Return the path to the cert related object (key, CSR, cert, etc).
350+
#
351+
# @param base [String] base directory
352+
# @param name [String] the name associated with the cert related object
351353
def to_path(base, name)
352354
raise _("Certname %{name} must not contain unprintable or non-ASCII characters") % { name: name.inspect } unless name =~ VALID_CERTNAME
353355
File.join(base, "#{name.downcase}.pem")
354356
end
355357

358+
private
359+
356360
def permissions_for_setting(name)
357361
setting = Puppet.settings.setting(name)
358362
perm = { mode: setting.mode.to_i(8) }

spec/unit/application/ssl_spec.rb

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -182,24 +182,24 @@ def expects_command_to_fail(message)
182182
it 'generates an RSA private key' do
183183
File.unlink(Puppet[:hostprivkey])
184184

185-
expects_command_to_pass(%r{Generated certificate request for '#{name}' at #{requestdir}})
185+
expects_command_to_pass(%r{Generated certificate request in '#{csr_path}'})
186186
end
187187

188188
it 'generates an EC private key' do
189189
Puppet[:key_type] = 'ec'
190190
File.unlink(Puppet[:hostprivkey])
191191

192-
expects_command_to_pass(%r{Generated certificate request for '#{name}' at #{requestdir}})
192+
expects_command_to_pass(%r{Generated certificate request in '#{csr_path}'})
193193
end
194194

195195
it 'registers OIDs' do
196196
expect(Puppet::SSL::Oids).to receive(:register_puppet_oids)
197197

198-
expects_command_to_pass(%r{Generated certificate request for '#{name}' at #{requestdir}})
198+
expects_command_to_pass(%r{Generated certificate request in '#{csr_path}'})
199199
end
200200

201201
it 'saves the CSR locally' do
202-
expects_command_to_pass(%r{Generated certificate request for '#{name}' at #{requestdir}})
202+
expects_command_to_pass(%r{Generated certificate request in '#{csr_path}'})
203203

204204
expect(Puppet::FileSystem).to be_exist(csr_path)
205205
end

0 commit comments

Comments
 (0)