-
-
Notifications
You must be signed in to change notification settings - Fork 4
Configure openvox #27
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
e038070 to
ab01009
Compare
e054465 to
20eb2cb
Compare
This will be shared with the configure.rb task.
This task provides very basic configuration needed for the initial agent run. * It allows generating a puppet.conf from a hash of parameters so that the server can set. * It allows generating a csr_attributes.yaml for autosigning and certificate extensions. * And it allows management of the puppet service.
20eb2cb to
77a04a4
Compare
|
@jpartlow thx. Hope, I'll will find some time today or on Friday. |
|
@jpartlow What a suprise, works for me! Thought along similar lines myself. Even if I would find a task for installing and configuring more efficient. But handshakes could be solved via ssh client config. |
|
Would it be a good idea if we could design the json in such a way that we could operate several targets with different parameters? In one task call? |
01086a1 to
13597fe
Compare
File.chown ignores nils, so if the puppet user/group do not exist, nothing is done, and the file remains root:root which is correct for the agent. This chown is only important on the node running openvox-server , as puppetserver may otherwise choke on first startup because the file can't be read during its ca bootstrap. (I think because puppetserver runs as the puppet user and is calling puppet ssl at some point.) Note that it is the openvox-server package that creates the puppet user/group at install.
In particular, openvox-server lays down some settings in puppet.conf at package installation time, so it would be best if this task didn't throw out an existing puppet.conf. Using puppet-config set is safe (it's what the openvox-server package uses); it does not trigger any of puppet's auto certificate generation code the way an agent run does.
..with configure task and new type docs.
13597fe to
a0232ae
Compare
|
Hi @lbetz,
Let me know if that's working for you. For your questions:
If I'm understanding what you want here, this is operating outside of what a task can or should know about. This would be best coordinated in a plan, possibly by:
Those are the solutions that come to mind.
I'm not sure what you're referring to re the handshakes? As for a single install_and_configure_openvox task, we could certainly write a wrapper task that did both things, but I think I'm more inclined to write a plan that coordinates running the two tasks. For one thing, that would make it reasonable to manage the ca.pem cert as well. But I'd like to reserve that for a separate ticket. |
|
@jpartlow You're complete right to combine the tasks in a plan. With handshake I meant the ssh-handshake of several ssh different connections using by different tasks. So I am fine with all of that. |
|
Sorry for the delay. I should be able to get this released early next week. |
Pull Request (PR) description
This task provides very basic configuration needed for the initial agent
run.
server can set.
certificate extensions.
This Pull Request (PR) fixes the following issues
#26