natemccurdy
05/06/2022, 6:11 PMKwadster
05/06/2022, 7:09 PMnatemccurdy
05/06/2022, 7:12 PMbastelfreak
05/06/2022, 7:16 PMnatemccurdy
05/06/2022, 9:17 PMsh6624gsj8
05/09/2022, 7:54 AMgoeldi
05/09/2022, 12:03 PMpuppet infrastructure run regenerate_master_certificate
and also regenerate_agent_certificate
does not work.
rebuild_certificate_authority
seemed to work, but now pe-puppetmaster does not start anymore:
An illegal reflective access operation has occurred
...
/etc/puppetlabs/puppet/ssl/certs/blabla.pem (No such file or directory)
This is pe-puppetserver 2019.8.10 and puppet agent 6.26.0
I cannot find documentation for this situation.vchepkov
05/09/2022, 12:05 PMpuppet infrastructure run rebuild_certificate_authority
vchepkov
05/09/2022, 12:05 PMvchepkov
05/09/2022, 12:06 PMpuppetlabs/ca_extend
Dr Bunsen Honeydew
05/09/2022, 12:06 PMpuppetlabs-ca_extend
module at https://forge.puppet.com/puppetlabs/ca_extend?src=slack&channel=puppetSlackbot
05/09/2022, 12:19 PMvchepkov
05/09/2022, 12:22 PMgoeldi
05/09/2022, 12:23 PMbolt plan run ca_extend::extend_ca_cert regen_primary_cert=true --targets <local://blabla> compilers=blabla --run-as root
It works up to this:
INFO: Extending CA certificate on <local://blabla>
Starting: task ca_extend::extend_ca_cert on <local://blabla>
Finished: task ca_extend::extend_ca_cert with 1 failure in 1.54 sec
Finished: plan ca_extend::extend_ca_cert in 8.36 sec
Then I get this error:
Failed on <local://blabla>:
The task failed with exit code 1
{
"status": "error",
"message": "Error extending CA certificate expiry date",
"stderr": "CA certificate file: /etc/puppetlabs/puppet/ssl/ca/ca_crt.pem CA private key file: /etc/puppetlabs/puppet/ssl/ca/ca_key.pem Checking CA chain length... 2 certificates were found in: /etc/puppetlabs/puppet/ssl/ca/ca_crt.pem This script only works on CA files that contain a single certificate. "
}
goeldi
05/09/2022, 12:23 PMbolt plan run ca_extend::extend_ca_cert regen_primary_cert=true --targets <local://blabla> compilers=blabla --run-as root
It works up to this:
INFO: Extending CA certificate on <local://blabla>
Starting: task ca_extend::extend_ca_cert on <local://blabla>
Finished: task ca_extend::extend_ca_cert with 1 failure in 1.54 sec
Finished: plan ca_extend::extend_ca_cert in 8.36 sec
Then I get this error:
Failed on <local://blabla>:
The task failed with exit code 1
{
"status": "error",
"message": "Error extending CA certificate expiry date",
"stderr": "CA certificate file: /etc/puppetlabs/puppet/ssl/ca/ca_crt.pem CA private key file: /etc/puppetlabs/puppet/ssl/ca/ca_key.pem Checking CA chain length... 2 certificates were found in: /etc/puppetlabs/puppet/ssl/ca/ca_crt.pem This script only works on CA files that contain a single certificate. "
}
vchepkov
05/09/2022, 12:26 PMgoeldi
05/09/2022, 12:28 PMvchepkov
05/09/2022, 12:29 PMrebuild_certificate_authority
is probably your best betvchepkov
05/09/2022, 12:36 PMgoeldi
05/09/2022, 12:36 PMpuppet infrastructure run rebuild_certificate_authority
which did not help.
Now I deleted one of the two certs and ca_extend runs to the end but still has a key verification error (fingerprint unknown):
Starting: task service::linux on blabla
Finished: task service::linux with 1 failure in 0.13 sec
Finished: plan ca_extend::extend_ca_cert in 1 min, 21 sec
Failed on blabla:
Host key verification failed for blabla: fingerprint SHA256:XYZ123/..... is unknown for "blabla,1.2.3.4"
vchepkov
05/09/2022, 12:38 PMpuppet infrastructure run rebuild_certificate_authority force=true
goeldi
05/09/2022, 12:40 PMvchepkov
05/09/2022, 12:41 PMgoeldi
05/09/2022, 12:41 PMvchepkov
05/09/2022, 12:41 PMpuppet infrastructure run regenerate_master_certificate
toovchepkov
05/09/2022, 12:42 PMvchepkov
05/09/2022, 12:43 PMplan enterprise_tasks::rebuild_ca(
Optional[TargetSpec] $master = 'localhost',
Optional[Boolean] $manage_pxp_service = true,
Optional[Boolean] $force = false,
) {
goeldi
05/09/2022, 12:50 PMbolt plan show
does not list enterprise_tasks
vchepkov
05/09/2022, 12:53 PMvchepkov
05/09/2022, 12:53 PMpuppet infrastructure run regenerate_master_certificate
too