Forge Home

trusted_ca

Manages trusted_ca

61,365 downloads

1,347 latest version

4.7 quality score

We run a couple of automated
scans to help you access a
module's quality. Each module is
given a score based on how well
the author has formatted their
code and documentation and
modules are also checked for
malware using VirusTotal.

Please note, the information below
is for guidance only and neither of
these methods should be considered
an endorsement by Puppet.

Version information

  • 5.0.0 (latest)
  • 4.1.0
  • 4.0.0
  • 3.1.0
  • 3.0.0
  • 2.0.0
released Aug 2nd 2023
This version is compatible with:
  • Puppet Enterprise 2023.5.x, 2023.4.x, 2023.3.x, 2023.2.x, 2023.1.x, 2023.0.x, 2021.7.x, 2021.6.x, 2021.5.x, 2021.4.x, 2021.3.x, 2021.2.x, 2021.1.x, 2021.0.x
  • Puppet >= 7.0.0 < 9.0.0
  • , , , , ,

Start using this module

  • r10k or Code Manager
  • Bolt
  • Manual installation
  • Direct download

Add this module to your Puppetfile:

mod 'puppet-trusted_ca', '5.0.0'
Learn more about managing modules with a Puppetfile

Add this module to your Bolt project:

bolt module add puppet-trusted_ca
Learn more about using this module with an existing project

Manually install this module globally with Puppet module tool:

puppet module install puppet-trusted_ca --version 5.0.0

Direct download is not typically how you would use a Puppet module to manage your infrastructure, but you may want to download the module in order to inspect the code.

Download
Tags: ssl, trusted-ca

Documentation

puppet/trusted_ca — version 5.0.0 Aug 2nd 2023

Build Status Code Coverage Puppet Forge Puppet Forge - downloads Puppet Forge - endorsement Puppet Forge - scores

Table of Contents

  1. Overview
  2. Module Description - What the module does and why it is useful
  3. Setup - The basics of getting started with trusted_ca
  4. Usage - Configuration options and additional functionality
  5. Reference - An under-the-hood peek at what the module is doing and how
  6. Limitations - OS compatibility, etc.
  7. Development - Guide for contributing to the module
  8. Changelog/Contributors

Overview

A puppet module to manage the distribution's trusted certificates and install trusted SSL certificates into the system's trusted keystore and java's keystore's.

Module Description

Many organizations use self-signed SSL certificates for internal services that need to be trusted by other hosts. This puppet module will install SSL certificates into a host's system-wide trusted CA files (which are used by distribution-provided java packages) as well as a define for installing certificates into java installations not provided by the distribution.

Setup

What trusted_ca affects

  • Distribution-provided trusted SSL certificates package
  • System-wide additional trusted SSL certificates
  • SSL certificates installed into java trusted certificate keystore

Beginning with trusted_ca

To install trusted_ca

    puppet module install puppet-trusted_ca

Dependencies:

  • puppetlabs/stdlib

Usage

Manage only distribution-specific trusted certificates

    class { 'trusted_ca': }

Install a self-signed SSL certificate into the system's global trusted keystore from a source file

    class { 'trusted_ca': }
    trusted_ca::ca { 'mycompany.org':
      source => 'puppet:///ssl/mycompany.org.crt',
    }

Install a self-signed SSL certificate into a java keystore from a source file

    class { 'trusted_ca': }
    trusted_ca::java { 'mycompany.org':
      source => 'puppet:///ssl/mycompany.org/crt',
      java_keystore => '/usr/local/java/lib/security/cacerts',
    }

Install a certificate into the system's global trusted keystore from a PEM-encoded string (eg from hiera)

    class { 'trusted_ca': }
    trusted_ca::ca { 'example.net':
      content => hiera("example-net-x509"),
    }

Reference

Public classes

trusted_ca

certificates_version

String. Version of the distribution-specific trusted certificates. Examples would be 'latest' or a specific version.

certs_package

String. Package name of the distribution-specific trusted certificates. Default is OS/Distribution specific.

path

String/Array of String. List of paths for the update_command.

install_path

String. Location to install the trusted certificates.

update_command

String. Command to rebuild the system-trusted certificates.

certfile_suffix

String. Suffix of certificate files. Default is OS/Distribution dependent, i.e. 'pem' or 'crt'.

Public defines

trusted_ca::ca

source

String. Source of the certificate to include. Must be a file in PEM format with crt extension. You must specify either source or content, but not both. If source is specified, content is ignored.

content

String. Content of certificate in PEM format. You must specify either source or content, but not both. If source is specified, content is ignored.

install_path

String. Destination of the certificate file for processing. Defaults to the install_path from the class, but can be overridden per certificate.

certfile_suffix

String. Suffix of certificate files. Default is OS/Distribution dependent, i.e. 'pem' or 'crt'.

trusted_ca::java

source

String. Source of the certificate to include. Must be a file in PEM format with crt extension. You must specify either source or content, but not both. If source is specified, content is ignored.

content

String. Content of certificate in PEM format. You must specify either source or content, but not both. If source is specified, content is ignored.

java_keystore

String. Location of of the java cacerts keystore file.

Private classes

  • trusted_ca::params: Defaults for the trusted_ca module

Limitations

Tested on:

  • EL 6
  • EL 7
  • Debian 8
  • Debian 9
  • SLES 11 SP3
  • SLES 12 SP4
  • SLES 15 SP1
  • Ubuntu 16.04 LTS
  • Ubuntu 18.04 LTS

This module assumes the keytool and openssl utilities are available.

Development

Improvements and bug fixes are greatly appreciated. See the contributing guide for information on adding and validating tests for PRs.

Changelog / Contributors

This module was originally known as jlambert121/trusted_ca but forked to Voxpupuli because the original author no longer responded.

Changelog Contributors