Details
-
Improvement
-
Status: Closed
-
Normal
-
Resolution: Fixed
-
None
-
None
-
None
Description
Currently our docs and error messaging frequently tell users to delete their SSL directories when something goes wrong with certificates on an agent. This can lead to problems if users accidentally do it on their CA node instead of on an agent, because it will destroy the whole CA and make all agents unable to check in. We should add a new command under puppet ssl to clean up just the client-side artifacts leaving the CA dir untouched no matter where it's run, and tell users to use that instead of deleting their directories manually. This should probably clean up everything in the SSL dir EXCEPT the CA dir.
We may want to think a little more about the case where someone is running this on the master and has used `puppetserver ca generate` to create certs for distribution. This places the certs both in the ca/signed dir and in ssl/certs, the latter of which could potentially be cleaned up by this command.
Host-specific files to delete (if present)
file | setting |
---|---|
private key | Puppet[:hostprivkey] |
public key | Puppet[:hostpubkey] |
certificate request | Puppet[:hostcsr] |
certificate | Puppet[:hostcert] |
passphrase file | Puppet[:passfile] |
Local copies of CA files to delete (if present)
file | setting |
---|---|
local ca cert | Puppet[:localcacert] |
local crl | Puppet[:hostcrl] |
Attachments
Issue Links
- is duplicated by
-
PUP-9335 Puppet ssl application should use agent run mode
-
- Closed
-
- relates to
-
ENTERPRISE-1274 Help text for 'node purge' face may result in deleted master certs
-
- Closed
-
-
PUP-8918 Finalize separation of CA from Ruby
-
- Closed
-