-
-
Notifications
You must be signed in to change notification settings - Fork 197
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Install openvpn & certs also on client nodes #231
Comments
It's probably not as straightforward as it might seem, because the certs are generated not on the puppet node, but on the server. The only way I've been able to think of doing this would be to use a custom facter plugin to extract the certificates from the vpn servers into puppetdb using exported resources. The other thing I've seen done is to use the puppet certificates for the openvpn connection. |
As you know where it's saved it could also be transferred via ssh...
ajjonesycomau <[email protected]> schrieb am Mi., 5. Apr. 2017,
02:18:
It's probably not as straightforward as it might seem, because the certs
are generated not on the puppet node, but on the server.
The only way I've been able to think of doing this would be to use a
custom facter plugin to extract the certificates from the vpn servers into
puppetdb using exported resources.
The other thing I've seen done is to use the puppet certificates for the
openvpn connection.
—
You are receiving this because you authored the thread.
Reply to this email directly, view it on GitHub
<#231 (comment)>,
or mute the thread
<https://github.com/notifications/unsubscribe-auth/ABBTX4JI4x2cGTFo9Egn9UAMIPSLLIbiks5rst3GgaJpZM4MxK55>
.
--
…--
Regards
André Bauer
|
Sure, assuming all relevant nodes are able to be accessed via SSH and have authorised keys setup. |
copy it over ssh is probably not the best solution and not the "puppet way" :) but yes, would work. I would export the client resource from the node and collect it on the openvpn server via puppetdb. so the clients could "self-join" the openvpn server |
I've started to work on that inside of my fork. Will create a PR when everything is finished. for now, you can only manage a redundant "slave" of the openvpn server. I'll continue with the work after my vacation, to also support the client certificates. |
Just wondering if this functionality ever made it into a release? We wrote a module a few years ago to do the same thing - https://bitbucket.org/codacity/puppet-module-openvpn_client If we can consolidate it into a single module it's always a bonus and less to maintain. |
fix linting, add credit restructure deploy manifests fixes voxpupuli#231
fix linting, add credit restructure deploy manifests fixes voxpupuli#231
fix linting, add credit restructure deploy manifests fixes voxpupuli#231
fix linting, add credit restructure deploy manifests fixes voxpupuli#231
fix linting, add credit restructure deploy manifests fixes voxpupuli#231
fix linting, add credit, add tests fixes voxpupuli#231
fix linting, add credit, add tests fixes voxpupuli#231
Exporting private keys via facts is unsafe as facts should not contain sensitive information, as they might be accessible from undesired systems (eg. dashboards) This feature has been added in commit voxpupuli@d0fd9f3 as a result of voxpupuli#231. This commit reverts the changes and removes the added feature for security reasons.
Exporting private keys via facts is unsafe as facts should not contain sensitive information, as they might be accessible from undesired systems (eg. dashboards) This feature has been added in commit voxpupuli@d0fd9f3 as a result of voxpupuli#231. This commit reverts the changes and removes the added feature for security reasons.
Exporting private keys via facts is unsafe as facts should not contain sensitive information, as they might be accessible from undesired systems (eg. dashboards) This feature has been added in commit voxpupuli/puppet-openvpn@d0fd9f3 as a result of voxpupuli#231. This commit reverts the changes and removes the added feature for security reasons.
Exporting private keys via facts is unsafe as facts should not contain sensitive information, as they might be accessible from undesired systems (eg. dashboards) This feature has been added in commit voxpupuli/puppet-openvpn@d0fd9f3 as a result of voxpupuli#231 This commit reverts the changes and removes the added feature for security reasons.
Why is there no option to install the already created client tarball on client nodes, which are already able to get the configuration via puppet?
Did i just missed something?
The text was updated successfully, but these errors were encountered: