move so-catrust

This commit is contained in:
m0duspwnens
2023-05-15 14:08:30 -04:00
parent 928b3b5471
commit 6320528263
3 changed files with 29 additions and 27 deletions

View File

@@ -37,26 +37,7 @@ elasticsearch:
- home: /opt/so/conf/elasticsearch
- createhome: False
{% if GLOBALS.is_manager %}
# We have to add the Manager CA to the CA list
cascriptsync:
file.managed:
- name: /usr/sbin/so-catrust
- source: salt://elasticsearch/tools/sbin_jinja/so-catrust
- user: 939
- group: 939
- mode: 750
- template: jinja
- defaults:
GLOBALS: {{ GLOBALS }}
# Run the CA magic
cascriptfun:
cmd.run:
- name: /usr/sbin/so-catrust
- require:
- file: cascriptsync
{% endif %}
elasticsearch_sbin:
file.recurse:

View File

@@ -35,18 +35,39 @@ include:
{% set ca_server = global_ca_server[0] %}
{% endif %}
{% if GLOBALS.is_manager %}
# We have to add the Manager CA to the CA list
cascriptsync:
file.managed:
- name: /usr/sbin/so-catrust
- source: salt://ssl/tools/sbin_jinja/so-catrust
- user: 939
- group: 939
- mode: 750
- template: jinja
- defaults:
GLOBALS: {{ GLOBALS }}
# Run the CA magic
cascriptfun:
cmd.run:
- name: /usr/sbin/so-catrust
- require:
- file: cascriptsync
{% endif %}
{% if grains.role in ['so-manager', 'so-helix', 'so-managersearch', 'so-standalone', 'so-import', 'so-searchnode'] %}
cacertz:
file.managed:
- name: /opt/so/conf/ca/cacerts
- source: salt://common/cacerts
- source: salt://ssl/cacerts
- user: 939
- group: 939
capemz:
file.managed:
- name: /opt/so/conf/ca/tls-ca-bundle.pem
- source: salt://common/tls-ca-bundle.pem
- source: salt://ssl/tls-ca-bundle.pem
- user: 939
- group: 939
{% endif %}

View File

@@ -11,14 +11,14 @@
set -e
# Check to see if we have extracted the ca cert.
if [ ! -f /opt/so/saltstack/local/salt/common/cacerts ]; then
if [ ! -f /opt/so/saltstack/local/salt/ssl/cacerts ]; then
docker run -v /etc/pki/ca.crt:/etc/ssl/ca.crt --name so-elasticsearchca --user root --entrypoint jdk/bin/keytool {{ GLOBALS.registry_host }}:5000/{{ GLOBALS.image_repo }}/so-elasticsearch:{{ GLOBALS.so_version }} -keystore /usr/share/elasticsearch/jdk/lib/security/cacerts -alias SOSCA -import -file /etc/ssl/ca.crt -storepass changeit -noprompt
docker cp so-elasticsearchca:/usr/share/elasticsearch/jdk/lib/security/cacerts /opt/so/saltstack/local/salt/common/cacerts
docker cp so-elasticsearchca:/etc/ssl/certs/ca-certificates.crt /opt/so/saltstack/local/salt/common/tls-ca-bundle.pem
docker cp so-elasticsearchca:/usr/share/elasticsearch/jdk/lib/security/cacerts /opt/so/saltstack/local/salt/ssl/cacerts
docker cp so-elasticsearchca:/etc/ssl/certs/ca-certificates.crt /opt/so/saltstack/local/salt/ssl/tls-ca-bundle.pem
docker rm so-elasticsearchca
echo "" >> /opt/so/saltstack/local/salt/common/tls-ca-bundle.pem
echo "sosca" >> /opt/so/saltstack/local/salt/common/tls-ca-bundle.pem
cat /etc/pki/ca.crt >> /opt/so/saltstack/local/salt/common/tls-ca-bundle.pem
echo "" >> /opt/so/saltstack/local/salt/ssl/tls-ca-bundle.pem
echo "sosca" >> /opt/so/saltstack/local/salt/ssl/tls-ca-bundle.pem
cat /etc/pki/ca.crt >> /opt/so/saltstack/local/salt/ssl/tls-ca-bundle.pem
else
exit 0
fi