mirror of
https://github.com/Security-Onion-Solutions/securityonion.git
synced 2025-12-07 01:32:47 +01:00
ensure /etc/pki is created and simplify ca logic for non manager in ssl state
This commit is contained in:
4
salt/ca/dirs.sls
Normal file
4
salt/ca/dirs.sls
Normal file
@@ -0,0 +1,4 @@
|
|||||||
|
pki_issued_certs:
|
||||||
|
file.directory:
|
||||||
|
- name: /etc/pki/issued_certs
|
||||||
|
- makedirs: True
|
||||||
@@ -1,17 +1,14 @@
|
|||||||
{% from 'allowed_states.map.jinja' import allowed_states %}
|
{% from 'allowed_states.map.jinja' import allowed_states %}
|
||||||
{% if sls in allowed_states %}
|
{% if sls in allowed_states %}
|
||||||
|
|
||||||
|
include:
|
||||||
|
- ca.dirs
|
||||||
|
|
||||||
{% set manager = salt['grains.get']('master') %}
|
{% set manager = salt['grains.get']('master') %}
|
||||||
/etc/salt/minion.d/signing_policies.conf:
|
/etc/salt/minion.d/signing_policies.conf:
|
||||||
file.managed:
|
file.managed:
|
||||||
- source: salt://ca/files/signing_policies.conf
|
- source: salt://ca/files/signing_policies.conf
|
||||||
|
|
||||||
/etc/pki:
|
|
||||||
file.directory: []
|
|
||||||
|
|
||||||
/etc/pki/issued_certs:
|
|
||||||
file.directory: []
|
|
||||||
|
|
||||||
pki_private_key:
|
pki_private_key:
|
||||||
x509.private_key_managed:
|
x509.private_key_managed:
|
||||||
- name: /etc/pki/ca.key
|
- name: /etc/pki/ca.key
|
||||||
|
|||||||
@@ -16,20 +16,16 @@
|
|||||||
{% endif %}
|
{% endif %}
|
||||||
|
|
||||||
{% if grains.id.split('_')|last in ['manager', 'managersearch', 'eval', 'standalone', 'import', 'helixsensor'] %}
|
{% if grains.id.split('_')|last in ['manager', 'managersearch', 'eval', 'standalone', 'import', 'helixsensor'] %}
|
||||||
{% set trusttheca_text = salt['cp.get_file_str']('/etc/pki/ca.crt')|replace('\n', '') %}
|
|
||||||
{% set ca_server = grains.id %}
|
|
||||||
include:
|
include:
|
||||||
- ca
|
- ca
|
||||||
|
{% set trusttheca_text = salt['cp.get_file_str']('/etc/pki/ca.crt')|replace('\n', '') %}
|
||||||
|
{% set ca_server = grains.id %}
|
||||||
{% else %}
|
{% else %}
|
||||||
{% set x509dict = salt['mine.get']('*', 'x509.get_pem_entries') %}
|
include:
|
||||||
{% for host in x509dict %}
|
- ca.dirs
|
||||||
{% if 'manager' in host.split('_')|last or host.split('_')|last == 'standalone' %}
|
{% set x509dict = salt['mine.get'](manager, 'x509.get_pem_entries') %}
|
||||||
{% do global_ca_text.append(x509dict[host].get('/etc/pki/ca.crt')|replace('\n', '')) %}
|
{% set trusttheca_text = x509dict[manager].get('/etc/pki/ca.crt')|replace('\n', '') %}
|
||||||
{% do global_ca_server.append(host) %}
|
{% set ca_server = manager %}
|
||||||
{% endif %}
|
|
||||||
{% endfor %}
|
|
||||||
{% set trusttheca_text = global_ca_text[0] %}
|
|
||||||
{% set ca_server = global_ca_server[0] %}
|
|
||||||
{% endif %}
|
{% endif %}
|
||||||
|
|
||||||
# Trust the CA
|
# Trust the CA
|
||||||
|
|||||||
Reference in New Issue
Block a user