Hi Matt,

How to accomplish what you describe is going to be highly dependent on
the site's security policy, since you are dealing with sensitive
information.  I didn't want to put this info in the main git repo that
controls my puppet masters, since it is available to lots of people.
What I ended up doing was setting up an additional "private" repo that
contains a directory matching each hostname that needs private data,
and setting up a private per-host mount point in puppet's
fileserver.conf:

# Define a "private" mount point unique to each host
[private]
  path /etc/puppet/private/%H
  allow *

Then my module manifests can contain things like:

file { '/etc/pki/tls/private/example.key':
  source => 'puppet:///private/example.key'
}

This is just one way of handling this, I'd be interested in hearing
what others are doing.

-Steve


On Oct 4, 3:34 pm, Matt Zagrabelny <mzagr...@d.umn.edu> wrote:
> Hi,
>
> Are people using puppet to store/deploy SSL key/cert info?
>
> My scenario is that I've got a bunch of nodes/hosts that are using
> Shibboleth with each host having its own SSL cert and key. I know I
> can ensure the relevant packages are installed and that the configs
> are consistent across said nodes, but I don't know:
>
> A) If people are using puppet to store the certs/keys for various
> applications (apache, shib, syslog w/ TLS, etc.) within specific hosts
> B) If so, how best to do it with having puppet deploy those certs and
> keys to said hosts
>
> Thanks for any hints or info!
>
> -matt zagrabelny

-- 
You received this message because you are subscribed to the Google Groups 
"Puppet Users" group.
To post to this group, send email to puppet-users@googlegroups.com.
To unsubscribe from this group, send email to 
puppet-users+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/puppet-users?hl=en.

Reply via email to