Advertisement
Guest User

grep -Ri cert tripleo

a guest
Mar 5th, 2015
221
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. Binary file tripleo/user_images/debian-wheezy-amd64-20140929-disk.img matches
  2. Binary file tripleo/user_images/debian-7.tar.xz matches
  3. tripleo/tripleo-heat-templates/swift-storage-server.yaml:          ssl_certificate: {get_param: SSLCertificate}
  4. tripleo/tripleo-heat-templates/swift-storage-server.yaml:          ssl_ca_certificate: {get_param: SSLCACertificate}
  5. tripleo/tripleo-heat-templates/swift-storage-server.yaml:          ssl_certificate_location: {get_param: SSLCertificateLocation}
  6. tripleo/tripleo-heat-templates/undercloud-vm.yaml:  EphemeralCaCert:
  7. tripleo/tripleo-heat-templates/undercloud-vm.yaml:    description: Cert used by check_mk agent to call into the overcloud
  8. tripleo/tripleo-heat-templates/undercloud-vm.yaml:  KeystoneCACertificate:
  9. tripleo/tripleo-heat-templates/undercloud-vm.yaml:    description: Keystone self-signed certificate authority certificate.
  10. tripleo/tripleo-heat-templates/undercloud-vm.yaml:  KeystoneSigningCertificate:
  11. tripleo/tripleo-heat-templates/undercloud-vm.yaml:    description: Keystone certificate for verifying token validity.
  12. tripleo/tripleo-heat-templates/undercloud-vm.yaml:          ca_certificate:
  13. tripleo/tripleo-heat-templates/undercloud-vm.yaml:            get_param: KeystoneCACertificate
  14. tripleo/tripleo-heat-templates/undercloud-vm.yaml:          signing_certificate:
  15. tripleo/tripleo-heat-templates/undercloud-vm.yaml:            get_param: KeystoneSigningCertificate
  16. tripleo/tripleo-heat-templates/overcloud-source.yaml:    description: The number of hours a cert issued by the ECA server is valid for
  17. tripleo/tripleo-heat-templates/overcloud-source.yaml:  EphemeralCaCert:
  18. tripleo/tripleo-heat-templates/overcloud-source.yaml:    description: The certificate the ECA server will use to in a CSR
  19. tripleo/tripleo-heat-templates/overcloud-source.yaml:    description: The private key for the ECA server certificate
  20. tripleo/tripleo-heat-templates/overcloud-source.yaml:  MysqlClusterCertificate:
  21. tripleo/tripleo-heat-templates/overcloud-source.yaml:    description: The certificate used for MySQL Galera clustering.
  22. tripleo/tripleo-heat-templates/overcloud-source.yaml:    description: Keystone certificate authority key. Remove this later (kerrin)
  23. tripleo/tripleo-heat-templates/overcloud-source.yaml:  KeystoneCACertificate:
  24. tripleo/tripleo-heat-templates/overcloud-source.yaml:    description: Keystone self-signed certificate authority certificate.
  25. tripleo/tripleo-heat-templates/overcloud-source.yaml:  KeystoneSigningCertificate:
  26. tripleo/tripleo-heat-templates/overcloud-source.yaml:    description: Keystone certificate for verifying token validity.
  27. tripleo/tripleo-heat-templates/overcloud-source.yaml:          ca_certificate: {get_param: KeystoneCACertificate}
  28. tripleo/tripleo-heat-templates/overcloud-source.yaml:          signing_certificate: {get_param: KeystoneSigningCertificate}
  29. tripleo/tripleo-heat-templates/overcloud-source.yaml:          cluster_certificate: {get_param: MysqlClusterCertificate}
  30. tripleo/tripleo-heat-templates/overcloud-source.yaml:          ca_cert_location: {get_param: SSLCACertificateLocation}
  31. tripleo/tripleo-heat-templates/overcloud-source.yaml:            cert: { get_param: EphemeralCaCert }
  32. tripleo/tripleo-heat-templates/overcloud-source.yaml:        ssl_certificate: {get_param: SSLCertificate}
  33. tripleo/tripleo-heat-templates/overcloud-source.yaml:        ssl_ca_certificate: {get_param: SSLCACertificate}
  34. tripleo/tripleo-heat-templates/overcloud-source.yaml:        ssl_certificate_location: {get_param: SSLCertificateLocation}
  35. tripleo/tripleo-heat-templates/ssl-source.yaml:  SSLCertificate:
  36. tripleo/tripleo-heat-templates/ssl-source.yaml:    description: If set, the contents of an SSL certificate .crt file for encrypting SSL endpoints.
  37. tripleo/tripleo-heat-templates/ssl-source.yaml:    description: If set, the contents of an SSL certificate .key file for encrypting SSL endpoints.
  38. tripleo/tripleo-heat-templates/ssl-source.yaml:  SSLCertificateLocation:
  39. tripleo/tripleo-heat-templates/ssl-source.yaml:    description: The location of an SSL certificate .crt file for encrypting SSL endpoints.
  40. tripleo/tripleo-heat-templates/ssl-source.yaml:    description: The location of an SSL certificate .key file for encrypting SSL endpoints.
  41. tripleo/tripleo-heat-templates/ssl-source.yaml:  SSLCACertificate:
  42. tripleo/tripleo-heat-templates/ssl-source.yaml:    description: If set, the contents of an SSL certificate authority file.
  43. tripleo/tripleo-heat-templates/ssl-source.yaml:  SSLCACertificateLocation:
  44. tripleo/tripleo-heat-templates/ssl-source.yaml:    default: '/etc/ssl/certs/ca-certificates.crt'
  45. tripleo/tripleo-heat-templates/ssl-source.yaml:    description: The location of the CA Certificate used for signing the SSL cert and key.
  46. tripleo/tripleo-heat-templates/ssl-source.yaml:          ca_certificate:
  47. tripleo/tripleo-heat-templates/ssl-source.yaml:            get_input: ssl_ca_certificate
  48. tripleo/tripleo-heat-templates/ssl-source.yaml:          cert: {get_input: ssl_certificate}
  49. tripleo/tripleo-heat-templates/ssl-source.yaml:          cacert: {get_input: ssl_ca_certificate}
  50. tripleo/tripleo-heat-templates/ssl-source.yaml:          cert_location: {get_input: ssl_certificate_location}
  51. tripleo/tripleo-heat-templates/soswift-storage.yaml:          ssl_certificate: {get_param: SSLCertificate}
  52. tripleo/tripleo-heat-templates/soswift-storage.yaml:          ssl_ca_certificate: {get_param: SSLCACertificate}
  53. tripleo/tripleo-heat-templates/soswift-storage.yaml:          ssl_certificate_location: {get_param: SSLCertificateLocation}
  54. tripleo/tripleo-heat-templates/undercloud-vm-ironic.yaml:  EphemeralCaCert:
  55. tripleo/tripleo-heat-templates/undercloud-vm-ironic.yaml:    description: Cert used by check_mk agent to call into the overcloud
  56. tripleo/tripleo-heat-templates/undercloud-vm-ironic.yaml:  KeystoneCACertificate:
  57. tripleo/tripleo-heat-templates/undercloud-vm-ironic.yaml:    description: Keystone self-signed certificate authority certificate.
  58. tripleo/tripleo-heat-templates/undercloud-vm-ironic.yaml:  KeystoneSigningCertificate:
  59. tripleo/tripleo-heat-templates/undercloud-vm-ironic.yaml:    description: Keystone certificate for verifying token validity.
  60. tripleo/tripleo-heat-templates/undercloud-vm-ironic.yaml:          ca_certificate:
  61. tripleo/tripleo-heat-templates/undercloud-vm-ironic.yaml:            get_param: KeystoneCACertificate
  62. tripleo/tripleo-heat-templates/undercloud-vm-ironic.yaml:          signing_certificate:
  63. tripleo/tripleo-heat-templates/undercloud-vm-ironic.yaml:            get_param: KeystoneSigningCertificate
  64. tripleo/tripleo-heat-templates/vsa-storage.yaml:          ssl_certificate: {get_param: SSLCertificate}
  65. tripleo/tripleo-heat-templates/vsa-storage.yaml:          ssl_ca_certificate: {get_param: SSLCACertificate}
  66. tripleo/tripleo-heat-templates/vsa-storage.yaml:          ssl_certificate_location: {get_param: SSLCertificateLocation}
  67. tripleo/tripleo-heat-templates/vsa-storage.yaml:          ssl_certificate: {get_param: SSLCertificate}
  68. tripleo/tripleo-heat-templates/vsa-storage.yaml:          ssl_ca_certificate: {get_param: SSLCACertificate}
  69. tripleo/tripleo-heat-templates/vsa-storage.yaml:          ssl_certificate_location: {get_param: SSLCertificateLocation}
  70. tripleo/tripleo-heat-templates/nova-compute-instance.yaml:        ssl_certificate: {get_param: SSLCertificate}
  71. tripleo/tripleo-heat-templates/nova-compute-instance.yaml:        ssl_ca_certificate: {get_param: SSLCACertificate}
  72. tripleo/tripleo-heat-templates/nova-compute-instance.yaml:        ssl_certificate_location: {get_param: SSLCertificateLocation}
  73. tripleo/tripleo-heat-templates/soswift-proxy.yaml:          ssl_certificate: {get_param: SSLCertificate}
  74. tripleo/tripleo-heat-templates/soswift-proxy.yaml:          ssl_ca_certificate: {get_param: SSLCACertificate}
  75. tripleo/tripleo-heat-templates/soswift-proxy.yaml:          ssl_certificate_location: {get_param: SSLCertificateLocation}
  76. tripleo/tripleo-heat-templates/undercloud-bm.yaml:  EphemeralCaCert:
  77. tripleo/tripleo-heat-templates/undercloud-bm.yaml:    description: Cert used by check_mk agent to call into the overcloud
  78. tripleo/tripleo-heat-templates/undercloud-bm.yaml:  KeystoneCACertificate:
  79. tripleo/tripleo-heat-templates/undercloud-bm.yaml:    description: Keystone self-signed certificate authority certificate.
  80. tripleo/tripleo-heat-templates/undercloud-bm.yaml:  KeystoneSigningCertificate:
  81. tripleo/tripleo-heat-templates/undercloud-bm.yaml:    description: Keystone certificate for verifying token validity.
  82. tripleo/tripleo-heat-templates/undercloud-bm.yaml:          ca_certificate:
  83. tripleo/tripleo-heat-templates/undercloud-bm.yaml:            get_param: KeystoneCACertificate
  84. tripleo/tripleo-heat-templates/undercloud-bm.yaml:          signing_certificate:
  85. tripleo/tripleo-heat-templates/undercloud-bm.yaml:            get_param: KeystoneSigningCertificate
  86. Binary file tripleo/images/overcloud-vsa-81.qcow2 matches
  87. Binary file tripleo/images/overcloud-esx-compute.qcow2 matches
  88. Binary file tripleo/images/undercloud-81.qcow2 matches
  89. Binary file tripleo/images/overcloud-compute-81.qcow2 matches
  90. Binary file tripleo/images/seed.qcow2 matches
  91. Binary file tripleo/images/overcloud-control-81.qcow2 matches
  92. tripleo/bin/load_ee_config.py:    specs = [('ssl/ca_certs', 'OVERCLOUD_SSL_CA_CERT'),
  93. tripleo/bin/load_ee_config.py:             ('ssl/cluster_backend/certificate', 'OVERCLOUD_CLUSTER_CERT'),
  94. tripleo/bin/load_ee_config.py:             ('ssl/public_vip/certificate', 'OVERCLOUD_SSL_CERT')]
  95. tripleo/hp-ovsvapp/scripts/ovsvapp_autoprep:export CERT_CHECK="%s"
  96. tripleo/hp-ovsvapp/scripts/ovsvapp_autoprep:export CERT_PATH="%s"
  97. tripleo/hp-ovsvapp/scripts/ovsvapp_autoprep:sudo /bin/sed -i "s/^cert_check.*=.*/cert_check = ${CERT_CHECK}/" $NEUTRON_PLUGIN_FILE
  98. tripleo/hp-ovsvapp/scripts/ovsvapp_autoprep:sudo /bin/sed -i "s/^cert_path.*=.*/cert_path = ${CERT_PATH}/" $NEUTRON_PLUGIN_FILE
  99. tripleo/hp-ovsvapp/doc/OVSvApp_Installation_Documentation.txt:#Vcenter FQDN(Provide FQDN, only if your vcenter certificate is generated with FQDN)(*OPTIONAL)
  100. tripleo/hp-ovsvapp/doc/OVSvApp_Installation_Documentation.txt:cert_check=true_or_false
  101. tripleo/hp-ovsvapp/doc/OVSvApp_Installation_Documentation.txt:#Certificate Path. Must required if cert_check=True(*OPTIONAL)
  102. tripleo/hp-ovsvapp/doc/OVSvApp_Installation_Documentation.txt:cert_path=/path/to/vcenter/certificate
  103. tripleo/hp-ovsvapp/src/util/vapp_constants.py:# VCENTER CERTIFICATE location inside OVSVAPP
  104. tripleo/hp-ovsvapp/src/util/vapp_constants.py:VCENTER_CERTIFICATE = '/home/stack/Vcenter_Certificate.pem'
  105. tripleo/hp-ovsvapp/src/util/vapp_config_parser.py:    inputs['cert_check'] = _str2bool(config.get('vmware', 'cert_check'))
  106. tripleo/hp-ovsvapp/src/util/vapp_config_parser.py:    inputs['cert_path'] = config.get('vmware', 'cert_path')
  107. tripleo/hp-ovsvapp/src/util/validate_inputs.py:        if (settings['cert_check'] and
  108. tripleo/hp-ovsvapp/src/util/validate_inputs.py:                not os.path.isfile(settings['cert_path'])):
  109. tripleo/hp-ovsvapp/src/util/validate_inputs.py:            raise Exception("Vcenter Certificate check is true but "
  110. tripleo/hp-ovsvapp/src/util/validate_inputs.py:                            "Vcenter Certificate path is either not provided "
  111. tripleo/hp-ovsvapp/src/util/validate_inputs.py:                            "Provide valid Vcenter certificate path to "
  112. tripleo/hp-ovsvapp/src/installer/configure_ovsvapp.py:    VCENTER_CERTIFICATE,
  113. tripleo/hp-ovsvapp/src/installer/configure_ovsvapp.py:    def _send_vcenter_certificate(self, content, vm, creds, inputs):
  114. tripleo/hp-ovsvapp/src/installer/configure_ovsvapp.py:        vcenter_certificate = self._read_file(inputs['cert_path'])
  115. tripleo/hp-ovsvapp/src/installer/configure_ovsvapp.py:        response = self._send_file(content, vm, creds, vcenter_certificate,
  116. tripleo/hp-ovsvapp/src/installer/configure_ovsvapp.py:                                   VCENTER_CERTIFICATE)
  117. tripleo/hp-ovsvapp/src/installer/configure_ovsvapp.py:            self.logger.error("Couldn't send the Vcenter Certificate inside "
  118. tripleo/hp-ovsvapp/src/installer/configure_ovsvapp.py:        self.logger.info("Vcenter Certificate copied successfully "
  119. tripleo/hp-ovsvapp/src/installer/configure_ovsvapp.py:                         "at %s" % VCENTER_CERTIFICATE)
  120. tripleo/hp-ovsvapp/src/installer/configure_ovsvapp.py:        cert_path = ''
  121. tripleo/hp-ovsvapp/src/installer/configure_ovsvapp.py:        if inputs['cert_check']:
  122. tripleo/hp-ovsvapp/src/installer/configure_ovsvapp.py:            if inputs['cert_path']:
  123. tripleo/hp-ovsvapp/src/installer/configure_ovsvapp.py:                cert_path = VCENTER_CERTIFICATE.replace('/', '\\\\/')
  124. tripleo/hp-ovsvapp/src/installer/configure_ovsvapp.py:            inputs['vcenter_password'], port, inputs['cert_check'],
  125. tripleo/hp-ovsvapp/src/installer/configure_ovsvapp.py:            cert_path, inputs['datacenter'], params['cluster'],
  126. tripleo/hp-ovsvapp/src/installer/configure_ovsvapp.py:        if inputs['cert_check']:
  127. tripleo/hp-ovsvapp/src/installer/configure_ovsvapp.py:            if inputs['cert_path']:
  128. tripleo/hp-ovsvapp/src/installer/configure_ovsvapp.py:                self._send_vcenter_certificate(content, vm, creds, inputs)
  129. tripleo/hp-ovsvapp/conf/ovs_vapp.ini:#Vcenter FQDN(Provide FQDN, only if your vcenter certificate is generated with FQDN)(*OPTIONAL)
  130. tripleo/hp-ovsvapp/conf/ovs_vapp.ini:cert_check=
  131. tripleo/hp-ovsvapp/conf/ovs_vapp.ini:#Certificate Path. Must required if cert_check=True(*OPTIONAL)
  132. tripleo/hp-ovsvapp/conf/ovs_vapp.ini:cert_path=
  133. Binary file tripleo/CMC_11.5.01.0079.0_Installer_Linux.bin matches
  134. tripleo/helion-update/tripleo-ansible/playbooks/update_cloud.yml:    # Issue a killall for the certmonger and stunnel processes in case they are still running
  135. tripleo/helion-update/tripleo-ansible/playbooks/update_cloud.yml:    - command: pkill -f certmonger
  136. tripleo/helion-update/tripleo-ansible/playbooks/update_cloud.yml:    - command: pkill -9 -f certmonger
  137. tripleo/helion-update/tripleo-ansible/playbooks/update_cloud.yml:    # Issue a killall for the certmonger and stunnel processes in case they are still running
  138. tripleo/helion-update/tripleo-ansible/playbooks/update_cloud.yml:    - command: pkill -f certmonger
  139. tripleo/helion-update/tripleo-ansible/playbooks/update_cloud.yml:    - command: pkill -9 -f certmonger
  140. tripleo/helion-update/tripleo-ansible/playbooks/update_cloud.yml:    # Issue a killall for the certmonger and stunnel processes in case they are still running
  141. tripleo/helion-update/tripleo-ansible/playbooks/update_cloud.yml:    - command: pkill -f certmonger
  142. tripleo/helion-update/tripleo-ansible/playbooks/update_cloud.yml:    - command: pkill -9 -f certmonger
  143. tripleo/helion-update/tripleo-ansible/playbooks/update_cloud.yml:    # Issue a killall for the certmonger and stunnel processes in case they are still running
  144. tripleo/helion-update/tripleo-ansible/playbooks/update_cloud.yml:    - command: pkill -f certmonger
  145. tripleo/helion-update/tripleo-ansible/playbooks/update_cloud.yml:    - command: pkill -9 -f certmonger
  146. tripleo/helion-update/tripleo-ansible/playbooks/update_cloud.yml:    # Issue a killall for the certmonger and stunnel processes in case they are still running
  147. tripleo/helion-update/tripleo-ansible/playbooks/update_cloud.yml:    - command: pkill -f certmonger
  148. tripleo/helion-update/tripleo-ansible/playbooks/update_cloud.yml:    - command: pkill -9 -f certmonger
  149. tripleo/helion-update/tripleo-ansible/plugins/inventory/group_vars/all:  - nova-cert
  150. tripleo/helion-update/tripleo-ansible/plugins/inventory/group_vars/all:  - nova-cert
  151. tripleo/helion-update/tripleo-ansible/plugins/inventory/group_vars/all:  - certmonger
  152. tripleo/helion-update/tripleo-ansible/plugins/inventory/group_vars/all:  - nova-cert
  153. tripleo/helion-update/tripleo-ansible/plugins/inventory/group_vars/all:  - certmonger
  154. tripleo/helion-update/tripleo-ansible/plugins/inventory/group_vars/all:  - certmonger
  155. tripleo/helion-update/tripleo-ansible/plugins/inventory/group_vars/all:  - certmonger
  156. tripleo/helion-update/tripleo-ansible/plugins/inventory/group_vars/all:  - nova-cert
  157. tripleo/helion-update/tripleo-ansible/plugins/inventory/group_vars/all:  - certmonger
  158. tripleo/helion-update/tripleo-ansible/Troubleshooting.rst:    * If restarting MySQL fails, then the database is most certainly out of sync
  159. tripleo/helion-update/tripleo-ansible/Troubleshooting.rst:Apache2 requires some self-signed SSL certificates to be put in place
  160. tripleo/helion-update/tripleo-ansible/Troubleshooting.rst:    * /etc/ssl/certs/ssl-cert-snakeoil.pem is missing or empty
  161. tripleo/helion-update/tripleo-ansible/Troubleshooting.rst:    * Re-run `os-collect-config` to reassert the SSL certificates::
  162. tripleo/helion-update/tripleo-ansible/Troubleshooting.rst:There are certain system states that cause RabbitMQ to fail to die on normal kill signals.
  163. tripleo/helion-update/seed_update/seed_restore_1_5:cp -a "${RESTORE_DIR}/ephemeralca-cacert.crt" /usr/local/share/ca-certificates
  164. tripleo/helion-update/seed_update/seed_restore_1_5:# local certificate refresh to allow connection to overcloud.
  165. tripleo/helion-update/seed_update/seed_restore_1_5:update-ca-certificates --fresh
  166. tripleo/helion-update/seed_update/seed_restore_1_5:# Restore SSH and Certificates
  167. tripleo/helion-update/seed_update/seed_backup_1_5:cp -a /usr/local/share/ca-certificates/ephemeralca-cacert.crt "${BACKUP_DIR}"
  168. tripleo/helion-update/seed_update/seed_backup_1_5:# Copying SSH and Certificates.
  169. tripleo/hp_passthrough/undercloud_tempest_conf.json:            "option": "ca_certificates_file",
  170. tripleo/hp_passthrough/undercloud_tempest_conf.json:            "value": "/usr/local/share/ca-certificates/ephemeralca-cacert.crt"
  171. tripleo/hp_passthrough/overcloud_nova_conf.json:            "option": "ca_certificates_file",
  172. tripleo/hp_passthrough/overcloud_nova_conf.json:            "value": "/usr/local/share/ca-certificates/ephemeralca-cacert.crt"
  173. tripleo/hp_passthrough/overcloud_beaver.json:        "section": "/var/log/nova/nova-cert-json.log",
  174. tripleo/hp_passthrough/overcloud_heat_conf.json:                    { "option": "cafile", "value": "/usr/local/share/ca-certificates/ephemeralca-cacert.crt" }
  175. tripleo/hp_passthrough/overcloud_heat_conf.json:                    { "option": "cafile", "value": "/usr/local/share/ca-certificates/ephemeralca-cacert.crt" }
  176. tripleo/hp_passthrough/overcloud_heat_conf.json:                    { "option": "ca_file", "value": "/etc/ssl/certs/ca-certificates.crt" }
  177. tripleo/hp_passthrough/undercloud_nova_conf.json:    "cert_config": [
  178. tripleo/hp_passthrough/overcloud_ceilometer_conf.json:           {"option":"cafile","value":"/etc/ssl/certs/ca-certificates.crt"}
  179. tripleo/hp_passthrough/undercloud_beaver.json:        "section": "/var/log/nova/nova-cert-json.log",
  180. tripleo/tripleo-incubator/scripts/hp_ced_host_manager.sh:    echo "This script depends on certain baseline capabilities of the HOST operating system"
  181. tripleo/tripleo-incubator/scripts/hp_ced_overcloud.sh:## #. Load ECA server cert and key
  182. tripleo/tripleo-incubator/scripts/hp_ced_overcloud.sh:EPHEMERAL_CA_CERT_FILE=${EPHEMERAL_CA_CERT_FILE:-${TRIPLEO_ROOT}/../eca.crt}
  183. tripleo/tripleo-incubator/scripts/hp_ced_overcloud.sh:if [[ ! -f "${EPHEMERAL_CA_CERT_FILE}" || ! -f ${EPHEMERAL_CA_KEY_FILE} ]]; then
  184. tripleo/tripleo-incubator/scripts/hp_ced_overcloud.sh:    echo "Error: Could not find ECA Cert file or ECA key file." >&2
  185. tripleo/tripleo-incubator/scripts/hp_ced_overcloud.sh:EPHEMERAL_CA_CERT=$(<${EPHEMERAL_CA_CERT_FILE})
  186. tripleo/tripleo-incubator/scripts/hp_ced_overcloud.sh:## #. Add ECA server cert to local certificate store
  187. tripleo/tripleo-incubator/scripts/hp_ced_overcloud.sh:OVERCLOUD_CACERT_LOCATION=$(os-apply-config -m $TE_DATAFILE --key overcloud.cacert --type raw)
  188. tripleo/tripleo-incubator/scripts/hp_ced_overcloud.sh:if [[ -n "${EPHEMERAL_CA_CERT:-}" ]]; then
  189. tripleo/tripleo-incubator/scripts/hp_ced_overcloud.sh:     echo "${EPHEMERAL_CA_CERT}" > "${OVERCLOUD_CACERT_LOCATION}" && update-ca-certificates
  190. tripleo/tripleo-incubator/scripts/hp_ced_overcloud.sh:##    set this to the DNS name you're using for your SSL certificate - the heat
  191. tripleo/tripleo-incubator/scripts/hp_ced_overcloud.sh:if [ -z "${OVERCLOUD_CLUSTER_CERT:-}" ] || [ -z "${OVERCLOUD_CLUSTER_KEY:-}" ]; then
  192. tripleo/tripleo-incubator/scripts/hp_ced_overcloud.sh:    OVERCLOUD_CLUSTER_CERT=$(<$OVERCLOUD_CLUSTER_PATH/cluster.crt)
  193. tripleo/tripleo-incubator/scripts/hp_ced_overcloud.sh:    "EphemeralCaCert": "'"${EPHEMERAL_CA_CERT}"'",
  194. tripleo/tripleo-incubator/scripts/hp_ced_overcloud.sh:    "MysqlClusterCertificate": "'"${OVERCLOUD_CLUSTER_CERT}"'",
  195. tripleo/tripleo-incubator/scripts/hp_ced_overcloud.sh:## #. Add Keystone certs/key into the environment file.::
  196. tripleo/tripleo-incubator/scripts/hp_ced_overcloud.sh:NEW_JSON=$(jq '.overcloud.password="'${OVERCLOUD_ADMIN_PASSWORD}'" | .overcloud.endpoint="'${OVERCLOUD_ENDPOINT}'" | .overcloud.endpointhost="'${OVERCLOUD_IP}'" | .overcloud.cacert="'${OVERCLOUD_CACERT_LOCATION}'"' $TE_DATAFILE)
  197. tripleo/tripleo-incubator/scripts/hp_ced_overcloud.sh:    -e "s,\(OS_CACERT=\).*$,\1${OVERCLOUD_CACERT_LOCATION}," \
  198. tripleo/tripleo-incubator/scripts/hp_ced_overcloud.sh:## #. Deploy overcloud CA certificate to undercloud
  199. tripleo/tripleo-incubator/scripts/hp_ced_overcloud.sh:if [[ -f "${OVERCLOUD_CACERT_LOCATION}" ]]; then
  200. tripleo/tripleo-incubator/scripts/hp_ced_overcloud.sh:    echo "Deploying overcloud CA certificate to undercloud for tempest"
  201. tripleo/tripleo-incubator/scripts/hp_ced_overcloud.sh:    wait_for 10 60 scp ${SSH_ARGS} "${OVERCLOUD_CACERT_LOCATION}" heat-admin@${UNDERCLOUD_IP}:/home/heat-admin/eca.crt
  202. tripleo/tripleo-incubator/scripts/hp_ced_overcloud.sh:    wait_for 10 60 ssh ${SSH_ARGS} heat-admin@${UNDERCLOUD_IP} "sudo cp /home/heat-admin/eca.crt ${OVERCLOUD_CACERT_LOCATION} && sudo update-ca-certificates --fresh"
  203. tripleo/tripleo-incubator/scripts/hp_ced_overcloud.sh:    echo "Undercloud deployed with overcloud CA certificate"
  204. tripleo/tripleo-incubator/scripts/hp_ced_overcloud.sh:        --os-cacert $OS_CACERT \
  205. tripleo/tripleo-incubator/scripts/hp_ced_overcloud.sh:        --os-cacert $OS_CACERT \
  206. tripleo/tripleo-incubator/scripts/hp_ced_overcloud.sh:        --os-cacert $OS_CACERT \
  207. tripleo/tripleo-incubator/scripts/hp_ced_overcloud.sh:                --os-cacert $OS_CACERT \
  208. tripleo/tripleo-incubator/scripts/hp_ced_setup.sh:# Add overcloud cacert location
  209. tripleo/tripleo-incubator/scripts/hp_ced_setup.sh:OVERCLOUD_CACERT_LOCATION=/usr/local/share/ca-certificates/ephemeralca-cacert.crt
  210. tripleo/tripleo-incubator/scripts/hp_ced_setup.sh:ENV_JSON=$(jq '.["overcloud"]["cacert"]="'$OVERCLOUD_CACERT_LOCATION'" ' $JSONFILE)
  211. tripleo/tripleo-incubator/scripts/hp_ced_undercloud.sh:## #. Load ECA server cert and key and generate if necessary
  212. tripleo/tripleo-incubator/scripts/hp_ced_undercloud.sh:EPHEMERAL_CA_CERT_FILE=${EPHEMERAL_CA_CERT_FILE:-${TRIPLEO_ROOT}/../eca.crt}
  213. tripleo/tripleo-incubator/scripts/hp_ced_undercloud.sh:if [[ -z "${EPHEMERAL_CA_KEY:-}" && -z "${EPHEMERAL_CA_CERT:-}" ]]; then
  214. tripleo/tripleo-incubator/scripts/hp_ced_undercloud.sh:    if [[ -f "${EPHEMERAL_CA_KEY_FILE}" && -f "${EPHEMERAL_CA_CERT_FILE}" ]]; then
  215. tripleo/tripleo-incubator/scripts/hp_ced_undercloud.sh:        echo "ECA key and cert files found"
  216. tripleo/tripleo-incubator/scripts/hp_ced_undercloud.sh:    elif [[ ! -f "${EPHEMERAL_CA_KEY_FILE}" && ! -f "${EPHEMERAL_CA_CERT_FILE}" ]]; then
  217. tripleo/tripleo-incubator/scripts/hp_ced_undercloud.sh:        echo "ECA key and cert files not found, generating new pair"
  218. tripleo/tripleo-incubator/scripts/hp_ced_undercloud.sh:        openssl req -x509 -batch -newkey rsa:2048 -nodes -out "${EPHEMERAL_CA_CERT_FILE}" \
  219. tripleo/tripleo-incubator/scripts/hp_ced_undercloud.sh:                -subj "/C=UK/O=hp/CN=Autogenerated Helion Certificate Authority" \
  220. tripleo/tripleo-incubator/scripts/hp_ced_undercloud.sh:        echo "Error: Inconsistent ECA key and cert files found" >&2
  221. tripleo/tripleo-incubator/scripts/hp_ced_undercloud.sh:    echo "Reading ECA key and cert from files"
  222. tripleo/tripleo-incubator/scripts/hp_ced_undercloud.sh:    EPHEMERAL_CA_CERT=$(<${EPHEMERAL_CA_CERT_FILE})
  223. tripleo/tripleo-incubator/scripts/hp_ced_undercloud.sh:elif [[ -z "${EPHEMERAL_CA_KEY:-}" || -z "${EPHEMERAL_CA_CERT:-}" ]]; then
  224. tripleo/tripleo-incubator/scripts/hp_ced_undercloud.sh:    echo "Error: Inconsistent ECA key and cert variables" >&2
  225. tripleo/tripleo-incubator/scripts/hp_ced_undercloud.sh:    echo "Using passed in ECA key and cert values"
  226. tripleo/tripleo-incubator/scripts/hp_ced_undercloud.sh:    "EphemeralCaCert": "'"${EPHEMERAL_CA_CERT}"'",
  227. tripleo/tripleo-incubator/scripts/hp_ced_undercloud.sh:## #. Add Keystone certs/key into the environment file.::
  228. tripleo/tripleo-incubator/scripts/hp_ced_load_config.sh:        # Write overcloud SSL certificates to the HEAT_ENV
  229. tripleo/tripleo-incubator/scripts/hp_ced_load_config.sh:        if [ -n "${OVERCLOUD_SSL_CA_CERT:-}" ] ; then
  230. tripleo/tripleo-incubator/scripts/hp_ced_load_config.sh:                "SSLCACertificate": "'"${OVERCLOUD_SSL_CA_CERT:-}"'",
  231. tripleo/tripleo-incubator/scripts/hp_ced_load_config.sh:        if [ -n "${OVERCLOUD_SSL_CERT:-}" -a -n "${OVERCLOUD_SSL_KEY}" ] ; then
  232. tripleo/tripleo-incubator/scripts/hp_ced_load_config.sh:            # Extract the common name (containing the IP address) from the certificate
  233. tripleo/tripleo-incubator/scripts/hp_ced_load_config.sh:            export PUBLIC_API_URL=$(openssl x509 -text -noout <<< "${OVERCLOUD_SSL_CERT}" | grep Subject: | sed "s/ //g" | awk -v RS=',' -v FS='=' '$1=="CN"{print $2}')
  234. tripleo/tripleo-incubator/scripts/hp_ced_load_config.sh:            echo "Using common name of SSL certificate as IP address for REST APIs: ${PUBLIC_API_URL}"
  235. tripleo/tripleo-incubator/scripts/hp_ced_load_config.sh:                "SSLCertificate": "'"${OVERCLOUD_SSL_CERT}"'",
  236. tripleo/tripleo-incubator/overcloudrc:export OS_CACERT=$(os-apply-config -m $TE_DATAFILE --type raw --key overcloud.cacert --key-default '')
  237. tripleo/tripleo-incubator/overcloudrc-user:export OS_CACERT=$(os-apply-config -m $TE_DATAFILE --type raw --key overcloud.cacert --key-default '')
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement