check_agent_expiry
: Check the expiration date of all agent certificatescheck_ca_expiry
: Check the expiration date of a CA certificatecheck_crl_cert
: Check the expiration date of the primary server crlcheck_primary_cert
: Check the expiration date of the primary server certconfigure_primary
: Backup ssldir and copy newly generated CA certificatecrl_truncate
: Truncate the CRL issued by the Puppet CAextend_ca_cert
: Extend CA certificate expiry date
ca_extend::extend_ca_cert
: Plan that extends the Puppet CA certificate and configures the primary Puppet server and Compilers to use the extended certificate.ca_extend::get_agent_facts
: A plan to work around BOLT-1168 so that one agent failing in apply_prep won't cause the whole plan to fail.ca_extend::upload_ca_cert
: A plan to upload a given CA certificate to a number of Puppet agent nodes
Check the expiration date of all agent certificates
Supports noop? false
Data type: Optional[String[1]]
YYYY-MM-DD date to test whether the certificates will expire by. Defaults to three months from today
Check the expiration date of a CA certificate
Supports noop? false
Data type: Optional[String[1]]
Location of the CA certificate to check. Defaults to Puppet's default location
Data type: Optional[String[1]]
YYYY-MM-DD date to test whether the certificate will expire by. Defaults to three months from today
Check the expiration date of the primary server crl
Supports noop? false
Check the expiration date of the primary server cert
Supports noop? false
Backup ssldir and copy newly generated CA certificate
Supports noop? false
Data type: String
Location of the newly generated CA certificate
Data type: Boolean
Flag to regerate the primary server's certificate. Set to true to perform the regeneration
Truncate the CRL issued by the Puppet CA
Supports noop? false
Data type: Optional[String[1]]
The location of the Puppet ssl dir
Data type: Integer[1]
The number of days until the new CRL expires. Defaults to 15 years (5475 days)
Data type: Boolean
Whether to run the Puppet agent after creating the CRL. Defaults to true
Extend CA certificate expiry date
Supports noop? false
Plan that extends the Puppet CA certificate and configures the primary Puppet server and Compilers to use the extended certificate.
bolt plan run ca_extend::extend_ca_cert regen_primary_cert=true --targets local://$(hostname -f) --run-as root
bolt plan run ca_extend::extend_ca_cert --targets <primary_fqdn> --run-as root
The following parameters are available in the ca_extend::extend_ca_cert
plan:
Data type: TargetSpec
The target node on which to run the plan. Should be the primary Puppet server
Data type: Optional[TargetSpec]
Optional comma separated list of compilers to upload the certificate to
Default value: undef
Data type: Any
Location of the ssldir on disk
Default value: '/etc/puppetlabs/puppet/ssl'
Data type: Any
Whether to also regenerate the agent certificate of the primary Puppet server
Default value: false
A plan to work around BOLT-1168 so that one agent failing in apply_prep won't cause the whole plan to fail.
The following parameters are available in the ca_extend::get_agent_facts
plan:
Data type: TargetSpec
The targets to run apply_prep on
A plan to upload a given CA certificate to a number of Puppet agent nodes
The following parameters are available in the ca_extend::upload_ca_cert
plan:
Data type: TargetSpec
The targets to upload the certificate to
Data type: String
The location of the CA certificate on disk of the local machine