Yushu Yao
2010-Aug-19 18:38 UTC
[Puppet Users] External CA: Could not run: Could not retrieve certificate for puppetsrv and not running on a valid certificate authority
Hi Experts, I''m trying to generate my own certificates (all of them, including certs for CA, server and client) for puppet to use. and I''m getting "Could not run: Could not retrieve certificate for puppetsrv and not running on a valid certificate authority" Just wondering what the problem could be? What I did is: 1. generate a self signed CA cert, and save the files to ca.crt, ca.prk, ca.puk, ca.pass. 2. generate a keypair, request, then sign with the above CA and save the files ssldir/public_keys/puppetsrv.pem, ssldir/private_keys/puppetsrv.pem, ssldir/certificate_requests/puppetsrv.pem, ssldir/certs/puppetsrv.pem (All certs work fine with openssl verify) 3. Puppet configuration file: ca = false cakey=$ssldir/ca.prk passfile=$ssldir/ca.pass cacert=$ssldir/ca.crt capub=$ssldir/ca.puk 4. run puppet master: /usr/sbin/puppetmasterd --no-daemonize --verbose --debug --certname puppetsrv Full log (added some breakpoints and printed some tracebacks): debug: Failed to load library ''selinux'' for feature ''selinux'' debug: Failed to load library ''ldap'' for feature ''ldap'' debug: /File[/opt/cloudcrv/varpuppet/lib]: Autorequiring File[/opt/cloudcrv/varpuppet] debug: /File[/opt/cloudcrv/confpuppet/puppet.conf]: Autorequiring File[/opt/cloudcrv/confpuppet] debug: /File[/opt/cloudcrv/varpuppet/run/puppetmasterd.pid]: Autorequiring File[/opt/cloudcrv/varpuppet/run] debug: /File[/opt/cloudcrv/varpuppet/ssl/certs/puppetsrv.pem]: Autorequiring File[/opt/cloudcrv/varpuppet/ssl/certs] debug: /File[/opt/cloudcrv/varpuppet/ssl/private]: Autorequiring File[/opt/cloudcrv/varpuppet/ssl] debug: /File[/opt/cloudcrv/varpuppet/rrd]: Autorequiring File[/opt/cloudcrv/varpuppet] debug: /File[/opt/cloudcrv/varpuppet/bucket]: Autorequiring File[/opt/cloudcrv/varpuppet] debug: /File[/opt/cloudcrv/varpuppet/log]: Autorequiring File[/opt/cloudcrv/varpuppet] debug: /File[/opt/cloudcrv/varpuppet/facts]: Autorequiring File[/opt/cloudcrv/varpuppet] debug: /File[/opt/cloudcrv/varpuppet/log/masterhttp.log]: Autorequiring File[/opt/cloudcrv/varpuppet/log] debug: /File[/opt/cloudcrv/varpuppet/ssl]: Autorequiring File[/opt/cloudcrv/varpuppet] debug: /File[/opt/cloudcrv/varpuppet/state]: Autorequiring File[/opt/cloudcrv/varpuppet] debug: /File[/opt/cloudcrv/confpuppet/fileserver.conf]: Autorequiring File[/opt/cloudcrv/confpuppet] debug: /File[/opt/cloudcrv/varpuppet/ssl/certificate_requests]: Autorequiring File[/opt/cloudcrv/varpuppet/ssl] debug: /File[/opt/cloudcrv/confpuppet/auth.conf]: Autorequiring File[/opt/cloudcrv/confpuppet] debug: /File[/opt/cloudcrv/confpuppet/manifests]: Autorequiring File[/opt/cloudcrv/confpuppet] debug: /File[/opt/cloudcrv/varpuppet/ssl/public_keys/puppetsrv.pem]: Autorequiring File[/opt/cloudcrv/varpuppet/ssl/public_keys] debug: /File[/opt/cloudcrv/varpuppet/yaml]: Autorequiring File[/opt/cloudcrv/varpuppet] debug: /File[/opt/cloudcrv/varpuppet/reports]: Autorequiring File[/opt/cloudcrv/varpuppet] debug: /File[/opt/cloudcrv/varpuppet/ssl/public_keys]: Autorequiring File[/opt/cloudcrv/varpuppet/ssl] debug: /File[/opt/cloudcrv/varpuppet/ssl/certs]: Autorequiring File[/opt/cloudcrv/varpuppet/ssl] debug: /File[/opt/cloudcrv/varpuppet/ssl/private_keys]: Autorequiring File[/opt/cloudcrv/varpuppet/ssl] debug: /File[/opt/cloudcrv/varpuppet/run]: Autorequiring File[/opt/cloudcrv/varpuppet] debug: /File[/opt/cloudcrv/varpuppet/ssl/private_keys]: Changing mode debug: /File[/opt/cloudcrv/varpuppet/ssl/private_keys]: 1 change(s) debug: /File[/opt/cloudcrv/varpuppet/ssl/private_keys]/mode: mode changed ''755'' to ''750'' debug: /File[/opt/cloudcrv/varpuppet/ssl/private]: Changing ensure debug: /File[/opt/cloudcrv/varpuppet/ssl/private]: 1 change(s) debug: /File[/opt/cloudcrv/varpuppet/ssl/private]/ensure: created debug: Finishing transaction 70044884792200 with 2 changes /usr/lib/ruby/1.8/puppet/ssl/host.rb:157:in `certificate'' /usr/lib/ruby/1.8/puppet/ssl/host.rb:27:in `init_localhost'' /usr/lib/ruby/1.8/puppet/util/cacher.rb:106:in `send'' /usr/lib/ruby/1.8/puppet/util/cacher.rb:106:in `cached_value'' /usr/lib/ruby/1.8/puppet/util/cacher.rb:46:in `localhost'' /usr/lib/ruby/1.8/puppet/application/puppetmasterd.rb:93:in `main'' /usr/lib/ruby/1.8/puppet/application.rb:226:in `send'' /usr/lib/ruby/1.8/puppet/application.rb:226:in `run_command'' /usr/lib/ruby/1.8/puppet/application.rb:217:in `run'' /usr/lib/ruby/1.8/puppet/application.rb:306:in `exit_on_fail'' /usr/lib/ruby/1.8/puppet/application.rb:217:in `run'' /usr/sbin/puppetmasterd:66 Puppet::SSL::Certificate /usr/lib/ruby/1.8/puppet/ssl/host.rb:173 ) (rdb:1) p Certificate.find("puppetsrv") #<Puppet::SSL::Certificate:0x7f6930ce7d18 @name="puppetsrv", @content=#<OpenSSL::X509::Certificate subject=/C=US/ST=CA/L=Berkeley/O=Lawrence Berkeley National Laboratory/CN=puppetsrv, issuer=/C=US/ST=CA/L=Berkeley/O=Lawrence Berkeley National Laboratory/CN=ca, serial=1, not_before=Thu Aug 19 18:24:23 UTC 2010, not_after=Fri Aug 19 18:24:23 UTC 2011>> (rdb:1) p Certificate.find("ca") nil (rdb:1) c info: Creating a new SSL key for puppetsrv /usr/lib/ruby/1.8/puppet/ssl/host.rb:157:in `certificate'' /usr/lib/ruby/1.8/puppet/ssl/host.rb:184:in `generate'' /usr/lib/ruby/1.8/puppet/ssl/host.rb:27:in `init_localhost'' /usr/lib/ruby/1.8/puppet/util/cacher.rb:106:in `send'' /usr/lib/ruby/1.8/puppet/util/cacher.rb:106:in `cached_value'' /usr/lib/ruby/1.8/puppet/util/cacher.rb:46:in `localhost'' /usr/lib/ruby/1.8/puppet/application/puppetmasterd.rb:93:in `main'' /usr/lib/ruby/1.8/puppet/application.rb:226:in `send'' /usr/lib/ruby/1.8/puppet/application.rb:226:in `run_command'' /usr/lib/ruby/1.8/puppet/application.rb:217:in `run'' /usr/lib/ruby/1.8/puppet/application.rb:306:in `exit_on_fail'' /usr/lib/ruby/1.8/puppet/application.rb:217:in `run'' /usr/sbin/puppetmasterd:66 Puppet::SSL::Certificate /usr/lib/ruby/1.8/puppet/ssl/host.rb:173 ) (rdb:1) p Certificate.find("ca") nil (rdb:1) p Certificate.find("puppetsrv") #<Puppet::SSL::Certificate:0x7f6930cdcb20 @name="puppetsrv", @content=#<OpenSSL::X509::Certificate subject=/C=US/ST=CA/L=Berkeley/O=Lawrence Berkeley National Laboratory/CN=puppetsrv, issuer=/C=US/ST=CA/L=Berkeley/O=Lawrence Berkeley National Laboratory/CN=ca, serial=1, not_before=Thu Aug 19 18:24:23 UTC 2010, not_after=Fri Aug 19 18:24:23 UTC 2011>> (rdb:1) p key #<Puppet::SSL::Key:0x7f6930ce5810 @password_file="/opt/cloudcrv/varpuppet/ssl/ca.pass", @name="puppetsrv", @content=-----BEGIN RSA PRIVATE KEY----- MIICXAIBAAKBgQCo7m5/ZO0vz+CjWnLDIkMQZPHh4Cmj4NhaVSSjo0jGzRrVuM1X UPm87p4mp/WwRbNxm5dY1qheBHk+/gW4xkJm68jDF2WNY+CvMxstBiTHZ3aGW3zk tNqiwk/ud4U3MDHDapzArgj1KL3/aTnDF0iBADaCcCYkS/kDxxhMjt5z8QIDAQAB AoGAaiXH0My+LPjWEk7XJb31neuQAXo1MAAscjZl21zScfiXEAwbGu6KvijBv1By lNx3ML+vjebzzH/LH8XGGqCZP8TupQHao/G+ZjgbnYFjmnujojjD2WwUAa2i4Jd0 T7QkJYus16OOcBUlrvpp89qvjSjv9C6/vKBLYPfzbSxzvkECQQDZ9Ly+zdwe8TYu OkbLgR8XHDrxzuw2Xw0xxoJ/1msAD6xAAJm9igN8K6J6q3FufFq2c9CWQp9SoGyW EIuuiFSdAkEAxmsNLmV51u/Fd8AEEALlkItxp6iiuuyXXqBcEDhp6by5cikmKoVv uYQjfWIK6Q5YUP1fYJDeBUHOGc11oZe6ZQJANtc3rqLJohd7VIJhUc85bW0y/6jb Eos0HLQgHd5rqeZHpwr/pAtX+SRZi5gbwHsVsBbQAx7cS8QFznR3UQEImQJASd9x eOSvCCcdDgifepaZgcdo+VL/wzhy4vgxTpiyViO9p5NKcmpbvmZEEFqAVWTR3NV4 vSsyfiKR6WllclRbQQJBALYyByAq9JDCbl0ElYILLvBQwIKjN6/JW4j0W3BjEgF6 Xo6cP0OCW5dzoV6Hrv+wQR1RcwQf2bFxW0bR06qT4Ec-----END RSA PRIVATE KEY----->(rdb:1) c CertificateAuthority.ca notice: Starting Puppet server version 0.25.4 /usr/lib/ruby/1.8/puppet/network/http/webrick.rb:101:in `setup_ssl'' /usr/lib/ruby/1.8/puppet/network/http/webrick.rb:31:in `listen'' /usr/lib/ruby/1.8/puppet/network/server.rb:131:in `listen'' /usr/lib/ruby/1.8/puppet/network/server.rb:146:in `start'' /usr/lib/ruby/1.8/puppet/daemon.rb:128:in `start'' /usr/lib/ruby/1.8/puppet/application/puppetmasterd.rb:125:in `main'' /usr/lib/ruby/1.8/puppet/application.rb:226:in `send'' /usr/lib/ruby/1.8/puppet/application.rb:226:in `run_command'' /usr/lib/ruby/1.8/puppet/application.rb:217:in `run'' /usr/lib/ruby/1.8/puppet/application.rb:306:in `exit_on_fail'' /usr/lib/ruby/1.8/puppet/application.rb:217:in `run'' /usr/sbin/puppetmasterd:66 /usr/lib/ruby/1.8/puppet/ssl/host.rb:157:in `certificate'' /usr/lib/ruby/1.8/puppet/network/http/webrick.rb:102:in `setup_ssl'' /usr/lib/ruby/1.8/puppet/network/http/webrick.rb:31:in `listen'' /usr/lib/ruby/1.8/puppet/network/server.rb:131:in `listen'' /usr/lib/ruby/1.8/puppet/network/server.rb:146:in `start'' /usr/lib/ruby/1.8/puppet/daemon.rb:128:in `start'' /usr/lib/ruby/1.8/puppet/application/puppetmasterd.rb:125:in `main'' /usr/lib/ruby/1.8/puppet/application.rb:226:in `send'' /usr/lib/ruby/1.8/puppet/application.rb:226:in `run_command'' /usr/lib/ruby/1.8/puppet/application.rb:217:in `run'' /usr/lib/ruby/1.8/puppet/application.rb:306:in `exit_on_fail'' /usr/lib/ruby/1.8/puppet/application.rb:217:in `run'' /usr/sbin/puppetmasterd:66 Puppet::SSL::Certificate /usr/lib/ruby/1.8/puppet/ssl/host.rb:173 ) (rdb:1) c Could not run: Could not retrieve certificate for puppetsrv and not running on a valid certificate authority -- You received this message because you are subscribed to the Google Groups "Puppet Users" group. To post to this group, send email to puppet-users@googlegroups.com. To unsubscribe from this group, send email to puppet-users+unsubscribe@googlegroups.com. For more options, visit this group at http://groups.google.com/group/puppet-users?hl=en.
Mohamed Lrhazi
2011-Mar-05 21:53 UTC
Re: [Puppet Users] External CA: Could not run: Could not retrieve certificate for puppetsrv and not running on a valid certificate authority
I just run into the same issue... I was trying to follow this procedure: http://bodepd.com/wordpress/?p=7 My goal is to be able to run my nodes against either of two puppetmasters.... My first master starts fine, but the second dies with this same error: Could not run: Could not retrieve certificate for <puppetmaster-fqdn> and not running on a valid certificate authority Is the procedure outdated? Is it supposed to work with puppet 2.6 ? Thanks, Mohamed. On Thu, Aug 19, 2010 at 2:38 PM, Yushu Yao <yao.yushu@gmail.com> wrote:> Hi Experts, > > I''m trying to generate my own certificates (all of them, including certs for > CA, server and client) for puppet to use. > > and I''m getting "Could not run: Could not retrieve certificate for puppetsrv > and not running on a valid certificate authority" > > Just wondering what the problem could be? > > What I did is: > > 1. generate a self signed CA cert, and save the files to ca.crt, ca.prk, > ca.puk, ca.pass. > 2. generate a keypair, request, then sign with the above CA and save the > files ssldir/public_keys/puppetsrv.pem, ssldir/private_keys/puppetsrv.pem, > ssldir/certificate_requests/puppetsrv.pem, ssldir/certs/puppetsrv.pem > (All certs work fine with openssl verify) > 3. Puppet configuration file: > ca = false > cakey=$ssldir/ca.prk > passfile=$ssldir/ca.pass > cacert=$ssldir/ca.crt > capub=$ssldir/ca.puk > 4. run puppet master: > /usr/sbin/puppetmasterd --no-daemonize --verbose --debug --certname > puppetsrv > > Full log (added some breakpoints and printed some tracebacks): > debug: Failed to load library ''selinux'' for feature ''selinux'' > debug: Failed to load library ''ldap'' for feature ''ldap'' > debug: /File[/opt/cloudcrv/varpuppet/lib]: Autorequiring > File[/opt/cloudcrv/varpuppet] > debug: /File[/opt/cloudcrv/confpuppet/puppet.conf]: Autorequiring > File[/opt/cloudcrv/confpuppet] > debug: /File[/opt/cloudcrv/varpuppet/run/puppetmasterd.pid]: Autorequiring > File[/opt/cloudcrv/varpuppet/run] > debug: /File[/opt/cloudcrv/varpuppet/ssl/certs/puppetsrv.pem]: Autorequiring > File[/opt/cloudcrv/varpuppet/ssl/certs] > debug: /File[/opt/cloudcrv/varpuppet/ssl/private]: Autorequiring > File[/opt/cloudcrv/varpuppet/ssl] > debug: /File[/opt/cloudcrv/varpuppet/rrd]: Autorequiring > File[/opt/cloudcrv/varpuppet] > debug: /File[/opt/cloudcrv/varpuppet/bucket]: Autorequiring > File[/opt/cloudcrv/varpuppet] > debug: /File[/opt/cloudcrv/varpuppet/log]: Autorequiring > File[/opt/cloudcrv/varpuppet] > debug: /File[/opt/cloudcrv/varpuppet/facts]: Autorequiring > File[/opt/cloudcrv/varpuppet] > debug: /File[/opt/cloudcrv/varpuppet/log/masterhttp.log]: Autorequiring > File[/opt/cloudcrv/varpuppet/log] > debug: /File[/opt/cloudcrv/varpuppet/ssl]: Autorequiring > File[/opt/cloudcrv/varpuppet] > debug: /File[/opt/cloudcrv/varpuppet/state]: Autorequiring > File[/opt/cloudcrv/varpuppet] > debug: /File[/opt/cloudcrv/confpuppet/fileserver.conf]: Autorequiring > File[/opt/cloudcrv/confpuppet] > debug: /File[/opt/cloudcrv/varpuppet/ssl/certificate_requests]: > Autorequiring File[/opt/cloudcrv/varpuppet/ssl] > debug: /File[/opt/cloudcrv/confpuppet/auth.conf]: Autorequiring > File[/opt/cloudcrv/confpuppet] > debug: /File[/opt/cloudcrv/confpuppet/manifests]: Autorequiring > File[/opt/cloudcrv/confpuppet] > debug: /File[/opt/cloudcrv/varpuppet/ssl/public_keys/puppetsrv.pem]: > Autorequiring File[/opt/cloudcrv/varpuppet/ssl/public_keys] > debug: /File[/opt/cloudcrv/varpuppet/yaml]: Autorequiring > File[/opt/cloudcrv/varpuppet] > debug: /File[/opt/cloudcrv/varpuppet/reports]: Autorequiring > File[/opt/cloudcrv/varpuppet] > debug: /File[/opt/cloudcrv/varpuppet/ssl/public_keys]: Autorequiring > File[/opt/cloudcrv/varpuppet/ssl] > debug: /File[/opt/cloudcrv/varpuppet/ssl/certs]: Autorequiring > File[/opt/cloudcrv/varpuppet/ssl] > debug: /File[/opt/cloudcrv/varpuppet/ssl/private_keys]: Autorequiring > File[/opt/cloudcrv/varpuppet/ssl] > debug: /File[/opt/cloudcrv/varpuppet/run]: Autorequiring > File[/opt/cloudcrv/varpuppet] > debug: /File[/opt/cloudcrv/varpuppet/ssl/private_keys]: Changing mode > debug: /File[/opt/cloudcrv/varpuppet/ssl/private_keys]: 1 change(s) > debug: /File[/opt/cloudcrv/varpuppet/ssl/private_keys]/mode: mode changed > ''755'' to ''750'' > debug: /File[/opt/cloudcrv/varpuppet/ssl/private]: Changing ensure > debug: /File[/opt/cloudcrv/varpuppet/ssl/private]: 1 change(s) > debug: /File[/opt/cloudcrv/varpuppet/ssl/private]/ensure: created > debug: Finishing transaction 70044884792200 with 2 changes > /usr/lib/ruby/1.8/puppet/ssl/host.rb:157:in `certificate'' > /usr/lib/ruby/1.8/puppet/ssl/host.rb:27:in `init_localhost'' > /usr/lib/ruby/1.8/puppet/util/cacher.rb:106:in `send'' > /usr/lib/ruby/1.8/puppet/util/cacher.rb:106:in `cached_value'' > /usr/lib/ruby/1.8/puppet/util/cacher.rb:46:in `localhost'' > /usr/lib/ruby/1.8/puppet/application/puppetmasterd.rb:93:in `main'' > /usr/lib/ruby/1.8/puppet/application.rb:226:in `send'' > /usr/lib/ruby/1.8/puppet/application.rb:226:in `run_command'' > /usr/lib/ruby/1.8/puppet/application.rb:217:in `run'' > /usr/lib/ruby/1.8/puppet/application.rb:306:in `exit_on_fail'' > /usr/lib/ruby/1.8/puppet/application.rb:217:in `run'' > /usr/sbin/puppetmasterd:66 > Puppet::SSL::Certificate > /usr/lib/ruby/1.8/puppet/ssl/host.rb:173 > ) > (rdb:1) p Certificate.find("puppetsrv") > #<Puppet::SSL::Certificate:0x7f6930ce7d18 @name="puppetsrv", > @content=#<OpenSSL::X509::Certificate > subject=/C=US/ST=CA/L=Berkeley/O=Lawrence Berkeley National > Laboratory/CN=puppetsrv, issuer=/C=US/ST=CA/L=Berkeley/O=Lawrence Berkeley > National Laboratory/CN=ca, serial=1, not_before=Thu Aug 19 18:24:23 UTC > 2010, not_after=Fri Aug 19 18:24:23 UTC 2011>> > (rdb:1) p Certificate.find("ca") > nil > (rdb:1) c > info: Creating a new SSL key for puppetsrv > /usr/lib/ruby/1.8/puppet/ssl/host.rb:157:in `certificate'' > /usr/lib/ruby/1.8/puppet/ssl/host.rb:184:in `generate'' > /usr/lib/ruby/1.8/puppet/ssl/host.rb:27:in `init_localhost'' > /usr/lib/ruby/1.8/puppet/util/cacher.rb:106:in `send'' > /usr/lib/ruby/1.8/puppet/util/cacher.rb:106:in `cached_value'' > /usr/lib/ruby/1.8/puppet/util/cacher.rb:46:in `localhost'' > /usr/lib/ruby/1.8/puppet/application/puppetmasterd.rb:93:in `main'' > /usr/lib/ruby/1.8/puppet/application.rb:226:in `send'' > /usr/lib/ruby/1.8/puppet/application.rb:226:in `run_command'' > /usr/lib/ruby/1.8/puppet/application.rb:217:in `run'' > /usr/lib/ruby/1.8/puppet/application.rb:306:in `exit_on_fail'' > /usr/lib/ruby/1.8/puppet/application.rb:217:in `run'' > /usr/sbin/puppetmasterd:66 > Puppet::SSL::Certificate > /usr/lib/ruby/1.8/puppet/ssl/host.rb:173 > ) > (rdb:1) p Certificate.find("ca") > nil > (rdb:1) p Certificate.find("puppetsrv") > #<Puppet::SSL::Certificate:0x7f6930cdcb20 @name="puppetsrv", > @content=#<OpenSSL::X509::Certificate > subject=/C=US/ST=CA/L=Berkeley/O=Lawrence Berkeley National > Laboratory/CN=puppetsrv, issuer=/C=US/ST=CA/L=Berkeley/O=Lawrence Berkeley > National Laboratory/CN=ca, serial=1, not_before=Thu Aug 19 18:24:23 UTC > 2010, not_after=Fri Aug 19 18:24:23 UTC 2011>> > (rdb:1) p key > #<Puppet::SSL::Key:0x7f6930ce5810 > @password_file="/opt/cloudcrv/varpuppet/ssl/ca.pass", @name="puppetsrv", > @content=-----BEGIN RSA PRIVATE KEY----- > MIICXAIBAAKBgQCo7m5/ZO0vz+CjWnLDIkMQZPHh4Cmj4NhaVSSjo0jGzRrVuM1X > UPm87p4mp/WwRbNxm5dY1qheBHk+/gW4xkJm68jDF2WNY+CvMxstBiTHZ3aGW3zk > tNqiwk/ud4U3MDHDapzArgj1KL3/aTnDF0iBADaCcCYkS/kDxxhMjt5z8QIDAQAB > AoGAaiXH0My+LPjWEk7XJb31neuQAXo1MAAscjZl21zScfiXEAwbGu6KvijBv1By > lNx3ML+vjebzzH/LH8XGGqCZP8TupQHao/G+ZjgbnYFjmnujojjD2WwUAa2i4Jd0 > T7QkJYus16OOcBUlrvpp89qvjSjv9C6/vKBLYPfzbSxzvkECQQDZ9Ly+zdwe8TYu > OkbLgR8XHDrxzuw2Xw0xxoJ/1msAD6xAAJm9igN8K6J6q3FufFq2c9CWQp9SoGyW > EIuuiFSdAkEAxmsNLmV51u/Fd8AEEALlkItxp6iiuuyXXqBcEDhp6by5cikmKoVv > uYQjfWIK6Q5YUP1fYJDeBUHOGc11oZe6ZQJANtc3rqLJohd7VIJhUc85bW0y/6jb > Eos0HLQgHd5rqeZHpwr/pAtX+SRZi5gbwHsVsBbQAx7cS8QFznR3UQEImQJASd9x > eOSvCCcdDgifepaZgcdo+VL/wzhy4vgxTpiyViO9p5NKcmpbvmZEEFqAVWTR3NV4 > vSsyfiKR6WllclRbQQJBALYyByAq9JDCbl0ElYILLvBQwIKjN6/JW4j0W3BjEgF6 > Xo6cP0OCW5dzoV6Hrv+wQR1RcwQf2bFxW0bR06qT4Ec> -----END RSA PRIVATE KEY----- >> > (rdb:1) c > CertificateAuthority.ca > notice: Starting Puppet server version 0.25.4 > /usr/lib/ruby/1.8/puppet/network/http/webrick.rb:101:in `setup_ssl'' > /usr/lib/ruby/1.8/puppet/network/http/webrick.rb:31:in `listen'' > /usr/lib/ruby/1.8/puppet/network/server.rb:131:in `listen'' > /usr/lib/ruby/1.8/puppet/network/server.rb:146:in `start'' > /usr/lib/ruby/1.8/puppet/daemon.rb:128:in `start'' > /usr/lib/ruby/1.8/puppet/application/puppetmasterd.rb:125:in `main'' > /usr/lib/ruby/1.8/puppet/application.rb:226:in `send'' > /usr/lib/ruby/1.8/puppet/application.rb:226:in `run_command'' > /usr/lib/ruby/1.8/puppet/application.rb:217:in `run'' > /usr/lib/ruby/1.8/puppet/application.rb:306:in `exit_on_fail'' > /usr/lib/ruby/1.8/puppet/application.rb:217:in `run'' > /usr/sbin/puppetmasterd:66 > /usr/lib/ruby/1.8/puppet/ssl/host.rb:157:in `certificate'' > /usr/lib/ruby/1.8/puppet/network/http/webrick.rb:102:in `setup_ssl'' > /usr/lib/ruby/1.8/puppet/network/http/webrick.rb:31:in `listen'' > /usr/lib/ruby/1.8/puppet/network/server.rb:131:in `listen'' > /usr/lib/ruby/1.8/puppet/network/server.rb:146:in `start'' > /usr/lib/ruby/1.8/puppet/daemon.rb:128:in `start'' > /usr/lib/ruby/1.8/puppet/application/puppetmasterd.rb:125:in `main'' > /usr/lib/ruby/1.8/puppet/application.rb:226:in `send'' > /usr/lib/ruby/1.8/puppet/application.rb:226:in `run_command'' > /usr/lib/ruby/1.8/puppet/application.rb:217:in `run'' > /usr/lib/ruby/1.8/puppet/application.rb:306:in `exit_on_fail'' > /usr/lib/ruby/1.8/puppet/application.rb:217:in `run'' > /usr/sbin/puppetmasterd:66 > Puppet::SSL::Certificate > /usr/lib/ruby/1.8/puppet/ssl/host.rb:173 > ) > (rdb:1) c > Could not run: Could not retrieve certificate for puppetsrv and not running > on a valid certificate authority > > > -- > You received this message because you are subscribed to the Google Groups > "Puppet Users" group. > To post to this group, send email to puppet-users@googlegroups.com. > To unsubscribe from this group, send email to > puppet-users+unsubscribe@googlegroups.com. > For more options, visit this group at > http://groups.google.com/group/puppet-users?hl=en. >-- You received this message because you are subscribed to the Google Groups "Puppet Users" group. To post to this group, send email to puppet-users@googlegroups.com. To unsubscribe from this group, send email to puppet-users+unsubscribe@googlegroups.com. For more options, visit this group at http://groups.google.com/group/puppet-users?hl=en.
Matthew Black
2011-Mar-05 22:25 UTC
Re: [Puppet Users] External CA: Could not run: Could not retrieve certificate for puppetsrv and not running on a valid certificate authority
That process still works, but you need to have a CA puppet master, a non-CA puppet master, and one client for that to work. The client needs to be told where the CA server is though which in that link tells you how to update the puppet.conf. I use this process and it works great, there was some tweaking needing for it to work for 2.6 On Sat, Mar 5, 2011 at 4:53 PM, Mohamed Lrhazi <lrhazi@gmail.com> wrote:> I just run into the same issue... I was trying to follow this > procedure: http://bodepd.com/wordpress/?p=7 > > My goal is to be able to run my nodes against either of two > puppetmasters.... > > My first master starts fine, but the second dies with this same error: > > Could not run: Could not retrieve certificate for <puppetmaster-fqdn> > and not running on a valid certificate authority > > Is the procedure outdated? Is it supposed to work with puppet 2.6 ? > > Thanks, > Mohamed. > > On Thu, Aug 19, 2010 at 2:38 PM, Yushu Yao <yao.yushu@gmail.com> wrote: > > Hi Experts, > > > > I''m trying to generate my own certificates (all of them, including certs > for > > CA, server and client) for puppet to use. > > > > and I''m getting "Could not run: Could not retrieve certificate for > puppetsrv > > and not running on a valid certificate authority" > > > > Just wondering what the problem could be? > > > > What I did is: > > > > 1. generate a self signed CA cert, and save the files to ca.crt, ca.prk, > > ca.puk, ca.pass. > > 2. generate a keypair, request, then sign with the above CA and save the > > files ssldir/public_keys/puppetsrv.pem, > ssldir/private_keys/puppetsrv.pem, > > ssldir/certificate_requests/puppetsrv.pem, ssldir/certs/puppetsrv.pem > > (All certs work fine with openssl verify) > > 3. Puppet configuration file: > > ca = false > > cakey=$ssldir/ca.prk > > passfile=$ssldir/ca.pass > > cacert=$ssldir/ca.crt > > capub=$ssldir/ca.puk > > 4. run puppet master: > > /usr/sbin/puppetmasterd --no-daemonize --verbose --debug --certname > > puppetsrv > > > > Full log (added some breakpoints and printed some tracebacks): > > debug: Failed to load library ''selinux'' for feature ''selinux'' > > debug: Failed to load library ''ldap'' for feature ''ldap'' > > debug: /File[/opt/cloudcrv/varpuppet/lib]: Autorequiring > > File[/opt/cloudcrv/varpuppet] > > debug: /File[/opt/cloudcrv/confpuppet/puppet.conf]: Autorequiring > > File[/opt/cloudcrv/confpuppet] > > debug: /File[/opt/cloudcrv/varpuppet/run/puppetmasterd.pid]: > Autorequiring > > File[/opt/cloudcrv/varpuppet/run] > > debug: /File[/opt/cloudcrv/varpuppet/ssl/certs/puppetsrv.pem]: > Autorequiring > > File[/opt/cloudcrv/varpuppet/ssl/certs] > > debug: /File[/opt/cloudcrv/varpuppet/ssl/private]: Autorequiring > > File[/opt/cloudcrv/varpuppet/ssl] > > debug: /File[/opt/cloudcrv/varpuppet/rrd]: Autorequiring > > File[/opt/cloudcrv/varpuppet] > > debug: /File[/opt/cloudcrv/varpuppet/bucket]: Autorequiring > > File[/opt/cloudcrv/varpuppet] > > debug: /File[/opt/cloudcrv/varpuppet/log]: Autorequiring > > File[/opt/cloudcrv/varpuppet] > > debug: /File[/opt/cloudcrv/varpuppet/facts]: Autorequiring > > File[/opt/cloudcrv/varpuppet] > > debug: /File[/opt/cloudcrv/varpuppet/log/masterhttp.log]: Autorequiring > > File[/opt/cloudcrv/varpuppet/log] > > debug: /File[/opt/cloudcrv/varpuppet/ssl]: Autorequiring > > File[/opt/cloudcrv/varpuppet] > > debug: /File[/opt/cloudcrv/varpuppet/state]: Autorequiring > > File[/opt/cloudcrv/varpuppet] > > debug: /File[/opt/cloudcrv/confpuppet/fileserver.conf]: Autorequiring > > File[/opt/cloudcrv/confpuppet] > > debug: /File[/opt/cloudcrv/varpuppet/ssl/certificate_requests]: > > Autorequiring File[/opt/cloudcrv/varpuppet/ssl] > > debug: /File[/opt/cloudcrv/confpuppet/auth.conf]: Autorequiring > > File[/opt/cloudcrv/confpuppet] > > debug: /File[/opt/cloudcrv/confpuppet/manifests]: Autorequiring > > File[/opt/cloudcrv/confpuppet] > > debug: /File[/opt/cloudcrv/varpuppet/ssl/public_keys/puppetsrv.pem]: > > Autorequiring File[/opt/cloudcrv/varpuppet/ssl/public_keys] > > debug: /File[/opt/cloudcrv/varpuppet/yaml]: Autorequiring > > File[/opt/cloudcrv/varpuppet] > > debug: /File[/opt/cloudcrv/varpuppet/reports]: Autorequiring > > File[/opt/cloudcrv/varpuppet] > > debug: /File[/opt/cloudcrv/varpuppet/ssl/public_keys]: Autorequiring > > File[/opt/cloudcrv/varpuppet/ssl] > > debug: /File[/opt/cloudcrv/varpuppet/ssl/certs]: Autorequiring > > File[/opt/cloudcrv/varpuppet/ssl] > > debug: /File[/opt/cloudcrv/varpuppet/ssl/private_keys]: Autorequiring > > File[/opt/cloudcrv/varpuppet/ssl] > > debug: /File[/opt/cloudcrv/varpuppet/run]: Autorequiring > > File[/opt/cloudcrv/varpuppet] > > debug: /File[/opt/cloudcrv/varpuppet/ssl/private_keys]: Changing mode > > debug: /File[/opt/cloudcrv/varpuppet/ssl/private_keys]: 1 change(s) > > debug: /File[/opt/cloudcrv/varpuppet/ssl/private_keys]/mode: mode changed > > ''755'' to ''750'' > > debug: /File[/opt/cloudcrv/varpuppet/ssl/private]: Changing ensure > > debug: /File[/opt/cloudcrv/varpuppet/ssl/private]: 1 change(s) > > debug: /File[/opt/cloudcrv/varpuppet/ssl/private]/ensure: created > > debug: Finishing transaction 70044884792200 with 2 changes > > /usr/lib/ruby/1.8/puppet/ssl/host.rb:157:in `certificate'' > > /usr/lib/ruby/1.8/puppet/ssl/host.rb:27:in `init_localhost'' > > /usr/lib/ruby/1.8/puppet/util/cacher.rb:106:in `send'' > > /usr/lib/ruby/1.8/puppet/util/cacher.rb:106:in `cached_value'' > > /usr/lib/ruby/1.8/puppet/util/cacher.rb:46:in `localhost'' > > /usr/lib/ruby/1.8/puppet/application/puppetmasterd.rb:93:in `main'' > > /usr/lib/ruby/1.8/puppet/application.rb:226:in `send'' > > /usr/lib/ruby/1.8/puppet/application.rb:226:in `run_command'' > > /usr/lib/ruby/1.8/puppet/application.rb:217:in `run'' > > /usr/lib/ruby/1.8/puppet/application.rb:306:in `exit_on_fail'' > > /usr/lib/ruby/1.8/puppet/application.rb:217:in `run'' > > /usr/sbin/puppetmasterd:66 > > Puppet::SSL::Certificate > > /usr/lib/ruby/1.8/puppet/ssl/host.rb:173 > > ) > > (rdb:1) p Certificate.find("puppetsrv") > > #<Puppet::SSL::Certificate:0x7f6930ce7d18 @name="puppetsrv", > > @content=#<OpenSSL::X509::Certificate > > subject=/C=US/ST=CA/L=Berkeley/O=Lawrence Berkeley National > > Laboratory/CN=puppetsrv, issuer=/C=US/ST=CA/L=Berkeley/O=Lawrence > Berkeley > > National Laboratory/CN=ca, serial=1, not_before=Thu Aug 19 18:24:23 UTC > > 2010, not_after=Fri Aug 19 18:24:23 UTC 2011>> > > (rdb:1) p Certificate.find("ca") > > nil > > (rdb:1) c > > info: Creating a new SSL key for puppetsrv > > /usr/lib/ruby/1.8/puppet/ssl/host.rb:157:in `certificate'' > > /usr/lib/ruby/1.8/puppet/ssl/host.rb:184:in `generate'' > > /usr/lib/ruby/1.8/puppet/ssl/host.rb:27:in `init_localhost'' > > /usr/lib/ruby/1.8/puppet/util/cacher.rb:106:in `send'' > > /usr/lib/ruby/1.8/puppet/util/cacher.rb:106:in `cached_value'' > > /usr/lib/ruby/1.8/puppet/util/cacher.rb:46:in `localhost'' > > /usr/lib/ruby/1.8/puppet/application/puppetmasterd.rb:93:in `main'' > > /usr/lib/ruby/1.8/puppet/application.rb:226:in `send'' > > /usr/lib/ruby/1.8/puppet/application.rb:226:in `run_command'' > > /usr/lib/ruby/1.8/puppet/application.rb:217:in `run'' > > /usr/lib/ruby/1.8/puppet/application.rb:306:in `exit_on_fail'' > > /usr/lib/ruby/1.8/puppet/application.rb:217:in `run'' > > /usr/sbin/puppetmasterd:66 > > Puppet::SSL::Certificate > > /usr/lib/ruby/1.8/puppet/ssl/host.rb:173 > > ) > > (rdb:1) p Certificate.find("ca") > > nil > > (rdb:1) p Certificate.find("puppetsrv") > > #<Puppet::SSL::Certificate:0x7f6930cdcb20 @name="puppetsrv", > > @content=#<OpenSSL::X509::Certificate > > subject=/C=US/ST=CA/L=Berkeley/O=Lawrence Berkeley National > > Laboratory/CN=puppetsrv, issuer=/C=US/ST=CA/L=Berkeley/O=Lawrence > Berkeley > > National Laboratory/CN=ca, serial=1, not_before=Thu Aug 19 18:24:23 UTC > > 2010, not_after=Fri Aug 19 18:24:23 UTC 2011>> > > (rdb:1) p key > > #<Puppet::SSL::Key:0x7f6930ce5810 > > @password_file="/opt/cloudcrv/varpuppet/ssl/ca.pass", @name="puppetsrv", > > @content=-----BEGIN RSA PRIVATE KEY----- > > MIICXAIBAAKBgQCo7m5/ZO0vz+CjWnLDIkMQZPHh4Cmj4NhaVSSjo0jGzRrVuM1X > > UPm87p4mp/WwRbNxm5dY1qheBHk+/gW4xkJm68jDF2WNY+CvMxstBiTHZ3aGW3zk > > tNqiwk/ud4U3MDHDapzArgj1KL3/aTnDF0iBADaCcCYkS/kDxxhMjt5z8QIDAQAB > > AoGAaiXH0My+LPjWEk7XJb31neuQAXo1MAAscjZl21zScfiXEAwbGu6KvijBv1By > > lNx3ML+vjebzzH/LH8XGGqCZP8TupQHao/G+ZjgbnYFjmnujojjD2WwUAa2i4Jd0 > > T7QkJYus16OOcBUlrvpp89qvjSjv9C6/vKBLYPfzbSxzvkECQQDZ9Ly+zdwe8TYu > > OkbLgR8XHDrxzuw2Xw0xxoJ/1msAD6xAAJm9igN8K6J6q3FufFq2c9CWQp9SoGyW > > EIuuiFSdAkEAxmsNLmV51u/Fd8AEEALlkItxp6iiuuyXXqBcEDhp6by5cikmKoVv > > uYQjfWIK6Q5YUP1fYJDeBUHOGc11oZe6ZQJANtc3rqLJohd7VIJhUc85bW0y/6jb > > Eos0HLQgHd5rqeZHpwr/pAtX+SRZi5gbwHsVsBbQAx7cS8QFznR3UQEImQJASd9x > > eOSvCCcdDgifepaZgcdo+VL/wzhy4vgxTpiyViO9p5NKcmpbvmZEEFqAVWTR3NV4 > > vSsyfiKR6WllclRbQQJBALYyByAq9JDCbl0ElYILLvBQwIKjN6/JW4j0W3BjEgF6 > > Xo6cP0OCW5dzoV6Hrv+wQR1RcwQf2bFxW0bR06qT4Ec> > -----END RSA PRIVATE KEY----- > >> > > (rdb:1) c > > CertificateAuthority.ca > > notice: Starting Puppet server version 0.25.4 > > /usr/lib/ruby/1.8/puppet/network/http/webrick.rb:101:in `setup_ssl'' > > /usr/lib/ruby/1.8/puppet/network/http/webrick.rb:31:in `listen'' > > /usr/lib/ruby/1.8/puppet/network/server.rb:131:in `listen'' > > /usr/lib/ruby/1.8/puppet/network/server.rb:146:in `start'' > > /usr/lib/ruby/1.8/puppet/daemon.rb:128:in `start'' > > /usr/lib/ruby/1.8/puppet/application/puppetmasterd.rb:125:in `main'' > > /usr/lib/ruby/1.8/puppet/application.rb:226:in `send'' > > /usr/lib/ruby/1.8/puppet/application.rb:226:in `run_command'' > > /usr/lib/ruby/1.8/puppet/application.rb:217:in `run'' > > /usr/lib/ruby/1.8/puppet/application.rb:306:in `exit_on_fail'' > > /usr/lib/ruby/1.8/puppet/application.rb:217:in `run'' > > /usr/sbin/puppetmasterd:66 > > /usr/lib/ruby/1.8/puppet/ssl/host.rb:157:in `certificate'' > > /usr/lib/ruby/1.8/puppet/network/http/webrick.rb:102:in `setup_ssl'' > > /usr/lib/ruby/1.8/puppet/network/http/webrick.rb:31:in `listen'' > > /usr/lib/ruby/1.8/puppet/network/server.rb:131:in `listen'' > > /usr/lib/ruby/1.8/puppet/network/server.rb:146:in `start'' > > /usr/lib/ruby/1.8/puppet/daemon.rb:128:in `start'' > > /usr/lib/ruby/1.8/puppet/application/puppetmasterd.rb:125:in `main'' > > /usr/lib/ruby/1.8/puppet/application.rb:226:in `send'' > > /usr/lib/ruby/1.8/puppet/application.rb:226:in `run_command'' > > /usr/lib/ruby/1.8/puppet/application.rb:217:in `run'' > > /usr/lib/ruby/1.8/puppet/application.rb:306:in `exit_on_fail'' > > /usr/lib/ruby/1.8/puppet/application.rb:217:in `run'' > > /usr/sbin/puppetmasterd:66 > > Puppet::SSL::Certificate > > /usr/lib/ruby/1.8/puppet/ssl/host.rb:173 > > ) > > (rdb:1) c > > Could not run: Could not retrieve certificate for puppetsrv and not > running > > on a valid certificate authority > > > > > > -- > > You received this message because you are subscribed to the Google Groups > > "Puppet Users" group. > > To post to this group, send email to puppet-users@googlegroups.com. > > To unsubscribe from this group, send email to > > puppet-users+unsubscribe@googlegroups.com. > > For more options, visit this group at > > http://groups.google.com/group/puppet-users?hl=en. > > > > -- > You received this message because you are subscribed to the Google Groups > "Puppet Users" group. > To post to this group, send email to puppet-users@googlegroups.com. > To unsubscribe from this group, send email to > puppet-users+unsubscribe@googlegroups.com. > For more options, visit this group at > http://groups.google.com/group/puppet-users?hl=en. > >-- You received this message because you are subscribed to the Google Groups "Puppet Users" group. To post to this group, send email to puppet-users@googlegroups.com. To unsubscribe from this group, send email to puppet-users+unsubscribe@googlegroups.com. For more options, visit this group at http://groups.google.com/group/puppet-users?hl=en.
Mohamed Lrhazi
2011-Mar-05 23:06 UTC
Re: [Puppet Users] External CA: Could not run: Could not retrieve certificate for puppetsrv and not running on a valid certificate authority
I guess it''s the tweaks fo 2.6" that I must be missing... Here is my process: On puppetmaster1: sudo rm -rf /etc/puppet/ssl /var/lib/puppet/ssl sudo puppet cert --generate --certdnsnames puppet.uis.example.com:puppet.example.com:puppet puppet-prod.uis.example.com sudo puppet cert --generate --certdnsnames puppet-test.uis.example.com:puppet-test.example.com:puppet-test pirates.uis.example.com Note: these last two commands seem to work, even though they also print an error: The first command for example prints this: notice: Signed certificate request for ca notice: Rebuilding inventory file notice: puppet-prod.uis.example.com has a waiting certificate request notice: Signed certificate request for puppet-prod.uis.example.com notice: Removing file Puppet::SSL::CertificateRequest puppet-prod.uis.example.com at ''/var/lib/puppet/ssl/ca/requests/puppet-prod.uis.example.com.pem'' notice: Removing file Puppet::SSL::CertificateRequest puppet-prod.uis.example.com at ''/var/lib/puppet/ssl/certificate_requests/puppet-prod.uis.example.com.pem'' err: Could not call generate: Could not find certificate request for puppet-prod.uis.example.com Why is that? anyways, continuing, I edit puppet.conf to add: [master] certname=puppet-prod.uis.example.com ca=true Now starting puppet master seems to work fine, no errors. Now, on puppetmaster2: sudo rm -rf /etc/puppet/ssl /var/lib/puppet/ssl copy these thre files from puppetmaster1, to puppetmaster2 /var/lib/puppet/ssl/private_keys/pirates.uis.example.com.pem /var/lib/puppet/ssl/ca/signed/pirates.uis.example.com.pem /var/lib/puppet/ssl/ca/ca_crt.pem I put the certs in /var/lib/puppet/ssl/certs and the key in /var/lib/puppet/ssl/private_keys Edit puppet.conf to have: [master] certname=pirates.uis.example.com ca=false ca_server=puppet-prod.uis.example.com Now starting the puppet master fails with error: Could not run: Could not retrieve certificate for pirates.uis.example.com and not running on a valid certificate authority What am I doing wrong? Thanks, Mohamed. On Sat, Mar 5, 2011 at 5:25 PM, Matthew Black <mjblack@gmail.com> wrote:> That process still works, but you need to have a CA puppet master, a non-CA > puppet master, and one client for that to work. The client needs to be told > where the CA server is though which in that link tells you how to update the > puppet.conf. > I use this process and it works great, there was some tweaking needing for > it to work for 2.6 > > > > > On Sat, Mar 5, 2011 at 4:53 PM, Mohamed Lrhazi <lrhazi@gmail.com> wrote: >> >> I just run into the same issue... I was trying to follow this >> procedure: http://bodepd.com/wordpress/?p=7 >> >> My goal is to be able to run my nodes against either of two >> puppetmasters.... >> >> My first master starts fine, but the second dies with this same error: >> >> Could not run: Could not retrieve certificate for <puppetmaster-fqdn> >> and not running on a valid certificate authority >> >> Is the procedure outdated? Is it supposed to work with puppet 2.6 ? >> >> Thanks, >> Mohamed. >> >> On Thu, Aug 19, 2010 at 2:38 PM, Yushu Yao <yao.yushu@gmail.com> wrote: >> > Hi Experts, >> > >> > I''m trying to generate my own certificates (all of them, including certs >> > for >> > CA, server and client) for puppet to use. >> > >> > and I''m getting "Could not run: Could not retrieve certificate for >> > puppetsrv >> > and not running on a valid certificate authority" >> > >> > Just wondering what the problem could be? >> > >> > What I did is: >> > >> > 1. generate a self signed CA cert, and save the files to ca.crt, ca.prk, >> > ca.puk, ca.pass. >> > 2. generate a keypair, request, then sign with the above CA and save the >> > files ssldir/public_keys/puppetsrv.pem, >> > ssldir/private_keys/puppetsrv.pem, >> > ssldir/certificate_requests/puppetsrv.pem, ssldir/certs/puppetsrv.pem >> > (All certs work fine with openssl verify) >> > 3. Puppet configuration file: >> > ca = false >> > cakey=$ssldir/ca.prk >> > passfile=$ssldir/ca.pass >> > cacert=$ssldir/ca.crt >> > capub=$ssldir/ca.puk >> > 4. run puppet master: >> > /usr/sbin/puppetmasterd --no-daemonize --verbose --debug --certname >> > puppetsrv >> > >> > Full log (added some breakpoints and printed some tracebacks): >> > debug: Failed to load library ''selinux'' for feature ''selinux'' >> > debug: Failed to load library ''ldap'' for feature ''ldap'' >> > debug: /File[/opt/cloudcrv/varpuppet/lib]: Autorequiring >> > File[/opt/cloudcrv/varpuppet] >> > debug: /File[/opt/cloudcrv/confpuppet/puppet.conf]: Autorequiring >> > File[/opt/cloudcrv/confpuppet] >> > debug: /File[/opt/cloudcrv/varpuppet/run/puppetmasterd.pid]: >> > Autorequiring >> > File[/opt/cloudcrv/varpuppet/run] >> > debug: /File[/opt/cloudcrv/varpuppet/ssl/certs/puppetsrv.pem]: >> > Autorequiring >> > File[/opt/cloudcrv/varpuppet/ssl/certs] >> > debug: /File[/opt/cloudcrv/varpuppet/ssl/private]: Autorequiring >> > File[/opt/cloudcrv/varpuppet/ssl] >> > debug: /File[/opt/cloudcrv/varpuppet/rrd]: Autorequiring >> > File[/opt/cloudcrv/varpuppet] >> > debug: /File[/opt/cloudcrv/varpuppet/bucket]: Autorequiring >> > File[/opt/cloudcrv/varpuppet] >> > debug: /File[/opt/cloudcrv/varpuppet/log]: Autorequiring >> > File[/opt/cloudcrv/varpuppet] >> > debug: /File[/opt/cloudcrv/varpuppet/facts]: Autorequiring >> > File[/opt/cloudcrv/varpuppet] >> > debug: /File[/opt/cloudcrv/varpuppet/log/masterhttp.log]: Autorequiring >> > File[/opt/cloudcrv/varpuppet/log] >> > debug: /File[/opt/cloudcrv/varpuppet/ssl]: Autorequiring >> > File[/opt/cloudcrv/varpuppet] >> > debug: /File[/opt/cloudcrv/varpuppet/state]: Autorequiring >> > File[/opt/cloudcrv/varpuppet] >> > debug: /File[/opt/cloudcrv/confpuppet/fileserver.conf]: Autorequiring >> > File[/opt/cloudcrv/confpuppet] >> > debug: /File[/opt/cloudcrv/varpuppet/ssl/certificate_requests]: >> > Autorequiring File[/opt/cloudcrv/varpuppet/ssl] >> > debug: /File[/opt/cloudcrv/confpuppet/auth.conf]: Autorequiring >> > File[/opt/cloudcrv/confpuppet] >> > debug: /File[/opt/cloudcrv/confpuppet/manifests]: Autorequiring >> > File[/opt/cloudcrv/confpuppet] >> > debug: /File[/opt/cloudcrv/varpuppet/ssl/public_keys/puppetsrv.pem]: >> > Autorequiring File[/opt/cloudcrv/varpuppet/ssl/public_keys] >> > debug: /File[/opt/cloudcrv/varpuppet/yaml]: Autorequiring >> > File[/opt/cloudcrv/varpuppet] >> > debug: /File[/opt/cloudcrv/varpuppet/reports]: Autorequiring >> > File[/opt/cloudcrv/varpuppet] >> > debug: /File[/opt/cloudcrv/varpuppet/ssl/public_keys]: Autorequiring >> > File[/opt/cloudcrv/varpuppet/ssl] >> > debug: /File[/opt/cloudcrv/varpuppet/ssl/certs]: Autorequiring >> > File[/opt/cloudcrv/varpuppet/ssl] >> > debug: /File[/opt/cloudcrv/varpuppet/ssl/private_keys]: Autorequiring >> > File[/opt/cloudcrv/varpuppet/ssl] >> > debug: /File[/opt/cloudcrv/varpuppet/run]: Autorequiring >> > File[/opt/cloudcrv/varpuppet] >> > debug: /File[/opt/cloudcrv/varpuppet/ssl/private_keys]: Changing mode >> > debug: /File[/opt/cloudcrv/varpuppet/ssl/private_keys]: 1 change(s) >> > debug: /File[/opt/cloudcrv/varpuppet/ssl/private_keys]/mode: mode >> > changed >> > ''755'' to ''750'' >> > debug: /File[/opt/cloudcrv/varpuppet/ssl/private]: Changing ensure >> > debug: /File[/opt/cloudcrv/varpuppet/ssl/private]: 1 change(s) >> > debug: /File[/opt/cloudcrv/varpuppet/ssl/private]/ensure: created >> > debug: Finishing transaction 70044884792200 with 2 changes >> > /usr/lib/ruby/1.8/puppet/ssl/host.rb:157:in `certificate'' >> > /usr/lib/ruby/1.8/puppet/ssl/host.rb:27:in `init_localhost'' >> > /usr/lib/ruby/1.8/puppet/util/cacher.rb:106:in `send'' >> > /usr/lib/ruby/1.8/puppet/util/cacher.rb:106:in `cached_value'' >> > /usr/lib/ruby/1.8/puppet/util/cacher.rb:46:in `localhost'' >> > /usr/lib/ruby/1.8/puppet/application/puppetmasterd.rb:93:in `main'' >> > /usr/lib/ruby/1.8/puppet/application.rb:226:in `send'' >> > /usr/lib/ruby/1.8/puppet/application.rb:226:in `run_command'' >> > /usr/lib/ruby/1.8/puppet/application.rb:217:in `run'' >> > /usr/lib/ruby/1.8/puppet/application.rb:306:in `exit_on_fail'' >> > /usr/lib/ruby/1.8/puppet/application.rb:217:in `run'' >> > /usr/sbin/puppetmasterd:66 >> > Puppet::SSL::Certificate >> > /usr/lib/ruby/1.8/puppet/ssl/host.rb:173 >> > ) >> > (rdb:1) p Certificate.find("puppetsrv") >> > #<Puppet::SSL::Certificate:0x7f6930ce7d18 @name="puppetsrv", >> > @content=#<OpenSSL::X509::Certificate >> > subject=/C=US/ST=CA/L=Berkeley/O=Lawrence Berkeley National >> > Laboratory/CN=puppetsrv, issuer=/C=US/ST=CA/L=Berkeley/O=Lawrence >> > Berkeley >> > National Laboratory/CN=ca, serial=1, not_before=Thu Aug 19 18:24:23 UTC >> > 2010, not_after=Fri Aug 19 18:24:23 UTC 2011>> >> > (rdb:1) p Certificate.find("ca") >> > nil >> > (rdb:1) c >> > info: Creating a new SSL key for puppetsrv >> > /usr/lib/ruby/1.8/puppet/ssl/host.rb:157:in `certificate'' >> > /usr/lib/ruby/1.8/puppet/ssl/host.rb:184:in `generate'' >> > /usr/lib/ruby/1.8/puppet/ssl/host.rb:27:in `init_localhost'' >> > /usr/lib/ruby/1.8/puppet/util/cacher.rb:106:in `send'' >> > /usr/lib/ruby/1.8/puppet/util/cacher.rb:106:in `cached_value'' >> > /usr/lib/ruby/1.8/puppet/util/cacher.rb:46:in `localhost'' >> > /usr/lib/ruby/1.8/puppet/application/puppetmasterd.rb:93:in `main'' >> > /usr/lib/ruby/1.8/puppet/application.rb:226:in `send'' >> > /usr/lib/ruby/1.8/puppet/application.rb:226:in `run_command'' >> > /usr/lib/ruby/1.8/puppet/application.rb:217:in `run'' >> > /usr/lib/ruby/1.8/puppet/application.rb:306:in `exit_on_fail'' >> > /usr/lib/ruby/1.8/puppet/application.rb:217:in `run'' >> > /usr/sbin/puppetmasterd:66 >> > Puppet::SSL::Certificate >> > /usr/lib/ruby/1.8/puppet/ssl/host.rb:173 >> > ) >> > (rdb:1) p Certificate.find("ca") >> > nil >> > (rdb:1) p Certificate.find("puppetsrv") >> > #<Puppet::SSL::Certificate:0x7f6930cdcb20 @name="puppetsrv", >> > @content=#<OpenSSL::X509::Certificate >> > subject=/C=US/ST=CA/L=Berkeley/O=Lawrence Berkeley National >> > Laboratory/CN=puppetsrv, issuer=/C=US/ST=CA/L=Berkeley/O=Lawrence >> > Berkeley >> > National Laboratory/CN=ca, serial=1, not_before=Thu Aug 19 18:24:23 UTC >> > 2010, not_after=Fri Aug 19 18:24:23 UTC 2011>> >> > (rdb:1) p key >> > #<Puppet::SSL::Key:0x7f6930ce5810 >> > @password_file="/opt/cloudcrv/varpuppet/ssl/ca.pass", @name="puppetsrv", >> > @content=-----BEGIN RSA PRIVATE KEY----- >> > MIICXAIBAAKBgQCo7m5/ZO0vz+CjWnLDIkMQZPHh4Cmj4NhaVSSjo0jGzRrVuM1X >> > UPm87p4mp/WwRbNxm5dY1qheBHk+/gW4xkJm68jDF2WNY+CvMxstBiTHZ3aGW3zk >> > tNqiwk/ud4U3MDHDapzArgj1KL3/aTnDF0iBADaCcCYkS/kDxxhMjt5z8QIDAQAB >> > AoGAaiXH0My+LPjWEk7XJb31neuQAXo1MAAscjZl21zScfiXEAwbGu6KvijBv1By >> > lNx3ML+vjebzzH/LH8XGGqCZP8TupQHao/G+ZjgbnYFjmnujojjD2WwUAa2i4Jd0 >> > T7QkJYus16OOcBUlrvpp89qvjSjv9C6/vKBLYPfzbSxzvkECQQDZ9Ly+zdwe8TYu >> > OkbLgR8XHDrxzuw2Xw0xxoJ/1msAD6xAAJm9igN8K6J6q3FufFq2c9CWQp9SoGyW >> > EIuuiFSdAkEAxmsNLmV51u/Fd8AEEALlkItxp6iiuuyXXqBcEDhp6by5cikmKoVv >> > uYQjfWIK6Q5YUP1fYJDeBUHOGc11oZe6ZQJANtc3rqLJohd7VIJhUc85bW0y/6jb >> > Eos0HLQgHd5rqeZHpwr/pAtX+SRZi5gbwHsVsBbQAx7cS8QFznR3UQEImQJASd9x >> > eOSvCCcdDgifepaZgcdo+VL/wzhy4vgxTpiyViO9p5NKcmpbvmZEEFqAVWTR3NV4 >> > vSsyfiKR6WllclRbQQJBALYyByAq9JDCbl0ElYILLvBQwIKjN6/JW4j0W3BjEgF6 >> > Xo6cP0OCW5dzoV6Hrv+wQR1RcwQf2bFxW0bR06qT4Ec>> > -----END RSA PRIVATE KEY----- >> >> >> > (rdb:1) c >> > CertificateAuthority.ca >> > notice: Starting Puppet server version 0.25.4 >> > /usr/lib/ruby/1.8/puppet/network/http/webrick.rb:101:in `setup_ssl'' >> > /usr/lib/ruby/1.8/puppet/network/http/webrick.rb:31:in `listen'' >> > /usr/lib/ruby/1.8/puppet/network/server.rb:131:in `listen'' >> > /usr/lib/ruby/1.8/puppet/network/server.rb:146:in `start'' >> > /usr/lib/ruby/1.8/puppet/daemon.rb:128:in `start'' >> > /usr/lib/ruby/1.8/puppet/application/puppetmasterd.rb:125:in `main'' >> > /usr/lib/ruby/1.8/puppet/application.rb:226:in `send'' >> > /usr/lib/ruby/1.8/puppet/application.rb:226:in `run_command'' >> > /usr/lib/ruby/1.8/puppet/application.rb:217:in `run'' >> > /usr/lib/ruby/1.8/puppet/application.rb:306:in `exit_on_fail'' >> > /usr/lib/ruby/1.8/puppet/application.rb:217:in `run'' >> > /usr/sbin/puppetmasterd:66 >> > /usr/lib/ruby/1.8/puppet/ssl/host.rb:157:in `certificate'' >> > /usr/lib/ruby/1.8/puppet/network/http/webrick.rb:102:in `setup_ssl'' >> > /usr/lib/ruby/1.8/puppet/network/http/webrick.rb:31:in `listen'' >> > /usr/lib/ruby/1.8/puppet/network/server.rb:131:in `listen'' >> > /usr/lib/ruby/1.8/puppet/network/server.rb:146:in `start'' >> > /usr/lib/ruby/1.8/puppet/daemon.rb:128:in `start'' >> > /usr/lib/ruby/1.8/puppet/application/puppetmasterd.rb:125:in `main'' >> > /usr/lib/ruby/1.8/puppet/application.rb:226:in `send'' >> > /usr/lib/ruby/1.8/puppet/application.rb:226:in `run_command'' >> > /usr/lib/ruby/1.8/puppet/application.rb:217:in `run'' >> > /usr/lib/ruby/1.8/puppet/application.rb:306:in `exit_on_fail'' >> > /usr/lib/ruby/1.8/puppet/application.rb:217:in `run'' >> > /usr/sbin/puppetmasterd:66 >> > Puppet::SSL::Certificate >> > /usr/lib/ruby/1.8/puppet/ssl/host.rb:173 >> > ) >> > (rdb:1) c >> > Could not run: Could not retrieve certificate for puppetsrv and not >> > running >> > on a valid certificate authority >> > >> > >> > -- >> > You received this message because you are subscribed to the Google >> > Groups >> > "Puppet Users" group. >> > To post to this group, send email to puppet-users@googlegroups.com. >> > To unsubscribe from this group, send email to >> > puppet-users+unsubscribe@googlegroups.com. >> > For more options, visit this group at >> > http://groups.google.com/group/puppet-users?hl=en. >> > >> >> -- >> You received this message because you are subscribed to the Google Groups >> "Puppet Users" group. >> To post to this group, send email to puppet-users@googlegroups.com. >> To unsubscribe from this group, send email to >> puppet-users+unsubscribe@googlegroups.com. >> For more options, visit this group at >> http://groups.google.com/group/puppet-users?hl=en. >> > > -- > You received this message because you are subscribed to the Google Groups > "Puppet Users" group. > To post to this group, send email to puppet-users@googlegroups.com. > To unsubscribe from this group, send email to > puppet-users+unsubscribe@googlegroups.com. > For more options, visit this group at > http://groups.google.com/group/puppet-users?hl=en. >-- You received this message because you are subscribed to the Google Groups "Puppet Users" group. To post to this group, send email to puppet-users@googlegroups.com. To unsubscribe from this group, send email to puppet-users+unsubscribe@googlegroups.com. For more options, visit this group at http://groups.google.com/group/puppet-users?hl=en.
Matthew Black
2011-Mar-05 23:58 UTC
Re: [Puppet Users] External CA: Could not run: Could not retrieve certificate for puppetsrv and not running on a valid certificate authority
I had to add this to my puppet conf files for the master section. ssl_client_header = SSL_CLIENT_S_DN ssl_client_verify_header = SSL_CLIENT_VERIFY The one error you see from generating the cert is fine because its trying to delete the non-existent CSR, which is because you generated. On Sat, Mar 5, 2011 at 6:06 PM, Mohamed Lrhazi <lrhazi@gmail.com> wrote:> I guess it''s the tweaks fo 2.6" that I must be missing... > Here is my process: > > On puppetmaster1: > > sudo rm -rf /etc/puppet/ssl /var/lib/puppet/ssl > sudo puppet cert --generate --certdnsnames > puppet.uis.example.com:puppet.example.com:puppet > puppet-prod.uis.example.com > sudo puppet cert --generate --certdnsnames > puppet-test.uis.example.com:puppet-test.example.com:puppet-test > pirates.uis.example.com > > Note: these last two commands seem to work, even though they also > print an error: > > The first command for example prints this: > notice: Signed certificate request for ca > notice: Rebuilding inventory file > notice: puppet-prod.uis.example.com has a waiting certificate request > notice: Signed certificate request for puppet-prod.uis.example.com > notice: Removing file Puppet::SSL::CertificateRequest > puppet-prod.uis.example.com at > ''/var/lib/puppet/ssl/ca/requests/puppet-prod.uis.example.com.pem'' > notice: Removing file Puppet::SSL::CertificateRequest > puppet-prod.uis.example.com at > ''/var/lib/puppet/ssl/certificate_requests/puppet-prod.uis.example.com.pem'' > err: Could not call generate: Could not find certificate request for > puppet-prod.uis.example.com > > Why is that? > > anyways, continuing, I edit puppet.conf to add: > > [master] > certname=puppet-prod.uis.example.com > ca=true > > Now starting puppet master seems to work fine, no errors. > > Now, on puppetmaster2: > > sudo rm -rf /etc/puppet/ssl /var/lib/puppet/ssl > > copy these thre files from puppetmaster1, to puppetmaster2 > > /var/lib/puppet/ssl/private_keys/pirates.uis.example.com.pem > /var/lib/puppet/ssl/ca/signed/pirates.uis.example.com.pem > /var/lib/puppet/ssl/ca/ca_crt.pem > > I put the certs in /var/lib/puppet/ssl/certs and the key in > /var/lib/puppet/ssl/private_keys > > Edit puppet.conf to have: > [master] > certname=pirates.uis.example.com > ca=false > ca_server=puppet-prod.uis.example.com > > > Now starting the puppet master fails with error: > > Could not run: Could not retrieve certificate for > pirates.uis.example.com and not running on a valid certificate > authority > > What am I doing wrong? > > Thanks, > Mohamed. > > > > On Sat, Mar 5, 2011 at 5:25 PM, Matthew Black <mjblack@gmail.com> wrote: > > That process still works, but you need to have a CA puppet master, a > non-CA > > puppet master, and one client for that to work. The client needs to be > told > > where the CA server is though which in that link tells you how to update > the > > puppet.conf. > > I use this process and it works great, there was some tweaking needing > for > > it to work for 2.6 > > > > > > > > > > On Sat, Mar 5, 2011 at 4:53 PM, Mohamed Lrhazi <lrhazi@gmail.com> wrote: > >> > >> I just run into the same issue... I was trying to follow this > >> procedure: http://bodepd.com/wordpress/?p=7 > >> > >> My goal is to be able to run my nodes against either of two > >> puppetmasters.... > >> > >> My first master starts fine, but the second dies with this same error: > >> > >> Could not run: Could not retrieve certificate for <puppetmaster-fqdn> > >> and not running on a valid certificate authority > >> > >> Is the procedure outdated? Is it supposed to work with puppet 2.6 ? > >> > >> Thanks, > >> Mohamed. > >> > >> On Thu, Aug 19, 2010 at 2:38 PM, Yushu Yao <yao.yushu@gmail.com> wrote: > >> > Hi Experts, > >> > > >> > I''m trying to generate my own certificates (all of them, including > certs > >> > for > >> > CA, server and client) for puppet to use. > >> > > >> > and I''m getting "Could not run: Could not retrieve certificate for > >> > puppetsrv > >> > and not running on a valid certificate authority" > >> > > >> > Just wondering what the problem could be? > >> > > >> > What I did is: > >> > > >> > 1. generate a self signed CA cert, and save the files to ca.crt, > ca.prk, > >> > ca.puk, ca.pass. > >> > 2. generate a keypair, request, then sign with the above CA and save > the > >> > files ssldir/public_keys/puppetsrv.pem, > >> > ssldir/private_keys/puppetsrv.pem, > >> > ssldir/certificate_requests/puppetsrv.pem, ssldir/certs/puppetsrv.pem > >> > (All certs work fine with openssl verify) > >> > 3. Puppet configuration file: > >> > ca = false > >> > cakey=$ssldir/ca.prk > >> > passfile=$ssldir/ca.pass > >> > cacert=$ssldir/ca.crt > >> > capub=$ssldir/ca.puk > >> > 4. run puppet master: > >> > /usr/sbin/puppetmasterd --no-daemonize --verbose --debug --certname > >> > puppetsrv > >> > > >> > Full log (added some breakpoints and printed some tracebacks): > >> > debug: Failed to load library ''selinux'' for feature ''selinux'' > >> > debug: Failed to load library ''ldap'' for feature ''ldap'' > >> > debug: /File[/opt/cloudcrv/varpuppet/lib]: Autorequiring > >> > File[/opt/cloudcrv/varpuppet] > >> > debug: /File[/opt/cloudcrv/confpuppet/puppet.conf]: Autorequiring > >> > File[/opt/cloudcrv/confpuppet] > >> > debug: /File[/opt/cloudcrv/varpuppet/run/puppetmasterd.pid]: > >> > Autorequiring > >> > File[/opt/cloudcrv/varpuppet/run] > >> > debug: /File[/opt/cloudcrv/varpuppet/ssl/certs/puppetsrv.pem]: > >> > Autorequiring > >> > File[/opt/cloudcrv/varpuppet/ssl/certs] > >> > debug: /File[/opt/cloudcrv/varpuppet/ssl/private]: Autorequiring > >> > File[/opt/cloudcrv/varpuppet/ssl] > >> > debug: /File[/opt/cloudcrv/varpuppet/rrd]: Autorequiring > >> > File[/opt/cloudcrv/varpuppet] > >> > debug: /File[/opt/cloudcrv/varpuppet/bucket]: Autorequiring > >> > File[/opt/cloudcrv/varpuppet] > >> > debug: /File[/opt/cloudcrv/varpuppet/log]: Autorequiring > >> > File[/opt/cloudcrv/varpuppet] > >> > debug: /File[/opt/cloudcrv/varpuppet/facts]: Autorequiring > >> > File[/opt/cloudcrv/varpuppet] > >> > debug: /File[/opt/cloudcrv/varpuppet/log/masterhttp.log]: > Autorequiring > >> > File[/opt/cloudcrv/varpuppet/log] > >> > debug: /File[/opt/cloudcrv/varpuppet/ssl]: Autorequiring > >> > File[/opt/cloudcrv/varpuppet] > >> > debug: /File[/opt/cloudcrv/varpuppet/state]: Autorequiring > >> > File[/opt/cloudcrv/varpuppet] > >> > debug: /File[/opt/cloudcrv/confpuppet/fileserver.conf]: Autorequiring > >> > File[/opt/cloudcrv/confpuppet] > >> > debug: /File[/opt/cloudcrv/varpuppet/ssl/certificate_requests]: > >> > Autorequiring File[/opt/cloudcrv/varpuppet/ssl] > >> > debug: /File[/opt/cloudcrv/confpuppet/auth.conf]: Autorequiring > >> > File[/opt/cloudcrv/confpuppet] > >> > debug: /File[/opt/cloudcrv/confpuppet/manifests]: Autorequiring > >> > File[/opt/cloudcrv/confpuppet] > >> > debug: /File[/opt/cloudcrv/varpuppet/ssl/public_keys/puppetsrv.pem]: > >> > Autorequiring File[/opt/cloudcrv/varpuppet/ssl/public_keys] > >> > debug: /File[/opt/cloudcrv/varpuppet/yaml]: Autorequiring > >> > File[/opt/cloudcrv/varpuppet] > >> > debug: /File[/opt/cloudcrv/varpuppet/reports]: Autorequiring > >> > File[/opt/cloudcrv/varpuppet] > >> > debug: /File[/opt/cloudcrv/varpuppet/ssl/public_keys]: Autorequiring > >> > File[/opt/cloudcrv/varpuppet/ssl] > >> > debug: /File[/opt/cloudcrv/varpuppet/ssl/certs]: Autorequiring > >> > File[/opt/cloudcrv/varpuppet/ssl] > >> > debug: /File[/opt/cloudcrv/varpuppet/ssl/private_keys]: Autorequiring > >> > File[/opt/cloudcrv/varpuppet/ssl] > >> > debug: /File[/opt/cloudcrv/varpuppet/run]: Autorequiring > >> > File[/opt/cloudcrv/varpuppet] > >> > debug: /File[/opt/cloudcrv/varpuppet/ssl/private_keys]: Changing mode > >> > debug: /File[/opt/cloudcrv/varpuppet/ssl/private_keys]: 1 change(s) > >> > debug: /File[/opt/cloudcrv/varpuppet/ssl/private_keys]/mode: mode > >> > changed > >> > ''755'' to ''750'' > >> > debug: /File[/opt/cloudcrv/varpuppet/ssl/private]: Changing ensure > >> > debug: /File[/opt/cloudcrv/varpuppet/ssl/private]: 1 change(s) > >> > debug: /File[/opt/cloudcrv/varpuppet/ssl/private]/ensure: created > >> > debug: Finishing transaction 70044884792200 with 2 changes > >> > /usr/lib/ruby/1.8/puppet/ssl/host.rb:157:in `certificate'' > >> > /usr/lib/ruby/1.8/puppet/ssl/host.rb:27:in `init_localhost'' > >> > /usr/lib/ruby/1.8/puppet/util/cacher.rb:106:in `send'' > >> > /usr/lib/ruby/1.8/puppet/util/cacher.rb:106:in `cached_value'' > >> > /usr/lib/ruby/1.8/puppet/util/cacher.rb:46:in `localhost'' > >> > /usr/lib/ruby/1.8/puppet/application/puppetmasterd.rb:93:in `main'' > >> > /usr/lib/ruby/1.8/puppet/application.rb:226:in `send'' > >> > /usr/lib/ruby/1.8/puppet/application.rb:226:in `run_command'' > >> > /usr/lib/ruby/1.8/puppet/application.rb:217:in `run'' > >> > /usr/lib/ruby/1.8/puppet/application.rb:306:in `exit_on_fail'' > >> > /usr/lib/ruby/1.8/puppet/application.rb:217:in `run'' > >> > /usr/sbin/puppetmasterd:66 > >> > Puppet::SSL::Certificate > >> > /usr/lib/ruby/1.8/puppet/ssl/host.rb:173 > >> > ) > >> > (rdb:1) p Certificate.find("puppetsrv") > >> > #<Puppet::SSL::Certificate:0x7f6930ce7d18 @name="puppetsrv", > >> > @content=#<OpenSSL::X509::Certificate > >> > subject=/C=US/ST=CA/L=Berkeley/O=Lawrence Berkeley National > >> > Laboratory/CN=puppetsrv, issuer=/C=US/ST=CA/L=Berkeley/O=Lawrence > >> > Berkeley > >> > National Laboratory/CN=ca, serial=1, not_before=Thu Aug 19 18:24:23 > UTC > >> > 2010, not_after=Fri Aug 19 18:24:23 UTC 2011>> > >> > (rdb:1) p Certificate.find("ca") > >> > nil > >> > (rdb:1) c > >> > info: Creating a new SSL key for puppetsrv > >> > /usr/lib/ruby/1.8/puppet/ssl/host.rb:157:in `certificate'' > >> > /usr/lib/ruby/1.8/puppet/ssl/host.rb:184:in `generate'' > >> > /usr/lib/ruby/1.8/puppet/ssl/host.rb:27:in `init_localhost'' > >> > /usr/lib/ruby/1.8/puppet/util/cacher.rb:106:in `send'' > >> > /usr/lib/ruby/1.8/puppet/util/cacher.rb:106:in `cached_value'' > >> > /usr/lib/ruby/1.8/puppet/util/cacher.rb:46:in `localhost'' > >> > /usr/lib/ruby/1.8/puppet/application/puppetmasterd.rb:93:in `main'' > >> > /usr/lib/ruby/1.8/puppet/application.rb:226:in `send'' > >> > /usr/lib/ruby/1.8/puppet/application.rb:226:in `run_command'' > >> > /usr/lib/ruby/1.8/puppet/application.rb:217:in `run'' > >> > /usr/lib/ruby/1.8/puppet/application.rb:306:in `exit_on_fail'' > >> > /usr/lib/ruby/1.8/puppet/application.rb:217:in `run'' > >> > /usr/sbin/puppetmasterd:66 > >> > Puppet::SSL::Certificate > >> > /usr/lib/ruby/1.8/puppet/ssl/host.rb:173 > >> > ) > >> > (rdb:1) p Certificate.find("ca") > >> > nil > >> > (rdb:1) p Certificate.find("puppetsrv") > >> > #<Puppet::SSL::Certificate:0x7f6930cdcb20 @name="puppetsrv", > >> > @content=#<OpenSSL::X509::Certificate > >> > subject=/C=US/ST=CA/L=Berkeley/O=Lawrence Berkeley National > >> > Laboratory/CN=puppetsrv, issuer=/C=US/ST=CA/L=Berkeley/O=Lawrence > >> > Berkeley > >> > National Laboratory/CN=ca, serial=1, not_before=Thu Aug 19 18:24:23 > UTC > >> > 2010, not_after=Fri Aug 19 18:24:23 UTC 2011>> > >> > (rdb:1) p key > >> > #<Puppet::SSL::Key:0x7f6930ce5810 > >> > @password_file="/opt/cloudcrv/varpuppet/ssl/ca.pass", > @name="puppetsrv", > >> > @content=-----BEGIN RSA PRIVATE KEY----- > >> > MIICXAIBAAKBgQCo7m5/ZO0vz+CjWnLDIkMQZPHh4Cmj4NhaVSSjo0jGzRrVuM1X > >> > UPm87p4mp/WwRbNxm5dY1qheBHk+/gW4xkJm68jDF2WNY+CvMxstBiTHZ3aGW3zk > >> > tNqiwk/ud4U3MDHDapzArgj1KL3/aTnDF0iBADaCcCYkS/kDxxhMjt5z8QIDAQAB > >> > AoGAaiXH0My+LPjWEk7XJb31neuQAXo1MAAscjZl21zScfiXEAwbGu6KvijBv1By > >> > lNx3ML+vjebzzH/LH8XGGqCZP8TupQHao/G+ZjgbnYFjmnujojjD2WwUAa2i4Jd0 > >> > T7QkJYus16OOcBUlrvpp89qvjSjv9C6/vKBLYPfzbSxzvkECQQDZ9Ly+zdwe8TYu > >> > OkbLgR8XHDrxzuw2Xw0xxoJ/1msAD6xAAJm9igN8K6J6q3FufFq2c9CWQp9SoGyW > >> > EIuuiFSdAkEAxmsNLmV51u/Fd8AEEALlkItxp6iiuuyXXqBcEDhp6by5cikmKoVv > >> > uYQjfWIK6Q5YUP1fYJDeBUHOGc11oZe6ZQJANtc3rqLJohd7VIJhUc85bW0y/6jb > >> > Eos0HLQgHd5rqeZHpwr/pAtX+SRZi5gbwHsVsBbQAx7cS8QFznR3UQEImQJASd9x > >> > eOSvCCcdDgifepaZgcdo+VL/wzhy4vgxTpiyViO9p5NKcmpbvmZEEFqAVWTR3NV4 > >> > vSsyfiKR6WllclRbQQJBALYyByAq9JDCbl0ElYILLvBQwIKjN6/JW4j0W3BjEgF6 > >> > Xo6cP0OCW5dzoV6Hrv+wQR1RcwQf2bFxW0bR06qT4Ec> >> > -----END RSA PRIVATE KEY----- > >> >> > >> > (rdb:1) c > >> > CertificateAuthority.ca > >> > notice: Starting Puppet server version 0.25.4 > >> > /usr/lib/ruby/1.8/puppet/network/http/webrick.rb:101:in `setup_ssl'' > >> > /usr/lib/ruby/1.8/puppet/network/http/webrick.rb:31:in `listen'' > >> > /usr/lib/ruby/1.8/puppet/network/server.rb:131:in `listen'' > >> > /usr/lib/ruby/1.8/puppet/network/server.rb:146:in `start'' > >> > /usr/lib/ruby/1.8/puppet/daemon.rb:128:in `start'' > >> > /usr/lib/ruby/1.8/puppet/application/puppetmasterd.rb:125:in `main'' > >> > /usr/lib/ruby/1.8/puppet/application.rb:226:in `send'' > >> > /usr/lib/ruby/1.8/puppet/application.rb:226:in `run_command'' > >> > /usr/lib/ruby/1.8/puppet/application.rb:217:in `run'' > >> > /usr/lib/ruby/1.8/puppet/application.rb:306:in `exit_on_fail'' > >> > /usr/lib/ruby/1.8/puppet/application.rb:217:in `run'' > >> > /usr/sbin/puppetmasterd:66 > >> > /usr/lib/ruby/1.8/puppet/ssl/host.rb:157:in `certificate'' > >> > /usr/lib/ruby/1.8/puppet/network/http/webrick.rb:102:in `setup_ssl'' > >> > /usr/lib/ruby/1.8/puppet/network/http/webrick.rb:31:in `listen'' > >> > /usr/lib/ruby/1.8/puppet/network/server.rb:131:in `listen'' > >> > /usr/lib/ruby/1.8/puppet/network/server.rb:146:in `start'' > >> > /usr/lib/ruby/1.8/puppet/daemon.rb:128:in `start'' > >> > /usr/lib/ruby/1.8/puppet/application/puppetmasterd.rb:125:in `main'' > >> > /usr/lib/ruby/1.8/puppet/application.rb:226:in `send'' > >> > /usr/lib/ruby/1.8/puppet/application.rb:226:in `run_command'' > >> > /usr/lib/ruby/1.8/puppet/application.rb:217:in `run'' > >> > /usr/lib/ruby/1.8/puppet/application.rb:306:in `exit_on_fail'' > >> > /usr/lib/ruby/1.8/puppet/application.rb:217:in `run'' > >> > /usr/sbin/puppetmasterd:66 > >> > Puppet::SSL::Certificate > >> > /usr/lib/ruby/1.8/puppet/ssl/host.rb:173 > >> > ) > >> > (rdb:1) c > >> > Could not run: Could not retrieve certificate for puppetsrv and not > >> > running > >> > on a valid certificate authority > >> > > >> > > >> > -- > >> > You received this message because you are subscribed to the Google > >> > Groups > >> > "Puppet Users" group. > >> > To post to this group, send email to puppet-users@googlegroups.com. > >> > To unsubscribe from this group, send email to > >> > puppet-users+unsubscribe@googlegroups.com. > >> > For more options, visit this group at > >> > http://groups.google.com/group/puppet-users?hl=en. > >> > > >> > >> -- > >> You received this message because you are subscribed to the Google > Groups > >> "Puppet Users" group. > >> To post to this group, send email to puppet-users@googlegroups.com. > >> To unsubscribe from this group, send email to > >> puppet-users+unsubscribe@googlegroups.com. > >> For more options, visit this group at > >> http://groups.google.com/group/puppet-users?hl=en. > >> > > > > -- > > You received this message because you are subscribed to the Google Groups > > "Puppet Users" group. > > To post to this group, send email to puppet-users@googlegroups.com. > > To unsubscribe from this group, send email to > > puppet-users+unsubscribe@googlegroups.com. > > For more options, visit this group at > > http://groups.google.com/group/puppet-users?hl=en. > > > > -- > You received this message because you are subscribed to the Google Groups > "Puppet Users" group. > To post to this group, send email to puppet-users@googlegroups.com. > To unsubscribe from this group, send email to > puppet-users+unsubscribe@googlegroups.com. > For more options, visit this group at > http://groups.google.com/group/puppet-users?hl=en. > >-- You received this message because you are subscribed to the Google Groups "Puppet Users" group. To post to this group, send email to puppet-users@googlegroups.com. To unsubscribe from this group, send email to puppet-users+unsubscribe@googlegroups.com. For more options, visit this group at http://groups.google.com/group/puppet-users?hl=en.
Mohamed Lrhazi
2011-Mar-06 00:24 UTC
Re: [Puppet Users] External CA: Could not run: Could not retrieve certificate for puppetsrv and not running on a valid certificate authority
On Sat, Mar 5, 2011 at 6:58 PM, Matthew Black <mjblack@gmail.com> wrote:> had to add this to my puppet conf files for the master section. > ssl_client_header = SSL_CLIENT_S_DN > ssl_client_verify_header = SSL_CLIENT_VERIFYI already had those in puppet.conf master section :( Mohamed. -- You received this message because you are subscribed to the Google Groups "Puppet Users" group. To post to this group, send email to puppet-users@googlegroups.com. To unsubscribe from this group, send email to puppet-users+unsubscribe@googlegroups.com. For more options, visit this group at http://groups.google.com/group/puppet-users?hl=en.
Mohamed Lrhazi
2011-Mar-06 02:05 UTC
Re: [Puppet Users] External CA: Could not run: Could not retrieve certificate for puppetsrv and not running on a valid certificate authority
The error says cert does not match key.. but which cert is it talking about? I only created the puppetmaster2 cert, key and the ca cert. Do I need to copy over the ca key as well? the ca pass ? Mohamed. On Sat, Mar 5, 2011 at 7:24 PM, Mohamed Lrhazi <lrhazi@gmail.com> wrote:> On Sat, Mar 5, 2011 at 6:58 PM, Matthew Black <mjblack@gmail.com> wrote: >> had to add this to my puppet conf files for the master section. >> ssl_client_header = SSL_CLIENT_S_DN >> ssl_client_verify_header = SSL_CLIENT_VERIFY > > I already had those in puppet.conf master section :( > > Mohamed. >-- You received this message because you are subscribed to the Google Groups "Puppet Users" group. To post to this group, send email to puppet-users@googlegroups.com. To unsubscribe from this group, send email to puppet-users+unsubscribe@googlegroups.com. For more options, visit this group at http://groups.google.com/group/puppet-users?hl=en.
Mohamed Lrhazi
2011-Mar-06 02:11 UTC
Re: [Puppet Users] External CA: Could not run: Could not retrieve certificate for puppetsrv and not running on a valid certificate authority
I just noticed the cert and key files have changed after my attempts to start puppet master.. I recreated them, by copy pasting the contents from puppetmaster1 where I had them generated, and now puppetmaster2 starts! On Sat, Mar 5, 2011 at 9:05 PM, Mohamed Lrhazi <lrhazi@gmail.com> wrote:> The error says cert does not match key.. but which cert is it talking > about? I only created the puppetmaster2 cert, key and the ca cert. > Do I need to copy over the ca key as well? the ca pass ? > > Mohamed. > > On Sat, Mar 5, 2011 at 7:24 PM, Mohamed Lrhazi <lrhazi@gmail.com> wrote: >> On Sat, Mar 5, 2011 at 6:58 PM, Matthew Black <mjblack@gmail.com> wrote: >>> had to add this to my puppet conf files for the master section. >>> ssl_client_header = SSL_CLIENT_S_DN >>> ssl_client_verify_header = SSL_CLIENT_VERIFY >> >> I already had those in puppet.conf master section :( >> >> Mohamed. >> >-- You received this message because you are subscribed to the Google Groups "Puppet Users" group. To post to this group, send email to puppet-users@googlegroups.com. To unsubscribe from this group, send email to puppet-users+unsubscribe@googlegroups.com. For more options, visit this group at http://groups.google.com/group/puppet-users?hl=en.