tripleo-image-elements/elements/ssl-ca
Jonathan Brownell 878ea354a4 ssl-ca: Allow CA certificate to be specified
Allow a CA certificate to be specified, and automatically add it to
the default system CA bundle via a new "ssl-ca" DIB element.

This is required for sites which use their own Certificate Authority.

This DIB element is safe to include on all images, regardless of
whether or not it is activated with a valid CA certificate.

Based on SSL PKI spec:
  I32473fe797a4c1e28d14c3b82c8892c7c59a4e55

Depends on t-h-t update for ssl.ca_certificate property via Heat:
  Ibacd7c98980520e11c0df89632013f2ba2dbe370

Change-Id: I3441b4b688aacb2bb8d8326ee72f87974dd554ff
2014-08-11 11:09:20 -07:00
..
os-apply-config/etc/ssl ssl-ca: Allow CA certificate to be specified 2014-08-11 11:09:20 -07:00
os-refresh-config/configure.d ssl-ca: Allow CA certificate to be specified 2014-08-11 11:09:20 -07:00
README.md ssl-ca: Allow CA certificate to be specified 2014-08-11 11:09:20 -07:00

Install and trust a CA at the operating system level, making it available for use by OpenStack services and other network clients authenticating SSL-secured connections.

Configuration

ssl: ca_certificate: certdata

The CA certificate will be written to /etc/ssl/from-heat-ca.crt and installed using update-ca-certificates (apt-based distros) or update-ca-trusts (yum-based distros).

This may be used in conjunction with openstack-ssl to enable SSL-secure connections between OpenStack services, or independently to enable secure integration with external resources such as Keystone -> LDAP server or Cinder -> external backend.

If multiple CA certificates are to be trusted, they should be concatenated in PEM format within the single ca_certificate property defining the trust store.