Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

setup-component-pack-complete-harbor.yml generates new haproxy TLS cert each time #279

Open
stoeps13 opened this issue May 10, 2023 · 4 comments

Comments

@stoeps13
Copy link
Contributor

stoeps13 commented May 10, 2023

import_playbook: third_party/setup-haproxy.yml

On each run, this generates a new TLS certificate (self-signed without root ca). The whole playbook does some things with DMGR (like restart, import ES certs), but does not import this new cert into trusted root. I'm not sure where it fits best, but I would like to call the role https://github.com/HCL-TECH-SOFTWARE/connections-automation/tree/main/roles/third_party/ibm/wasnd/was-dmgr-config-add-cert-truststore after HAProxy role has finished.

@nitinjagjivan
Copy link
Collaborator

Thanks, this is nginx cert and we need to import it into trusted root each time we run setup nginx/haproxy . Internal work item is created.

@stoeps13
Copy link
Contributor Author

Thanks, @nitinjagjivan
when you are looking into this. What's the process if I want to have a Lets encrypt or an official certificate?

I see there is a variable nginx_certbot_production in the nginx role, but it is nowhere used or documented.

@nitinjagjivan
Copy link
Collaborator

Acknowledged and have created an internal work item. We will prioritise and address it accordingly.

@stoeps13
Copy link
Contributor Author

Hi,
just asking about the status?

This issue is nearly one year old, each run generates certificates and does not update DMGR.

Regards,
Christoph

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants