Skip to content

Commit a3df8ee

Browse files
author
Johan De Wit
committed
[certificates] Introduce cluster certs, and useSystemCa switch
1 parent 24633d3 commit a3df8ee

File tree

3 files changed

+49
-10
lines changed

3 files changed

+49
-10
lines changed

lib/puppet/provider/mongodb.rb

+1-1
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ def self.mongo_conf
3131
config = YAML.load_file(mongod_conf_file) || {}
3232
mongosh_config = {}
3333
mongosh_config = YAML.load_file("#{Facter.value(:root_home)}/.mongosh.yaml") if File.file?("#{Facter.value(:root_home)}/.mongosh.yaml")
34-
# determine if we need the tls for connecion or client
34+
# determine if we need tls for the admin user
3535
if mongosh_config['admin'] && mongosh_config['admin']['tlsCertificateKeyFile']
3636
tlscert = mongosh_config['admin']['tlsCertificateKeyFile']
3737
auth_mech = mongosh_config['admin']['auth_mechanism'] if mongosh_config['admin']['auth_mechanism']

manifests/server.pp

+29-7
Original file line numberDiff line numberDiff line change
@@ -293,6 +293,21 @@
293293
#
294294
# @param tls_mode
295295
# Defines if TLS is used for all network connections. Allowed values are 'requireTLS', 'preferTLS' or 'allowTLS'.
296+
#
297+
# @param tls_use_system_ca
298+
# Use the system-wide CA certificate store when connecting to a TLS-enabled server.
299+
#
300+
# @param tls_cluster_key
301+
# File that contains the x.509 certificate-key file for membership authentication for the cluster or replica set.
302+
#
303+
# @param tls_cluster_ca
304+
# file that contains the root certificate chain from the Certificate Authority used to validate the certificate
305+
# presented by a client establishing a connection.
306+
#
307+
# @param tls_invalid_certificates
308+
# Enable or disable the validation checks for TLS/SSL certificates on other servers in the cluster and allows
309+
# the use of invalid certificates.
310+
#
296311
# @param admin_password_hash
297312
# Hashed password. Hex encoded md5 hash of mongodb password.
298313
#
@@ -316,7 +331,8 @@
316331
# Administrator authentication mechanism. scram_sha_256 password synchronization verification is not supported.
317332
#
318333
# @param supported_auth_mechanisms
319-
# Set the supported authentication mechanisms that the mmongoserver will support. Is set, make sure the $admin_auth_mechanism is also included.
334+
# Set the supported authentication mechanisms that the mmongoserver will support. Is set, make sure the
335+
# $admin_auth_mechanism is also included.
320336
#
321337
# @param admin_tls_key
322338
# Filepath of the administrators x509 certificate. Its the user of this class that needs to manage this certificate.
@@ -399,18 +415,24 @@
399415
$config_content = undef,
400416
Optional[String] $config_template = undef,
401417
Optional[Hash] $config_data = undef,
402-
Optional[Boolean] $ssl = undef,
418+
Boolean $ssl = false,
403419
Optional[Stdlib::Absolutepath] $ssl_key = undef,
404420
Optional[Stdlib::Absolutepath] $ssl_ca = undef,
405421
Boolean $ssl_weak_cert = false,
406422
Boolean $ssl_invalid_hostnames = false,
407-
Enum['requireSSL', 'preferSSL', 'allowSSL'] $ssl_mode = 'requireSSL',
408-
Boolean $tls = false,
423+
Enum['disabled', 'requireSSL', 'preferSSL', 'allowSSL'] $ssl_mode = 'disabled',
424+
Boolean $tls = true,
425+
Enum['disabled', 'requireTLS', 'preferTLS', 'allowTLS'] $tls_mode = 'requireTLS',
426+
# cluster tls settings
427+
Optional[Boolean] $tls_use_system_ca = undef,
428+
Optional[Stdlib::Absolutepath] $tls_cluster_key = undef,
429+
Optional[Stdlib::Absolutepath] $tls_cluster_ca = undef,
430+
#client tls settings
409431
Optional[Stdlib::Absolutepath] $tls_key = undef,
410432
Optional[Stdlib::Absolutepath] $tls_ca = undef,
411433
Boolean $tls_conn_without_cert = false,
412434
Boolean $tls_invalid_hostnames = false,
413-
Enum['requireTLS', 'preferTLS', 'allowTLS'] $tls_mode = 'requireTLS',
435+
Boolean $tls_invalid_certificates = false,
414436
Boolean $restart = $mongodb::params::restart,
415437
Optional[String] $storage_engine = undef,
416438
Boolean $create_admin = $mongodb::params::create_admin,
@@ -449,11 +471,11 @@
449471
$admin_password
450472
}
451473

452-
# using x509, we need the admin clent certificate in the parameter --tlsCertificateKeyFile
474+
# Using x509, we need the admin client certificate in the parameter --tlsCertificateKeyFile
453475
# there is no way where we can set this in neither the /etc/momgosh.yaml or the /etc/mongod.conf
454476
# The mongodb provider reads in /etc/mongod.conf setParameters.authenticationMechanisms: MONGODB-X509 settings
455477
# to determine that a client cert authentication is used. There is no setting to set the client cert to be used.
456-
# so we store it in a file in roots home directory. (this is done in mongodb::server::config
478+
# so we store it in a file in roots home directory. (this is done in mongodb::server::config)
457479

458480
if $create_admin and ($service_ensure == 'running' or $service_ensure == true) {
459481
mongodb::db { 'admin':

templates/mongodb.conf.erb

+19-2
Original file line numberDiff line numberDiff line change
@@ -121,10 +121,22 @@ net.ssl.allowInvalidHostnames: <%= @ssl_invalid_hostnames %>
121121
<% end -%>
122122
<% if @tls -%>
123123
net.tls.mode: <%= @tls_mode %>
124+
<% if @tls_key -%>
124125
net.tls.certificateKeyFile: <%= @tls_key %>
126+
<% end -%>
127+
<% if @tls_cluster_key -%>
128+
net.tls.ClusterFile = <%= @tls_cluster_key %>
129+
<% end -%>
130+
<% if ! @tls_use_system_ca -%>
131+
<%# its this parameter or the explicit ca file location %>
132+
<%# This options will be set in the setparameter section below %>
125133
<% if @tls_ca -%>
126134
net.tls.CAFile: <%= @tls_ca %>
127135
<% end -%>
136+
<% if @tls_cluster_ca -%>
137+
net.tls.clusterCAFile: <%= @tls_ca %>
138+
<% end -%>
139+
<% end -%>
128140
<% if @tls_conn_without_cert -%>
129141
net.tls.allowConnectionsWithoutCertificates: <%= @tls_conn_without_cert %>
130142
<% end -%>
@@ -167,13 +179,18 @@ setParameter:
167179
<%= v %>
168180
<% end -%>
169181
<% end -%>
170-
<% if @supported_auth_mechanisms -%>
171-
<%# setParameters.auth... gives an error on startup status=2/INVALIDARGUMENT -%>
182+
<% if @supported_auth_mechanisms || @tls_use_system_ca -%>
172183
<% if !@set_parameter -%>
173184
setParameter:
174185
<% end -%>
186+
<% if @supported_auth_mechanisms -%>
187+
<%# setParameters.auth... gives an error on startup status=2/INVALIDARGUMENT -%>
175188
authenticationMechanisms: <%= @supported_auth_mechanisms.join(',') %>
176189
<% end -%>
190+
<% if @tls_use_system_ca -%>
191+
tlsUseSystemCA: true
192+
<% end -%>
193+
<% end -%>
177194

178195
<% if @config_data -%>
179196
<% @config_data.each do |k,v| -%>

0 commit comments

Comments
 (0)