-
Notifications
You must be signed in to change notification settings - Fork 23
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Tentacle register action does not work with invalid certificates are used #123
Comments
Well let's continue the discussion here instead of in the PR. So I would still use powershell and if you have a problem (for example the PS 3.0 requirement) with using Invoke-RestMethod, then i would suggest using .net library's System.Net.Webcleint (since Invoke-RestMethod is a wrapper around it anyway). We are already using the solution i put in in the merge request in our own environment and it works like a charm. Also passes our internal tests that run with Gitlab CI and CAN do tests on windows unlike Travis. So for me to make this issue solved, it should provide a similar functionality that is in my PR (e.g. check root certs in the Windows Certificate store, not OpenSSL certfile.pem.) Until then we will use my fork with my changes. |
Thank you for the description that actually makes a lot more sense TBH. I think this makes sense to add into the main branch of Octopus deploy however because its windows specific (and octopus deploy is starting to become less OS specific) I would like to add it as a flag in the tentacle resource to chose whether to add it or not. We should simply be able to upgrade the following chunk of code with what you implemented and then pass in an option via the resource properties to use that implementation instead of yours. https://github.com/cvent/octopus-deploy-cookbook/blob/master/libraries/tentacle.rb#L49-L53 That way we can keep the original implementation which is easily testable but also support your completely valid use case. In the future It probably makes sense to abstract away the idea of the api client and implement a powershell version and the default ruby version. |
@eelco-de-boer this might be interesting to look into https://github.com/chef/win32-certstore |
Very interesting indeed :) |
we had to deal with this issue, too... this seems more like a chef limitation than a limitation of the cookbook, though, any cookbook that makes use of the chef api to hit one of the https sites we're securing with our internal PKI is going to have this issue, we coded around it for linux and windows in our base cookbooks that get applied to all nodes |
This is in response to #122 where using a self signed certificate did not work correctly because the chef http client enforces valid certificates.
The text was updated successfully, but these errors were encountered: