You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CHANGELOG.md
+16-1
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,22 @@
2
2
3
3
All notable changes to this project will be documented in this file. The format is based on [Keep a Changelog](http://keepachangelog.com/en/1.0.0/) and this project adheres to [Semantic Versioning](http://semver.org).
-\(IAC-994\) Removal of inappropriate terminology [\#335](https://github.com/puppetlabs/puppetlabs-java_ks/pull/335) ([pmcmaw](https://github.com/pmcmaw))
12
+
- pdksync - \(IAC-973\) - Update travis/appveyor to run on new default branch `main`[\#327](https://github.com/puppetlabs/puppetlabs-java_ks/pull/327) ([david22swan](https://github.com/david22swan))
13
+
14
+
### Fixed
15
+
16
+
- Change latest/current comparison to account for chains [\#336](https://github.com/puppetlabs/puppetlabs-java_ks/pull/336) ([mwpower](https://github.com/mwpower))
17
+
- add storetype parameter comparison to 'destroy' method [\#333](https://github.com/puppetlabs/puppetlabs-java_ks/pull/333) ([mwpower](https://github.com/mwpower))
18
+
- Correct jceks symbol comparison [\#332](https://github.com/puppetlabs/puppetlabs-java_ks/pull/332) ([mwpower](https://github.com/mwpower))
*[`java_ks`](#java_ks): Manages the entries in a java keystore, and uses composite namevars to accomplish the same alias spread across multiple target keystores.
13
14
14
15
## Classes
15
16
16
-
### java_ks::config
17
+
### `java_ks::config`
17
18
18
19
java_ks configuration
19
20
@@ -27,11 +28,11 @@ Data type: `Any`
27
28
28
29
29
30
30
-
Default value: {}
31
+
Default value: `{}`
31
32
32
33
## Resource types
33
34
34
-
### java_ks
35
+
### `java_ks`
35
36
36
37
Manages the entries in a java keystore, and uses composite namevars to
37
38
accomplish the same alias spread across multiple target keystores.
@@ -42,43 +43,72 @@ The following properties are available in the `java_ks` type.
42
43
43
44
##### `ensure`
44
45
45
-
Valid values: present, absent, latest
46
+
Valid values: `present`, `absent`, `latest`
46
47
47
48
Has three states: present, absent, and latest. Latest
48
49
will compare the on disk SHA1 fingerprint of the certificate to that
49
50
in keytool to determine if insync? returns true or false. We redefine
50
51
insync? for this parameter to accomplish this.
51
52
52
-
Default value: present
53
+
Default value: `present`
53
54
54
55
#### Parameters
55
56
56
57
The following parameters are available in the `java_ks` type.
57
58
59
+
##### `certificate`
60
+
61
+
A server certificate, followed by zero or more intermediate certificate authorities.
62
+
All certificates will be placed in the keystore. This will autorequire the specified file.
63
+
64
+
##### `chain`
65
+
66
+
The intermediate certificate authorities, if they are to be taken
67
+
from a file separate from the server certificate. This will autorequire the specified file.
68
+
69
+
##### `destkeypass`
70
+
71
+
The password used to protect the key in keystore.
72
+
73
+
##### `keytool_timeout`
74
+
75
+
Timeout for the keytool command in seconds.
76
+
77
+
Default value: `120`
78
+
58
79
##### `name`
59
80
60
81
namevar
61
82
62
83
The alias that is used to identify the entry in the keystore. This will be
63
84
converted to lowercase.
64
85
65
-
##### `target`
86
+
##### `password`
66
87
67
-
namevar
88
+
The password used to protect the keystore. If private keys are
89
+
subsequently also protected this password will be used to attempt
90
+
unlocking. Must be six or more characters in length. Cannot be used
91
+
together with :password_file, but you must pass at least one of these parameters.
68
92
69
-
Destination file for the keystore. This will autorequire the parent directory of the file.
93
+
##### `password_fail_reset`
70
94
71
-
##### `certificate`
95
+
Valid values: ``true``, ``false``
72
96
73
-
A server certificate, followed by zero or more intermediate certificate authorities.
74
-
All certificates will be placed in the keystore. This will autorequire the specified file.
97
+
If the supplied password does not succeed in unlocking the
98
+
keystore file, then delete the keystore file and create a new one.
99
+
Default: false.
75
100
76
-
##### `storetype`
101
+
Default value: ``false``
77
102
78
-
Valid values: jceks, pkcs12, jks
103
+
##### `password_file`
79
104
80
-
Optional storetype
81
-
Valid options: <jceks>, <pkcs12>, <jks>
105
+
The path to a file containing the password used to protect the
106
+
keystore. This cannot be used together with :password, but you must pass at least one of these parameters.
107
+
108
+
##### `path`
109
+
110
+
The search path used for command (keytool, openssl) execution.
111
+
Paths can be specified as an array or as a '
82
112
83
113
##### `private_key`
84
114
@@ -88,70 +118,46 @@ accompanied by a signed certificate for the keytool provider. This will autorequ
88
118
89
119
##### `private_key_type`
90
120
91
-
Valid values: rsa, dsa, ec
121
+
Valid values: `rsa`, `dsa`, `ec`
92
122
93
123
The type of the private key. Usually the private key is of type RSA
94
124
key but it can also be an Elliptic Curve key (EC) or DSA.
95
125
Valid options: <rsa>, <dsa>, <ec>. Defaults to <rsa>
96
126
97
-
Default value: rsa
127
+
Default value: `rsa`
98
128
99
-
##### `chain`
129
+
##### `provider`
100
130
101
-
The intermediate certificate authorities, if they are to be taken
102
-
from a file separate from the server certificate. This will autorequire the specified file.
131
+
The specific backend to use for this `java_ks` resource. You will seldom need to specify this --- Puppet will usually
132
+
discover the appropriate provider for your platform.
103
133
104
-
##### `password`
134
+
##### `source_alias`
105
135
106
-
The password used to protect the keystore. If private keys are
107
-
subsequently also protected this password will be used to attempt
108
-
unlocking. Must be six or more characters in length. Cannot be used
109
-
together with :password_file, but you must pass at least one of these parameters.
136
+
The source certificate alias
110
137
111
-
##### `password_file`
138
+
##### `source_password`
112
139
113
-
The path to a file containing the password used to protect the
114
-
keystore. This cannot be used together with :password, but you must pass at least one of these parameters.
140
+
The source keystore password
115
141
116
-
##### `password_fail_reset`
142
+
##### `storetype`
117
143
118
-
Valid values: `true`, `false`
144
+
Valid values: `jceks`, `pkcs12`, `jks`
119
145
120
-
If the supplied password does not succeed in unlocking the
121
-
keystore file, then delete the keystore file and create a new one.
122
-
Default: false.
146
+
Optional storetype
147
+
Valid options: <jceks>, <pkcs12>, <jks>
123
148
124
-
Default value: `false`
149
+
##### `target`
125
150
126
-
##### `destkeypass`
151
+
namevar
127
152
128
-
The password used to protect the key in keystore.
153
+
Destination file for the keystore. This will autorequire the parent directory of the file.
129
154
130
155
##### `trustcacerts`
131
156
132
-
Valid values: `true`, `false`
157
+
Valid values: ``true``, ``false``
133
158
134
159
Certificate authorities aren't by default trusted so if you are adding a CA you need to set this to true.
135
160
Defaults to :false.
136
161
137
-
Default value: `false`
138
-
139
-
##### `path`
140
-
141
-
The search path used for command (keytool, openssl) execution.
0 commit comments