Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
isv:SUSE:Edge:Metal3:Ironic:2023.2
ironic-23011
tls-common.sh
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File tls-common.sh of Package ironic-23011
#!/bin/bash export IRONIC_CERT_FILE=/certs/ironic/tls.crt export IRONIC_KEY_FILE=/certs/ironic/tls.key export IRONIC_CACERT_FILE=/certs/ca/ironic/tls.crt export IRONIC_INSECURE=${IRONIC_INSECURE:-false} export IRONIC_SSL_PROTOCOL=${IRONIC_SSL_PROTOCOL:-"-ALL +TLSv1.2 +TLSv1.3"} export IRONIC_VMEDIA_SSL_PROTOCOL=${IRONIC_VMEDIA_SSL_PROTOCOL:-"ALL"} export IRONIC_INSPECTOR_CERT_FILE=/certs/ironic-inspector/tls.crt export IRONIC_INSPECTOR_KEY_FILE=/certs/ironic-inspector/tls.key export IRONIC_INSPECTOR_CACERT_FILE=/certs/ca/ironic-inspector/tls.crt export IRONIC_INSPECTOR_INSECURE=${IRONIC_INSPECTOR_INSECURE:-$IRONIC_INSECURE} export IRONIC_VMEDIA_CERT_FILE=/certs/vmedia/tls.crt export IRONIC_VMEDIA_KEY_FILE=/certs/vmedia/tls.key export RESTART_CONTAINER_CERTIFICATE_UPDATED=${RESTART_CONTAINER_CERTIFICATE_UPDATED:-"false"} export MARIADB_CACERT_FILE=/certs/ca/mariadb/tls.crt mkdir -p /certs/ironic mkdir -p /certs/ironic-inspector mkdir -p /certs/ca/ironic mkdir -p /certs/ca/ironic-inspector if [[ -f "$IRONIC_CERT_FILE" ]] && [[ ! -f "$IRONIC_KEY_FILE" ]]; then echo "Missing TLS Certificate key file $IRONIC_KEY_FILE" exit 1 fi if [[ ! -f "$IRONIC_CERT_FILE" ]] && [[ -f "$IRONIC_KEY_FILE" ]]; then echo "Missing TLS Certificate file $IRONIC_CERT_FILE" exit 1 fi if [[ -f "$IRONIC_INSPECTOR_CERT_FILE" ]] && [[ ! -f "$IRONIC_INSPECTOR_KEY_FILE" ]]; then echo "Missing TLS Certificate key file $IRONIC_INSPECTOR_KEY_FILE" exit 1 fi if [[ ! -f "$IRONIC_INSPECTOR_CERT_FILE" ]] && [[ -f "$IRONIC_INSPECTOR_KEY_FILE" ]]; then echo "Missing TLS Certificate file $IRONIC_INSPECTOR_CERT_FILE" exit 1 fi if [[ -f "$IRONIC_VMEDIA_CERT_FILE" ]] && [[ ! -f "$IRONIC_VMEDIA_KEY_FILE" ]]; then echo "Missing TLS Certificate key file $IRONIC_VMEDIA_KEY_FILE" exit 1 fi if [[ ! -f "$IRONIC_VMEDIA_CERT_FILE" ]] && [[ -f "$IRONIC_VMEDIA_KEY_FILE" ]]; then echo "Missing TLS Certificate file $IRONIC_VMEDIA_CERT_FILE" exit 1 fi copy_atomic() { local src="$1" local dest="$2" local tmpdest tmpdest=$(mktemp "$dest.XXX") cp "$src" "$tmpdest" # Hard linking is atomic, but only works on the same volume ln -f "$tmpdest" "$dest" rm -f "$tmpdest" } if [[ -f "$IRONIC_CERT_FILE" ]] || [[ -f "$IRONIC_CACERT_FILE" ]]; then export IRONIC_TLS_SETUP="true" export IRONIC_SCHEME="https" if [[ ! -f "$IRONIC_CACERT_FILE" ]]; then copy_atomic "$IRONIC_CERT_FILE" "$IRONIC_CACERT_FILE" fi else export IRONIC_TLS_SETUP="false" export IRONIC_SCHEME="http" fi if [[ -f "$IRONIC_INSPECTOR_CERT_FILE" ]] || [[ -f "$IRONIC_INSPECTOR_CACERT_FILE" ]]; then export IRONIC_INSPECTOR_TLS_SETUP="true" export IRONIC_INSPECTOR_SCHEME="https" if [[ ! -f "$IRONIC_INSPECTOR_CACERT_FILE" ]]; then copy_atomic "$IRONIC_INSPECTOR_CERT_FILE" "$IRONIC_INSPECTOR_CACERT_FILE" fi else export IRONIC_INSPECTOR_TLS_SETUP="false" export IRONIC_INSPECTOR_SCHEME="http" fi if [[ -f "$IRONIC_VMEDIA_CERT_FILE" ]]; then export IRONIC_VMEDIA_SCHEME="https" export IRONIC_VMEDIA_TLS_SETUP="true" else export IRONIC_VMEDIA_SCHEME="http" export IRONIC_VMEDIA_TLS_SETUP="false" fi if [[ -f "$MARIADB_CACERT_FILE" ]]; then export MARIADB_TLS_ENABLED="true" else export MARIADB_TLS_ENABLED="false" fi
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor