We currently "manage" java keystores by simply pushing out a cacerts (or trustedcerts) we've created, but this is not really maintainable since we update once and sort of forget about it.
We also have certain java applications that are unable to launch with a separate certificate databases, and will always use the systems default jre/lib/security/certs
It would be really useful if there was a salt module to add CA's and trusted certificates to the keystore files.
Doing this seems relatively simple, since the command can basically shell out the keystore executable (and if not password is specified, use 'changeit'). It should probably check for an alias first, and then add it if it is not in the database, but there is some overhead there as it would have to run two separate commands.
We currently "manage" java keystores by simply pushing out a cacerts (or trustedcerts) we've created, but this is not really maintainable since we update once and sort of forget about it.
We also have certain java applications that are unable to launch with a separate certificate databases, and will always use the systems default jre/lib/security/certs
It would be really useful if there was a salt module to add CA's and trusted certificates to the keystore files.
Doing this seems relatively simple, since the command can basically shell out the keystore executable (and if not password is specified, use 'changeit'). It should probably check for an alias first, and then add it if it is not in the database, but there is some overhead there as it would have to run two separate commands.