You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In our puppet environment we have 1 global hiera.yaml in our control repo which has a global public/private key to decrypt eyaml.
We also have antoher module that also uses a hiera.yaml file with the option of another public/private key that is used to derypt values.
The strange thing is that these puppet runs randomly fail with the error Error was PKCS7[Method: 112, Reason: 115, Data: null].
But the next run that puppet run seems to be able to decrypt it. We have about 100 servers with that role but only aprox 5 to 10 of the runs fail and then restore and then other run of that role fail.
This issue occured on puppet master enterprise 2019.8.
Is it possible that hiera is confused which key it should use on random occasions?
Are you saying you have one set of keys to encrypt/decrypt things "globally", but also a set of keys for each host? Are all those keys contained in the pkcs7 file? Or you keep the jobss-related keypairs in their own pkcs7 chain?
Does puppet load both hiera files? If so, that explains it. PUppet is notorious for not dealing well with ordering in merging, especially when two files are in the same directory and read in with a fileglob -- the order of the files is unsorted and dependent on the underlying OS, which can change arbitrarily. You will need IMO to use a different label for "eyaml_lookup_key".
+1 this is still happening.. to be more clear if you are using more than one set of pkcs7 keys (each in different modules/eyaml configs) sometimes puppet will load the incorrect key and try to decrypt. Exactly as the reporter described. @otheus not sure what you mean by different label for eyaml_lookup_key.. that is the provider name?
In our puppet environment we have 1 global hiera.yaml in our control repo which has a global public/private key to decrypt eyaml.
We also have antoher module that also uses a hiera.yaml file with the option of another public/private key that is used to derypt values.
The strange thing is that these puppet runs randomly fail with the error Error was PKCS7[Method: 112, Reason: 115, Data: null].
But the next run that puppet run seems to be able to decrypt it. We have about 100 servers with that role but only aprox 5 to 10 of the runs fail and then restore and then other run of that role fail.
This issue occured on puppet master enterprise 2019.8.
Is it possible that hiera is confused which key it should use on random occasions?
Control hiera file:
seperate module jbossap7 hiera file
Kind Regards,
Frédéricq Stuer
The text was updated successfully, but these errors were encountered: