OpenVox Server Configuration Files: master.conf
The master.conf file configures how OpenVox Server handles deprecated authorization methods for server endpoints. For an overview, see OpenVox Server Configuration.
Deprecation Note: This file contains only the
allow-header-cert-infoparameter, and is deprecated in favor of authorization settings that are configured in the newauth.conffile. Because this setting is deprecated, a defaultmaster.conffile is no longer included in the OpenVox Server package.
In master.conf, the allow-header-cert-info setting determines whether OpenVox Server should use authorization info from the X-Client-Verify, X-Client-DN, and X-Client-Cert HTTP headers. Its default
value is false.
The allow-header-cert-info setting is used to enable external SSL termination. If the setting’s value is set to true, OpenVox Server will ignore any certificate presented
to the Jetty web server, and will rely on header data to authorize requests. This is very dangerous unless you’ve secured your network to prevent any untrusted access to OpenVox Server.
When using the allow-header-cert-info setting in master.conf, you can change OpenVox’s ssl_client_verify_header parameter to use another header name instead of X-Client-Verify. The ssl_client_header
parameter can rename X-Client-DN. The X-Client-Cert header can’t be renamed.
The allow-header-cert-info parameter in master.conf applies only to HTTP endpoints served by the “server” service. The applicable endpoints include those listed in
OpenVox V3 HTTP API. It does not apply to the endpoints listed in
CA V1 HTTP API or to any OpenVox Admin API endpoints.
Supported Authorization Workflow
If you instead enable the auth.conf authorization method, the value of the allow-header-cert-info parameter in auth.conf controls how the user’s identity is derived for
authorization purposes. In this case, OpenVox Server ignores the value of the allow-header-cert-info parameter in master.conf.
When using the allow-header-cert-info parameter in auth.conf, none of the X-Client headers can be renamed. Identity must be specified through the X-Client-Verify, X-Client-DN, and X-Client-Cert
headers.
The allow-header-cert-info parameter in auth.conf, applies to all HTTP endpoints that OpenVox Server handles, including those served by the “server” service, the CA API, and the OpenVox Admin API.
For additional information on the allow-header-cert-info parameter in auth.conf, see OpenVox Server Configuration Files: auth.conf and
Configuring the Authorization Service in the trapperkeeper-authorization documentation.
HOCON auth.conf Example
authorization: {
version: 1
# allow-header-cert-info: false
rules: [
{
# Allow nodes to retrieve their own catalog
match-request: {
path: "^/puppet/v3/catalog/([^/]+)$"
type: regex
method: [get, post]
}
allow: "$1"
sort-order: 500
name: "puppetlabs catalog"
},
...
]
}