Hammer cannot create/import SSL Certificates or SSL Keys
Environment
Satellite 6.4
Issue
I can see that custom SSL certificates and SSL Keys can be created via the Web UI, but cannot be done via hammer CLI.
Resolution
This is being tracked in this This content is not included.bug.
For more KB articles/solutions related to Red Hat Satellite 6.x hammer Issues, please refer to the Consolidated Troubleshooting Article for Red Hat Satellite 6.x hammer-related Issues
Root Cause
This is being investigated by Engineering.
Diagnostic Steps
Checking hammer for this ability:
# hammer -h
Usage:
hammer [OPTIONS] SUBCOMMAND [ARG] ...
Parameters:
SUBCOMMAND Subcommand
[ARG] ... Subcommand arguments
Subcommands:
activation-key Manipulate activation keys.
admin Administrative server-side tasks
architecture Manipulate architectures
arf-report Manipulate compliance reports
audit Search audit trails.
auth Foreman connection login/logout
auth-source Manipulate auth sources
bootdisk Download boot disks
capsule Manipulate capsule
compute-resource Manipulate compute resources
config-group Manipulate config groups
content-view Manipulate content views.
csv Import to or export from a running foreman server
defaults Defaults management
discovery Manipulate discovered hosts.
discovery-rule Manipulate discovered rules.
docker Manipulate docker content
domain Manipulate domains
environment Manipulate environments
erratum Manipulate errata
export-templates Export templates to a git repo or a directory on the server
fact Search facts
file Manipulate files
filter Manage permission filters
foreign-input-set Manage foreign input sets
full-help Print help for all hammer commands
global-parameter Manipulate global parameters
gpg Manipulate GPG Key actions on the server
host Manipulate hosts
host-collection Manipulate host collections
hostgroup Manipulate hostgroups
import-templates Import templates from a git repo or a directory on the server
job-invocation Manage job invocations
job-template Manage job templates
lifecycle-environment Manipulate lifecycle_environments on the server
location Manipulate locations
medium Manipulate installation media
model Manipulate hardware models
organization Manipulate organizations
os Manipulate operating system
ostree-branch Manipulate ostree branches
package Manipulate packages.
package-group Manipulate package groups
partition-table Manipulate partition tables
ping Get the status of the server
policy Manipulate policies
product Manipulate products.
proxy Manipulate smart proxies
puppet-class Search puppet modules
puppet-module View Puppet Module details.
realm Manipulate realms
recurring-logic Recurring logic related actions.
remote-execution-feature Manage remote execution features
report Browse and read reports
repository Manipulate repositories
repository-set Manipulate repository sets on the server
role Manage user roles
sc-param Manipulate smart class parameters
scap-content Manipulate SCAP contents
settings Change server settings
shell Interactive shell
smart-variable Manipulate smart variables
subnet Manipulate subnets
subscription Manipulate subscriptions.
sync-plan Manipulate sync plans
tailoring-file Manipulate Tailoring files
task Tasks related actions.
template Manipulate config templates
template-input Manage template inputs
user Manipulate users
user-group Manage user groups
virt-who-config Manage Virt Who configurations
Options:
--autocomplete LINE Get list of possible endings
--csv Output as CSV (same as --output=csv)
--csv-separator SEPARATOR Character to separate the values
--fetch-ca-cert SERVER Fetch CA certificate from server and exit
--interactive INTERACTIVE Explicitly turn interactive mode on/off
One of true/false, yes/no, 1/0
--no-headers Hide headers from output
--output ADAPTER Set output format. One of [base, table, silent, csv, yaml, json]
--output-file OUTPUT_FILE Path to custom output file
--show-ids Show ids of associated resources
--ssl-ca-file CA_FILE Configure the file containing the CA certificates
--ssl-ca-path CA_PATH Configure the directory containing the CA certificates
--ssl-client-cert CERT_FILE Configure the client's public certificate
--ssl-client-key KEY_FILE Configure the client's private key
--ssl-with-basic-auth Use standard authentication in addition to client certificate authentication
--verify-ssl VERIFY_SSL Configure SSL verification of remote system
One of true/false, yes/no, 1/0
--version Show version
-c, --config CFG_FILE Path to custom config file
-d, --debug Show debugging output
-h, --help Print help
-p, --password PASSWORD Password to access the remote system
-r, --reload-cache Force reload of Apipie cache
-s, --server SERVER Remote system address
-u, --username USERNAME Username to access the remote system
-v, --verbose Be verbose
This ability doesn't appear to exist currently in hammer.
This solution is part of Red Hat’s fast-track publication program, providing a huge library of solutions that Red Hat engineers have created while supporting our customers. To give you the knowledge you need the instant it becomes available, these articles may be presented in a raw and unedited form.