Login
Log in using an SSO provider:
Fedora Account System
Red Hat Associate
Red Hat Customer
Login using a Red Hat Bugzilla account
Forgot Password
Create an Account
Red Hat Bugzilla – Attachment 600494 Details for
Bug 831188
Add path to server SSL certificate to rhui-tools.conf so that we don't have to prompt for it during client config rpm creation
Home
New
Search
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh92 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
[?]
This site requires JavaScript to be enabled to function correctly, please enable it.
Verifying screen log
log (text/plain), 23.58 KB, created by
mkovacik
on 2012-07-26 12:03:24 UTC
(
hide
)
Description:
Verifying screen log
Filename:
MIME Type:
Creator:
mkovacik
Created:
2012-07-26 12:03:24 UTC
Size:
23.58 KB
patch
obsolete
> >------------------------------------------------------------------------------ > -= Red Hat Update Infrastructure Management Tool =- > > >-= Home =- > > r manage repositories > c manage content delivery servers (CDS) > s synchronization status and scheduling > e create entitlement certificates and client configuration RPMs > n manage Red Hat entitlement certificates > u manage users > i manage identity certificate > > Connected: ip-10-99-21-158.ec2.internal >------------------------------------------------------------------------------ >rhui (home) => e > >------------------------------------------------------------------------------ > -= Red Hat Update Infrastructure Management Tool =- > > >-= Client Entitlement Management =- > > e generate an entitlement certificate > c create a client configuration RPM from an entitlement certificate > > Connected: ip-10-99-21-158.ec2.internal >------------------------------------------------------------------------------ >rhui (client) => e > >Select the CDS cluster that clients using this entitlement certificate will use to download content: > > 1 - cluster_1 >Enter value (1-1) or 'b' to abort: 1 > >Select one or more repositories to include in the entitlement certificate: >(an * next to a Red Hat repository indicates it is deployed in the RHUI) > > Custom Repositories > > Red Hat Repositories > - 1 : Red Hat Update Infrastructure 2.0 (RPMs) > >Enter value (1-1) to toggle selection, 'c' to confirm selections, or '?' for more commands: 1 > >Select one or more repositories to include in the entitlement certificate: >(an * next to a Red Hat repository indicates it is deployed in the RHUI) > > Custom Repositories > > Red Hat Repositories > x 1 : Red Hat Update Infrastructure 2.0 (RPMs) > >Enter value (1-1) to toggle selection, 'c' to confirm selections, or '?' for more commands: c > > >Name of the certificate. This will be used as the name of the certificate file >(name.crt) and its associated private key (name.key). Choose something that will >help identify the products contained with it: >r1 > >Local directory in which to save the generated certificate [current directory]: >^Z >[1]+ Stopped rhui-manager >[root@ip-10-99-21-158 ~]# mkdir r1 >[root@ip-10-99-21-158 ~]# fg >rhui-manager >/root/r1 > >Number of days the certificate should be valid [365]: > > >Repositories to be included in the entitlement certificate: > > Red Hat Repositories > Red Hat Update Infrastructure 2.0 (RPMs) > >Proceed? (y/n) y > >...............................................+++ >..............+++ >Entitlement certificate created at /root/r1/r1.crt > >------------------------------------------------------------------------------ >rhui (client) => c > >Full path to local directory in which the client configuration files generated by this tool >should be stored (if this directory does not exist, it will be created): >/root/r1 > >Name of the RPM: >r1 > >Version of the configuration RPM [2.0]: > > >Full path to the entitlement certificate authorizing the client to access >specific channels: >/root/r1/r1.crt > >Full path to the private key for the above entitlement certificate: >/root/r1/r1.key > > >Select the CDS cluster that clients will use to download content: > > 1 - cluster_1 >Enter value (1-1) or 'b' to abort: 1 > >Select the CDS instance (client hostnames are shown) >that should be the primary load balancer for the >client. All other CDS instances will be listed as >back up load balancers in the client's mirror list: > > 1 - ip-10-245-85-204.ec2.internal > 2 - ip-10-34-74-56.ec2.internal >Enter value (1-2) or 'b' to abort: 1 > >Load Balancer Order: > ip-10-245-85-204.ec2.internal > ip-10-34-74-56.ec2.internal > >Successfully created client configuration RPM. >RPMs can be found at /root/r1 > >------------------------------------------------------------------------------ >rhui (client) => q >[root@ip-10-99-21-158 ~]# grep ssl_ca_cert /etc/rhui/rhui-tools.conf >ssl_ca_cert: /etc/pki/rhua/rhua-ssl-ca-cert.crt >[root@ip-10-99-21-158 ~]# openssl x509 -in /etc/pki/rhua/rhua-ssl-ca-cert.crt -noout -extensions -subject >[root@ip-10-99-21-158 ~]# openssl x509 -in /etc/pki/rhua/rhua-ssl-ca-cert.crt -noout -extensions >usage: x509 args > -inform arg - input format - default PEM (one of DER, NET or PEM) > -outform arg - output format - default PEM (one of DER, NET or PEM) > -keyform arg - private key format - default PEM > -CAform arg - CA format - default PEM > -CAkeyform arg - CA key format - default PEM > -in arg - input file - default stdin > -out arg - output file - default stdout > -passin arg - private key password source > -serial - print serial number value > -subject_hash - print subject hash value > -subject_hash_old - print old-style (MD5) subject hash value > -issuer_hash - print issuer hash value > -issuer_hash_old - print old-style (MD5) issuer hash value > -hash - synonym for -subject_hash > -subject - print subject DN > -issuer - print issuer DN > -email - print email address(es) > -startdate - notBefore field > -enddate - notAfter field > -purpose - print out certificate purposes > -dates - both Before and After dates > -modulus - print the RSA key modulus > -pubkey - output the public key > -fingerprint - print the certificate fingerprint > -alias - output certificate alias > -noout - no certificate output > -ocspid - print OCSP hash values for the subject name and public key > -ocsp_uri - print OCSP Responder URL(s) > -trustout - output a "trusted" certificate > -clrtrust - clear all trusted purposes > -clrreject - clear all rejected purposes > -addtrust arg - trust certificate for a given purpose > -addreject arg - reject certificate for a given purpose > -setalias arg - set certificate alias > -days arg - How long till expiry of a signed certificate - def 30 days > -checkend arg - check whether the cert expires in the next arg seconds > exit 1 if so, 0 if not > -signkey arg - self sign cert with arg > -x509toreq - output a certification request object > -req - input is a certificate request, sign and output. > -CA arg - set the CA certificate, must be PEM format. > -CAkey arg - set the CA key, must be PEM format > missing, it is assumed to be in the CA file. > -CAcreateserial - create serial number file if it does not exist > -CAserial arg - serial file > -set_serial - serial number to use > -text - print the certificate in text form > -C - print out C code forms > -<dgst> - digest to use, see openssl dgst -h output for list > -extfile - configuration file with X509V3 extensions to add > -extensions - section from config file with X509V3 extensions to add > -clrext - delete extensions before signing and input certificate > -nameopt arg - various certificate name options > -engine e - use engine e, possibly a hardware device. > -certopt arg - various certificate text options >[root@ip-10-99-21-158 ~]# openssl x509 -in /etc/pki/rhua/rhua-ssl-ca-cert.crt -noout -subject >subject= /C=US/ST=NC/L=Raleigh/CN=localhost >[root@ip-10-99-21-158 ~]# ls >answers.txt aws-us-east-1.pem eu-west-1-rhui-01-entitlement-70111348270280.pem installRHUI.sh pem prepEC2partitions.sh r1 RHEL-6.3-RHUI-2.1-20120719.0-Server-x86_64-DVD1.iso rhuiCFG.tar rpmbuild >[root@ip-10-99-21-158 ~]# openssl x509 -in pem/ca.crt -noout -subject >subject= /C=US/ST=NC/L=Raleigh/CN=localhost >[root@ip-10-99-21-158 ~]# cd r1/r1-2.0/build/BUILD/ >[root@ip-10-99-21-158 BUILD]# openssl x509 -in r1-2.0/ >ca.crt content.crt key.pem rh-cloud.repo rhui-lb.conf rhui-lb.py rhui-load-balancers >[root@ip-10-99-21-158 BUILD]# openssl x509 -in r1-2.0/ca.crt -noout -text >Certificate: > Data: > Version: 3 (0x2) > Serial Number: > f5:d8:68:c0:6b:14:41:38 > Signature Algorithm: sha1WithRSAEncryption > Issuer: C=US, ST=NC, L=Raleigh, CN=localhost > Validity > Not Before: Jul 26 09:07:34 2012 GMT > Not After : Jul 26 09:07:34 2013 GMT > Subject: C=US, ST=NC, L=Raleigh, CN=localhost > Subject Public Key Info: > Public Key Algorithm: rsaEncryption > Public-Key: (2048 bit) > Modulus: > 00:e0:dc:96:bf:53:ea:ec:08:87:89:8e:1d:d8:60: > 2a:ce:0a:d0:94:56:53:a2:bb:2b:ad:5f:2e:e3:42: > 54:78:e8:21:bf:a0:fe:74:ab:b1:41:67:4a:6d:aa: > da:40:2d:6b:c7:3c:a9:11:a7:a7:90:e6:7e:bd:c1: > 16:5c:1d:de:7a:60:9d:28:ef:22:74:1e:2e:a1:0e: > a8:26:65:9f:c1:8e:45:8c:df:a2:d3:59:46:e1:a1: > 67:e8:2c:8d:00:b0:af:59:bd:e9:eb:7d:b8:20:1d: > 0d:6e:24:4e:d2:74:2b:3e:bb:f8:14:19:e7:bc:fa: > 3e:48:c1:24:79:02:1a:9b:80:c1:e8:f8:d3:8e:e7: > 26:3e:ea:1a:de:26:ab:d8:12:6c:e3:79:87:4a:9b: > 92:cb:95:4a:87:16:5c:d8:f4:f3:12:97:90:e8:23: > 60:89:4c:d6:46:9a:14:51:2a:01:39:55:b3:a1:0e: > 88:ca:4e:c9:2d:91:89:24:1f:e4:f3:4a:d5:49:d7: > e4:06:2c:d5:40:94:07:df:bb:89:ea:62:8b:30:8a: > f0:f3:f3:27:48:f8:61:27:f8:a7:15:b0:0c:96:50: > 89:62:f2:4b:08:32:51:70:44:b4:71:d3:ea:d1:99: > 99:3a:8c:ae:49:0b:ec:c9:58:b7:35:12:71:c5:24: > 26:e5 > Exponent: 65537 (0x10001) > X509v3 extensions: > X509v3 Subject Key Identifier: > AF:92:4F:3B:9A:5C:AE:B6:CD:00:3D:0C:BE:34:0E:D4:21:A5:07:EB > X509v3 Authority Key Identifier: > keyid:AF:92:4F:3B:9A:5C:AE:B6:CD:00:3D:0C:BE:34:0E:D4:21:A5:07:EB > > X509v3 Basic Constraints: > CA:TRUE > Signature Algorithm: sha1WithRSAEncryption > de:0f:6a:67:cc:96:a1:65:75:72:7d:7e:24:2b:e5:86:df:2f: > cb:14:bc:60:13:7d:ef:28:de:a4:c6:76:8b:04:75:98:2d:76: > 30:25:41:35:6b:db:e4:96:91:53:3c:40:8c:32:59:b8:76:06: > 9e:33:1e:b5:d7:3e:ba:09:d9:dc:f1:9d:9c:08:d4:a8:63:cc: > 8e:14:4d:fd:7e:17:bb:28:4e:21:6b:5a:37:2a:b8:ca:c2:c1: > e2:c0:ee:39:b8:b4:ac:80:1c:e2:55:be:3d:fd:49:33:3e:00: > 24:74:95:13:78:2d:ad:e0:a4:0f:17:85:44:5b:fd:c2:f9:52: > 02:78:1e:59:12:47:af:d2:ea:40:91:08:9e:10:9b:0f:7b:6d: > 7b:af:45:33:85:91:25:ef:36:fa:ee:e4:32:6a:c8:c5:23:86: > bd:25:29:9d:c1:a0:d9:a3:c0:e9:4e:c0:b8:65:cf:46:f1:66: > 26:7c:c0:16:7c:eb:cf:48:0d:c5:c3:c7:3c:0e:1b:b0:b7:30: > 00:45:7f:1a:16:8a:d2:f6:c1:b9:e9:2f:9b:03:8e:fe:1e:77: > 26:1d:e2:d6:60:0b:24:6f:1d:2a:75:32:a0:cb:95:bf:59:fd: > 90:9d:03:76:2a:ed:7e:28:15:43:18:bc:de:ce:f0:74:6f:d4: > 53:22:28:44 >[root@ip-10-99-21-158 BUILD]# openssl x509 -in r1-2.0/content.crt -noout -text >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 258 (0x102) > Signature Algorithm: sha1WithRSAEncryption > Issuer: C=US, ST=NC, L=Raleigh, CN=localhost > Validity > Not Before: Jul 26 11:37:23 2012 GMT > Not After : Jul 26 11:37:23 2013 GMT > Subject: CN=Red Hat Update Infrastructure > Subject Public Key Info: > Public Key Algorithm: rsaEncryption > Public-Key: (2048 bit) > Modulus: > 00:9c:03:3a:27:fa:99:be:89:23:9c:7a:f9:33:23: > 23:3f:19:5f:f9:95:38:dd:cb:e7:90:a9:27:c1:8b: > ae:53:a4:be:0c:2f:9f:3e:7e:de:89:51:3e:42:99: > 01:89:0c:35:fa:7a:95:c4:78:40:cb:4b:70:7d:fc: > ab:76:e4:e5:07:71:fe:39:67:2f:9b:cb:b5:c2:b2: > b1:d0:bc:08:dd:d1:3e:19:ed:6b:18:dc:28:f4:d6: > ee:8e:3e:85:31:0a:09:20:8a:f4:6f:da:ab:6c:fe: > 3f:7a:ae:3c:9f:e6:d6:25:69:c5:5e:fc:8a:b2:32: > 6b:5a:44:5c:95:5e:a6:98:89:9b:81:0d:72:da:f9: > 25:5f:66:e0:81:b0:58:d8:6a:39:e1:bf:ba:fd:aa: > 57:00:a5:82:7c:98:ce:cb:7d:4d:db:df:28:ce:50: > e1:05:10:eb:0c:d9:5b:32:81:4f:df:36:13:57:b6: > 85:de:64:df:a7:d1:30:3f:15:ba:30:fc:c1:9a:0b: > f5:c0:f4:48:17:0a:98:4c:34:e5:cf:6c:2b:46:69: > 02:15:99:fe:1c:46:2f:d0:ee:da:e5:73:5f:4b:9c: > 22:a2:f5:6c:6b:5d:80:6a:33:95:c5:08:a1:47:a2: > 13:37:16:c0:8f:15:9c:15:f6:a9:fb:fc:c7:13:85: > 7c:69 > Exponent: 65537 (0x10001) > X509v3 extensions: > X509v3 Basic Constraints: > CA:FALSE > 1.3.6.1.4.1.2312.9.2.1074.1.1: > .(Red Hat Update Infrastructure 2.0 (RPMs) > 1.3.6.1.4.1.2312.9.2.1074.1.2: > ..rhel-x86_64-6-rhui-2-rpms > 1.3.6.1.4.1.2312.9.2.1074.1.6: > .B/content/dist/rhel/rhui/server/6/$releasever/$basearch/rhui/2.0/os > Signature Algorithm: sha1WithRSAEncryption > da:6e:4b:d8:05:6a:8f:b7:64:2c:ff:83:5b:30:f4:a6:35:36: > 12:c2:a3:c6:30:15:c2:c7:52:99:30:ea:53:61:cd:a6:68:19: > 66:94:75:83:05:2d:c6:69:9d:5a:02:24:14:5e:80:dc:a8:c2: > 80:2c:ab:b4:d0:35:4a:9d:cf:84:03:76:51:23:1f:9e:5c:1f: > 86:a0:86:b8:4d:41:84:ab:03:d8:b9:5c:67:5a:93:bf:6c:05: > f3:9a:ef:5e:61:dc:3f:98:08:6f:ed:90:12:90:43:d1:b3:14: > 83:f3:b8:d6:5e:f1:22:4a:65:b7:65:0f:a8:2a:63:c2:9e:10: > 37:44:c2:d3:d9:8d:63:6b:34:cf:c6:ca:76:74:fc:a9:18:4c: > 4d:1e:2c:4c:a6:ab:25:c3:4e:e3:29:ab:7c:70:c4:58:98:b5: > 7e:7d:aa:3f:d8:02:fc:fa:7d:98:38:78:6b:6b:d1:ed:f7:eb: > 6c:7a:d1:c3:e9:e4:99:28:3b:5c:3d:19:25:83:b3:5d:8f:b5: > 31:3b:f5:11:7b:46:89:b7:06:5c:11:fa:84:74:cc:ca:18:d3: > f6:c5:33:80:e6:99:42:64:45:f9:52:bd:65:ea:71:bf:bb:0c: > ed:89:7b:66:c3:b9:dd:5e:b9:3d:33:24:d2:c0:ca:fb:67:44: > b0:96:40:84 >[root@ip-10-99-21-158 BUILD]# > >### CLIENT >[root@domU-12-31-39-16-B9-17 ~]# sed -i -e 's/^enabled=1/enabled=0/' /etc/yum.repos.d/rh-cloud.repo >[root@domU-12-31-39-16-B9-17 ~]# rpm -qf /etc/yum.repos.d/rh-cloud.repo >rh_3-2.0-1.noarch >[root@domU-12-31-39-16-B9-17 ~]# yum remove -y rh_3 >Loaded plugins: rhui-lb, security >Setting up Remove Process >Resolving Dependencies >--> Running transaction check >---> Package rh_3.noarch 0:2.0-1 will be erased >--> Finished Dependency Resolution > >Dependencies Resolved > >=========================================================================================================================================================================================================================================================================== > Package Arch Version Repository Size >=========================================================================================================================================================================================================================================================================== >Removing: > rh_3 noarch 2.0-1 installed 9.1 k > >Transaction Summary >=========================================================================================================================================================================================================================================================================== >Remove 1 Package(s) > >Installed size: 9.1 k >Downloading Packages: >Running rpm_check_debug >Running Transaction Test >Transaction Test Succeeded >Running Transaction >Warning: RPMDB altered outside of yum. > Erasing : rh_3-2.0-1.noarch 1/1 >warning: /etc/yum.repos.d/rh-cloud.repo saved as /etc/yum.repos.d/rh-cloud.repo.rpmsave > >Removed: > rh_3.noarch 0:2.0-1 > >Complete! >[root@domU-12-31-39-16-B9-17 ~]# yum clean all >Loaded plugins: security >Cleaning repos: >Cleaning up Everything >[root@domU-12-31-39-16-B9-17 ~]# rpm -Uvh /tmp/r1-2.0-1.noarch.rpm >Preparing... ########################################### [100%] > 1:r1 ########################################### [100%] >[root@domU-12-31-39-16-B9-17 ~]# rpm -ql r1 >/etc/pki/entitlement/ca.crt >/etc/pki/entitlement/key.pem >/etc/pki/entitlement/product/content.crt >/etc/yum.repos.d/rh-cloud.repo >/etc/yum.repos.d/rhui-load-balancers >/etc/yum/pluginconf.d/rhui-lb.conf >/usr/lib/yum-plugins/rhui-lb.py >[root@domU-12-31-39-16-B9-17 ~]# openssl x509 -in /etc/pki/entitlement/ca.crt -noout -subject >subject= /C=US/ST=NC/L=Raleigh/CN=localhost >[root@domU-12-31-39-16-B9-17 ~]# openssl x509 -in /etc/pki/entitlement/product/content.crt -noout -text >Certificate: > Data: > Version: 3 (0x2) > Serial Number: 258 (0x102) > Signature Algorithm: sha1WithRSAEncryption > Issuer: C=US, ST=NC, L=Raleigh, CN=localhost > Validity > Not Before: Jul 26 11:37:23 2012 GMT > Not After : Jul 26 11:37:23 2013 GMT > Subject: CN=Red Hat Update Infrastructure > Subject Public Key Info: > Public Key Algorithm: rsaEncryption > Public-Key: (2048 bit) > Modulus: > 00:9c:03:3a:27:fa:99:be:89:23:9c:7a:f9:33:23: > 23:3f:19:5f:f9:95:38:dd:cb:e7:90:a9:27:c1:8b: > ae:53:a4:be:0c:2f:9f:3e:7e:de:89:51:3e:42:99: > 01:89:0c:35:fa:7a:95:c4:78:40:cb:4b:70:7d:fc: > ab:76:e4:e5:07:71:fe:39:67:2f:9b:cb:b5:c2:b2: > b1:d0:bc:08:dd:d1:3e:19:ed:6b:18:dc:28:f4:d6: > ee:8e:3e:85:31:0a:09:20:8a:f4:6f:da:ab:6c:fe: > 3f:7a:ae:3c:9f:e6:d6:25:69:c5:5e:fc:8a:b2:32: > 6b:5a:44:5c:95:5e:a6:98:89:9b:81:0d:72:da:f9: > 25:5f:66:e0:81:b0:58:d8:6a:39:e1:bf:ba:fd:aa: > 57:00:a5:82:7c:98:ce:cb:7d:4d:db:df:28:ce:50: > e1:05:10:eb:0c:d9:5b:32:81:4f:df:36:13:57:b6: > 85:de:64:df:a7:d1:30:3f:15:ba:30:fc:c1:9a:0b: > f5:c0:f4:48:17:0a:98:4c:34:e5:cf:6c:2b:46:69: > 02:15:99:fe:1c:46:2f:d0:ee:da:e5:73:5f:4b:9c: > 22:a2:f5:6c:6b:5d:80:6a:33:95:c5:08:a1:47:a2: > 13:37:16:c0:8f:15:9c:15:f6:a9:fb:fc:c7:13:85: > 7c:69 > Exponent: 65537 (0x10001) > X509v3 extensions: > X509v3 Basic Constraints: > CA:FALSE > 1.3.6.1.4.1.2312.9.2.1074.1.1: > .(Red Hat Update Infrastructure 2.0 (RPMs) > 1.3.6.1.4.1.2312.9.2.1074.1.2: > ..rhel-x86_64-6-rhui-2-rpms > 1.3.6.1.4.1.2312.9.2.1074.1.6: > .B/content/dist/rhel/rhui/server/6/$releasever/$basearch/rhui/2.0/os > Signature Algorithm: sha1WithRSAEncryption > da:6e:4b:d8:05:6a:8f:b7:64:2c:ff:83:5b:30:f4:a6:35:36: > 12:c2:a3:c6:30:15:c2:c7:52:99:30:ea:53:61:cd:a6:68:19: > 66:94:75:83:05:2d:c6:69:9d:5a:02:24:14:5e:80:dc:a8:c2: > 80:2c:ab:b4:d0:35:4a:9d:cf:84:03:76:51:23:1f:9e:5c:1f: > 86:a0:86:b8:4d:41:84:ab:03:d8:b9:5c:67:5a:93:bf:6c:05: > f3:9a:ef:5e:61:dc:3f:98:08:6f:ed:90:12:90:43:d1:b3:14: > 83:f3:b8:d6:5e:f1:22:4a:65:b7:65:0f:a8:2a:63:c2:9e:10: > 37:44:c2:d3:d9:8d:63:6b:34:cf:c6:ca:76:74:fc:a9:18:4c: > 4d:1e:2c:4c:a6:ab:25:c3:4e:e3:29:ab:7c:70:c4:58:98:b5: > 7e:7d:aa:3f:d8:02:fc:fa:7d:98:38:78:6b:6b:d1:ed:f7:eb: > 6c:7a:d1:c3:e9:e4:99:28:3b:5c:3d:19:25:83:b3:5d:8f:b5: > 31:3b:f5:11:7b:46:89:b7:06:5c:11:fa:84:74:cc:ca:18:d3: > f6:c5:33:80:e6:99:42:64:45:f9:52:bd:65:ea:71:bf:bb:0c: > ed:89:7b:66:c3:b9:dd:5e:b9:3d:33:24:d2:c0:ca:fb:67:44: > b0:96:40:84 >[root@domU-12-31-39-16-B9-17 ~]# yum repolist >Loaded plugins: rhui-lb, security >rhui-rhel-x86_64-6-rhui-2-rpms | 2.6 kB 00:00 >repo id repo name status >rhui-rhel-x86_64-6-rhui-2-rpms Red Hat Update Infrastructure 2.0 (RPMs) 37 >repolist: 37 >[root@domU-12-31-39-16-B9-17 ~]# yumdownloader PyYAML >Loaded plugins: rhui-lb >PyYAML-3.09-14.el6_1.x86_64.rpm | 158 kB 00:00 >[root@domU-12-31-39-16-B9-17 ~]# >[root@domU-12-31-39-16-B9-17 ~]# curl --cacert /etc/pki/entitlement/ca.crt --key /etc/pki/entitlement/key.pem --cert /etc/pki/entitlement/product/content.crt https://ip-10-34-74-56.ec2.internal/pulp/repos/content/dist/rhel/rhui/server/6/6Server/x86_64/rhui/2.0/os/pulp-admin-0.0.263-18.el6.noarch.rpm > pulp-admin_cds1.rpm > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed >100 148k 100 148k 0 0 776k 0 --:--:-- --:--:-- --:--:-- 1390k >[root@domU-12-31-39-16-B9-17 ~]# curl --cacert /etc/pki/entitlement/ca.crt --key /etc/pki/entitlement/key.pem --cert /etc/pki/entitlement/product/content.crt https://ip-10-64-47-182.ec2.internal/pulp/repos/content/dist/rhel/rhui/server/6/6Server/x86_64/rhui/2.0/os/pu >lp-admin-0.0.263-18.el6.noarch.rpm > pulp-admin_cds2.rpm > >curl: (60) Peer certificate cannot be authenticated with known CA certificates >More details here: http://curl.haxx.se/docs/sslcerts.html > >curl performs SSL certificate verification by default, using a "bundle" > of Certificate Authority (CA) public keys (CA certs). If the default > bundle file isn't adequate, you can specify an alternate file > using the --cacert option. >If this HTTPS server uses a certificate signed by a CA represented in > the bundle, the certificate verification probably failed due to a > problem with the certificate (it might be expired, or the name might > not match the domain name in the URL). >If you'd like to turn off curl's verification of the certificate, use > the -k (or --insecure) option. >[root@domU-12-31-39-16-B9-17 ~]# curl --cacert /etc/pki/entitlement/ca.crt --key /etc/pki/entitlement/key.pem --cert /etc/pki/entitlement/product/content.crt https://ip-10-34-74-56.ec2.internal/pulp/repos/content/dist/rhel/rhui/server/6/6Server/x86_64/rhui/2.0/os/pul >p-admin-0.0.263-18.el6.noarch.rpm > pulp-admin_cds2.rpm > % Total % Received % Xferd Average Speed Time Time Time Current > Dload Upload Total Spent Left Speed >100 148k 100 148k 0 0 859k 0 --:--:-- --:--:-- --:--:-- 1390k >[root@domU-12-31-39-16-B9-17 ~]# md5sum pulp-admin_cds1.rpm >c8e243d79dacd4dd01fae8f35ecbe165 pulp-admin_cds1.rpm >[root@domU-12-31-39-16-B9-17 ~]# md5sum pulp-admin_cds2.rpm >c8e243d79dacd4dd01fae8f35ecbe165 pulp-admin_cds2.rpm >[root@domU-12-31-39-16-B9-17 ~]#
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 831188
: 600494