Back to bug 1313379
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Yaniv Lavi | 2016-03-02 10:49:53 UTC | CC | ydary | |
| oVirt Team | Gluster | Virt | ||
| Tomas Jelinek | 2016-03-02 11:11:16 UTC | CC | cfergeau, tjelinek | |
| Flags | needinfo?(cfergeau) | |||
| Christophe Fergeau | 2016-03-02 11:16:42 UTC | Flags | needinfo?(cfergeau) | |
| Yaniv Lavi | 2016-03-07 11:51:58 UTC | Flags | needinfo?(cfergeau) | |
| Christophe Fergeau | 2016-03-18 17:07:17 UTC | Flags | needinfo?(cfergeau) | |
| Tomas Jelinek | 2016-03-22 08:40:17 UTC | Flags | needinfo?(cfergeau) | |
| Tomas Jelinek | 2016-03-22 09:10:41 UTC | CC | sbonazzo | |
| Flags | needinfo?(cfergeau) | needinfo?(sbonazzo) | ||
| Sandro Bonazzola | 2016-03-22 10:22:15 UTC | CC | didi | |
| Flags | needinfo?(sbonazzo) | needinfo?(didi) | ||
| Tomas Jelinek | 2016-03-23 08:37:57 UTC | Blocks | 1310553 | |
| Michal Skrivanek | 2016-03-24 14:54:38 UTC | CC | michal.skrivanek | |
| Assignee | nobody | tjelinek | ||
| Target Milestone | --- | ovirt-4.0.0 | ||
| John Skeoch | 2016-04-18 07:25:10 UTC | CC | yeylon | srevivo |
| Yaniv Kaul | 2016-05-08 10:49:16 UTC | Severity | unspecified | medium |
| Yaniv Lavi | 2016-05-09 10:58:25 UTC | Target Milestone | ovirt-4.0.0-alpha | ovirt-4.0.0-beta |
| Tomas Jelinek | 2016-05-19 07:34:52 UTC | Target Milestone | ovirt-4.0.0-beta | ovirt-4.0.0-rc |
| Tomas Jelinek | 2016-05-27 10:54:26 UTC | Link ID | oVirt gerrit 58178 | |
| Status | NEW | POST | ||
| Flags | needinfo?(didi) | |||
| Tomas Jelinek | 2016-05-31 08:03:26 UTC | Link ID | oVirt gerrit 58327 | |
| Status | POST | MODIFIED | ||
| Moran Goldboim | 2016-06-01 08:13:07 UTC | Link ID | oVirt gerrit 58344 | |
| Link ID | oVirt gerrit 58346 | |||
| Priority | unspecified | medium | ||
| CC | mgoldboi | |||
| Anton Marchukov | 2016-06-02 14:04:51 UTC | Target Release | --- | 4.0.0 |
| CC | amarchuk | |||
| meital avital | 2016-06-05 12:36:06 UTC | Status | MODIFIED | ON_QA |
| CC | mavital | |||
| QA Contact | ipinto | |||
| Yaniv Lavi | 2016-07-04 09:29:19 UTC | CC | ydary | |
| Tomas Jelinek | 2016-07-29 08:07:03 UTC | Doc Text | Cause: oVirt always puts the engine's CA into the .vv file Consequence: If custom HTTPS certificate signed by custom CA is used in Apache, then users won't be able to use the foreign menu of remote-viewer. Fix: If custom HTTPS certificate signed by custom CA is used, the instructions as described in https://bugzilla.redhat.com/show_bug.cgi?id=1336838 have to be followed to make engine aware that custom CA is used. After following this instruction, the client system needs to be set up to trust this CA. Result: In this case the engine will not put the engine's CA into the .vv file and consequently remote-viewer will trust the CAs trusted by the client system. If the client system trusts this particular CA, the foreign menu will work properly. |
|
| Andrei Stepanov | 2016-07-29 08:51:50 UTC | CC | astepano, spice-qe-bugs | |
| Israel Pinto | 2016-08-02 10:44:16 UTC | Status | ON_QA | VERIFIED |
| Byron Gravenorst | 2016-08-18 06:37:55 UTC | CC | bgraveno | |
| Doc Text | Cause: oVirt always puts the engine's CA into the .vv file Consequence: If custom HTTPS certificate signed by custom CA is used in Apache, then users won't be able to use the foreign menu of remote-viewer. Fix: If custom HTTPS certificate signed by custom CA is used, the instructions as described in https://bugzilla.redhat.com/show_bug.cgi?id=1336838 have to be followed to make engine aware that custom CA is used. After following this instruction, the client system needs to be set up to trust this CA. Result: In this case the engine will not put the engine's CA into the .vv file and consequently remote-viewer will trust the CAs trusted by the client system. If the client system trusts this particular CA, the foreign menu will work properly. | Red Hat Virtualization always puts the Manager's CA into the .vv file. If a custom HTTPS certificate signed by a custom CA is used in Apache, then users won't be able to use the foreign menu of remote-viewer. Follow the instructions in https://bugzilla.redhat.com/show_bug.cgi?id=1336838 to make the Manager aware that a custom CA is used. In this case the Manager will not place the CA into the .vv file and consequently the remote-viewer will trust the CAs trusted by the client system. If the client system trusts this particular CA, the foreign menu will work properly. |
||
| errata-xmlrpc | 2016-08-23 02:10:22 UTC | Status | VERIFIED | RELEASE_PENDING |
| errata-xmlrpc | 2016-08-23 20:32:38 UTC | Status | RELEASE_PENDING | CLOSED |
| Resolution | --- | ERRATA | ||
| Last Closed | 2016-08-23 16:32:38 UTC |
Back to bug 1313379