Bug 1166593
Summary: | conflicting alias server name is listening on 443 port when user upload his own alias ssl cert. | ||
---|---|---|---|
Product: | OpenShift Container Platform | Reporter: | Johnny Liu <jialiu> |
Component: | Node | Assignee: | chris alfonso <calfonso> |
Status: | CLOSED ERRATA | QA Contact: | libra bugs <libra-bugs> |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | 2.2.0 | CC: | adellape, bleanhar, hbrock, jokerman, libra-onpremise-devel, mmccomas |
Target Milestone: | --- | ||
Target Release: | --- | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | rubygem-openshift-origin-routing-daemon-0.20.2.3-1.el6op | Doc Type: | Bug Fix |
Doc Text: |
In OpenShift Enterprise environments using the routing daemon with an nginx router, duplicate nginx configuration files were created if a user uploaded a SSL cert for an existing application alias. This was due to a bug in the routing daemon, and as a result, the application's SSL certificate was marked not trusted and nginx reported "conflicting server name" warnings. This bug fix updates the routing daemon to ensure these duplicate files are no longer created, and the issues no longer occur.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2014-12-10 13:25:17 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Johnny Liu
2014-11-21 10:16:41 UTC
Great idea on the solution for this. I've opened a PR upstream for this patch. https://github.com/openshift/origin-server/pull/5974 I'll get it merged into enterprise-server once it's upstream. Verified this bug with rubygem-openshift-origin-routing-daemon-0.20.2.3-1.el6op.noarch, and PASS. Now only one config nginx file for alias is built. [root@dhcp-128-178 conf.d]# pwd /opt/rh/nginx16/root/etc/nginx/conf.d [root@dhcp-128-178 conf.d]# ls alias_pool_ose_scaruby18app_jialiu_80_ha-scaruby18app-jialiu.example.com.conf pool_ose_scaruby18app_jialiu_80.conf www.app1.com.crt alias_pool_ose_scaruby18app_jialiu_80_www.app1.com.conf server.conf www.app1.com.key [root@dhcp-128-178 conf.d]# cat alias_pool_ose_scaruby18app_jialiu_80_www.app1.com.conf server { listen 80; server_name www.app1.com; location / { proxy_pass http://pool_ose_scaruby18app_jialiu_80; } } server { listen 443 ssl; ssl_certificate /opt/rh/nginx16/root/etc/nginx/conf.d/www.app1.com.crt; ssl_certificate_key /opt/rh/nginx16/root/etc/nginx/conf.d/www.app1.com.key; server_name www.app1.com; location / { proxy_pass http://pool_ose_scaruby18app_jialiu_80; } } $ curl --cacert server.crt https://www.app1.com|grep title % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 <title>Welcome to OpenShift</title> 100 39604 100 39604 0 0 232k 0 --:--:-- --:--:-- --:--:-- 234k It works well. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://rhn.redhat.com/errata/RHBA-2014-1979.html |