Bug 1194093
Summary: | [RFE] Update puppet provisioning snippet & installers to support sha256 | ||
---|---|---|---|
Product: | Red Hat Satellite | Reporter: | Rich Jerrido <rjerrido> |
Component: | Provisioning | Assignee: | Marek Hulan <mhulan> |
Status: | CLOSED ERRATA | QA Contact: | Peter Ondrejka <pondrejk> |
Severity: | medium | Docs Contact: | |
Priority: | unspecified | ||
Version: | 6.0.7 | CC: | bkearney, bscalio, egolov, jlyle, ktordeur, roywilli, rwicker |
Target Milestone: | 6.6.0 | Keywords: | FutureFeature, Triaged |
Target Release: | Unused | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | foreman-1.22.0-0 | Doc Type: | Enhancement |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2019-10-22 12:46:40 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Rich Jerrido
2015-02-19 01:14:04 UTC
Since this issue was entered in Red Hat Bugzilla, the release flag has been set to ? to ensure that it is properly evaluated for this release. Discussed this with stbenjam, another way to implement this could be via an installer option to (katello|foreman)-installer, such as --puppet-digest=sha256 This would allow the end-user to 'opt-in' to the change. As in current versions of Puppet, the client and server MUST be configured to use the same digest algorithm, this would be a fair way to implement this request. Per 6.3 planning, moving out non acked bugs to the backlog It appears fixed with some error handling issues upstream in Puppet ... is the lack of an ack here meaning this will not be in 6.3? The Satellite Team is attempting to provide an accurate backlog of bugzilla requests which we feel will be resolved in the next few releases. We do not believe this bugzilla will meet that criteria, and have plans to close it out in 1 month. This is not a reflection on the validity of the request, but a reflection of the many priorities for the product. If you have any concerns about this, feel free to contact Red Hat Technical Support or your account team. If we do not hear from you, we will close this bug out. Thank you. Upstream bug assigned to mhulan Moving this bug to POST for triage into Satellite 6 since the upstream issue https://projects.theforeman.org/issues/26203 has been resolved. Based on comment 14, not going to close this :) Verified on Satellite 6.6 snap 13, the provisioning templates have been updated to have the fips condition. The host provisioned from hostgroup with the fips_enabled parameter on has fips mode enabled as expected. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2019:3172 |