Bug 1260752
Summary: | RHEV-M upgrade to 3.5.4 fails with error "Command '/usr/bin/openssl' failed to execute" for custom apache.p12 | |||
---|---|---|---|---|
Product: | Red Hat Enterprise Virtualization Manager | Reporter: | nijin ashok <nashok> | |
Component: | ovirt-engine | Assignee: | Yedidyah Bar David <didi> | |
Status: | CLOSED ERRATA | QA Contact: | Gonza <grafuls> | |
Severity: | medium | Docs Contact: | ||
Priority: | medium | |||
Version: | 3.5.4 | CC: | bazulay, dfediuck, gklein, grafuls, iheim, lsurette, nashok, rbalakri, Rhev-m-bugs, sbonazzo, yeylon, ykaul, ylavi | |
Target Milestone: | ovirt-3.6.2 | Keywords: | ZStream | |
Target Release: | 3.6.2 | |||
Hardware: | Unspecified | |||
OS: | Unspecified | |||
Whiteboard: | ||||
Fixed In Version: | Doc Type: | Bug Fix | ||
Doc Text: | Story Points: | --- | ||
Clone Of: | ||||
: | 1286607 (view as bug list) | Environment: | ||
Last Closed: | 2016-03-09 21:13:09 UTC | Type: | Bug | |
Regression: | --- | Mount Type: | --- | |
Documentation: | --- | CRM: | ||
Verified Versions: | Category: | --- | ||
oVirt Team: | Integration | RHEL 7.3 requirements from Atomic Host: | ||
Cloudforms Team: | --- | Target Upstream Version: | ||
Embargoed: | ||||
Bug Depends On: | ||||
Bug Blocks: | 1286607 |
Description
nijin ashok
2015-09-07 15:32:30 UTC
Why is this bug severity is high? (In reply to Yaniv Dary from comment #1) > Why is this bug severity is high? I have reduced the severity and the customer have confirmed that the workaround resolves the issue. I wasn't aware of the fact that our documentation [1] tells to replace the files. A perhaps better approach (and workaround for current bug) would have been to instruct instead to put the custom key/cert outside of /etc/pki/ovirt-engine (in whatever place the user feels is appropriate) and edit /etc/httpd/conf.d/ssl.conf accordingly. Upstream says [2] that either are allowed, but later says [3] to not override (probably meant "overwrite"?) these files. The setup log attached to the case says that openssl outputs to stderr: Mac verify error: invalid password We can probably check for this and if so skip this cert, perhaps only for apache. Didn't check the output myself on other versions of OSes/openssl. Alon, what do you think? [1] https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Virtualization/3.5/html/Administration_Guide/appe-Red_Hat_Enterprise_Virtualization_and_SSL.html [2] http://www.ovirt.org/Features/PKI#User--SSL--.3Eapache--AJP--.3Eovirt-engine [3] http://www.ovirt.org/Features/PKI#ovirt-engine We already testing if CA is our CA when reading the apache.p12 before renew - indeed if password is incorrect we should ignore this as well. In perfect world, we would not have touched apache ssl configuration, but as the legacy setup had done so, we left it as is, and instructed people to replace the key/cert/p12 if they desire to modify ssl settings to avoid further touch of apache configuration. Note to QE: Current patch makes engine-setup output the following in such a case: [WARNING] Failed to read or parse '/etc/pki/ovirt-engine/keys/apache.p12' Perhaps it was changed since last Setup. Error was: Mac verify error: invalid password? It will do that twice per file - once during customization, right before asking whether to renew the CA, and again while actually renewing. I personally verified that by just changing the passphrase of apache.p12 and websocket-proxy.p12 . Please try also other combinations, e.g. also engine.p12 or jboss.p12 (might break stuff, doc (link above) mentions only apache.p12), and also by using a key/cert signed by a 3rd party CA, both using passphrase 'mypass' and something different. Verified with: rhevm-3.6.2-0.1.el6.noarch # engine-setup ... [WARNING] Failed to read or parse '/etc/pki/ovirt-engine/keys/apache.p12' Perhaps it was changed since last Setup. Error was: Mac verify error: invalid password? ... [WARNING] Failed to read or parse '/etc/pki/ovirt-engine/keys/jboss.p12' Perhaps it was changed since last Setup. Error was: 139818997311304:error:0D07207B:asn1 encoding routines:ASN1_get_object:header too long:asn1_lib.c:150: ... Engine upgraded successfully. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://rhn.redhat.com/errata/RHEA-2016-0376.html |