| Summary: | The re-encrypt route termination does not work as expected | ||||||
|---|---|---|---|---|---|---|---|
| Product: | OpenShift Container Platform | Reporter: | Meng Bo <bmeng> | ||||
| Component: | Networking | Assignee: | Maru Newby <mnewby> | ||||
| Networking sub component: | router | QA Contact: | zhaozhanqi <zzhao> | ||||
| Status: | CLOSED CURRENTRELEASE | Docs Contact: | |||||
| Severity: | medium | ||||||
| Priority: | medium | CC: | aos-bugs, eparis, mpatel, pweil, ramr, rchopra, rpenta | ||||
| Version: | 3.1.0 | Keywords: | Regression | ||||
| Target Milestone: | --- | ||||||
| Target Release: | --- | ||||||
| Hardware: | Unspecified | ||||||
| OS: | Unspecified | ||||||
| Whiteboard: | |||||||
| Fixed In Version: | Doc Type: | Bug Fix | |||||
| Doc Text: | Story Points: | --- | |||||
| Clone Of: | Environment: | ||||||
| Last Closed: | 2016-01-29 20:58:15 UTC | Type: | Bug | ||||
| Regression: | --- | Mount Type: | --- | ||||
| Documentation: | --- | CRM: | |||||
| Verified Versions: | Category: | --- | |||||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
| Cloudforms Team: | --- | Target Upstream Version: | |||||
| Attachments: |
|
||||||
|
Description
Meng Bo
2016-01-15 09:26:42 UTC
Created attachment 1115270 [details]
haproxy stats
Hi Bo. We had a recent issue where the certificates expired in the hello-nginx-docker project. That was likely causing your backends to be disabled when the haproxy verify check was running.
I did a couple things to test. First, I pulled one of the certs being used in the pod def to double check the validity:
[vagrant@localhost ~]$ openssl x509 -in test.pem -noout -text
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 2 (0x2)
Signature Algorithm: sha1WithRSAEncryption
Issuer: C=US, ST=SC, L=Default City, O=Default Company Ltd, OU=Test CA, CN=www.exampleca.com/emailAddress=example
Validity
Not Before: Jan 13 13:34:02 2015 GMT
Not After : Jan 13 13:34:02 2016 GMT
Subject: CN=www.example2.com, ST=SC, C=SU/emailAddress=example, O=Example2, OU=Example2
Next, I rebuilt the pweil/hello-nginx-docker container after refreshing the chain cert. After that I ran your json file and looked at the stats url (attached). The bmeng/hello-nginx-docker pod is marked as down but the pweil/hello-nginx-docker pod is not.
Then I ran your json with 2 of my containers, edited one of the index.html files via oc exec and was able to successfully test a reencrypt route round robin between backend: https://gist.github.com/pweil-/60ea7d95adf6048b01d3
I've pushed the latest pweil/hello-nginx-docker container to the hub if you want to test with it and updated the chain cert in github if you want to build your own version.
Just for completeness, the reason the backend was marked down in haproxy was Layer6 invalid response: SSL handshake failure (which led to looking at the pod certs that nginx was using). Paul, thanks very much. It works well after pulled the latest image from pweil/hello-nginx-docker # curl --resolve www.example2.com:443:10.14.6.143 https://www.example2.com/ -k Hello World Checked my old haproxy status page, it has the same error as you described. |