| Summary: | Named certificates with SANs cause duplicate name entries when cafile is specified | ||
|---|---|---|---|
| Product: | OpenShift Container Platform | Reporter: | Scott Dodson <sdodson> |
| Component: | Installer | Assignee: | Andrew Butcher <abutcher> |
| Status: | CLOSED ERRATA | QA Contact: | Wenkai Shi <weshi> |
| Severity: | medium | Docs Contact: | |
| Priority: | medium | ||
| Version: | 3.2.1 | CC: | abutcher, aos-bugs, gpei, jialiu, jokerman, mmccomas |
| Target Milestone: | --- | ||
| Target Release: | 3.2.1 | ||
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | Bug Fix | |
| Doc Text: |
Previously, named certificates which had matching hostnames in CN and subjectAlternativeNames certificate entries would cause duplicate hostnames to be detected and configured in /etc/origin/master/master-config.yaml. This would cause an error and prevent the master from starting. Duplicate hostnames are now correctly removed from detected certificate names.
|
Story Points: | --- |
| Clone Of: | 1379841 | Environment: | |
| Last Closed: | 2016-10-03 14:52:09 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Bug Depends On: | 1379841 | ||
| Bug Blocks: | |||
|
Description
Scott Dodson
2016-09-27 20:24:34 UTC
Backported to release-1.2 https://github.com/openshift/openshift-ansible/pull/2509 Verify this bug with openshift-ansible-3.2.33-1.git.0.899bad8.el7.noarch.rpm
Prepare named certificates as required:
ca.crt master.example.com.crt master.example.com.key
[root@jenkins-slave-1 slave1]# openssl x509 -in master.example.com.crt -text
Certificate:
...
Subject: C=US, ST=North Carolina, L=Raleigh, OU=OpenShift, CN=master.example.com
...
X509v3 extensions:
X509v3 Basic Constraints:
CA:FALSE
X509v3 Key Usage:
Digital Signature, Non Repudiation, Key Encipherment
X509v3 Subject Alternative Name:
DNS:master.example.com, DNS:internal-master.example.com
master.example.com shown in both of CN and subjectAlternativeNames fields
During installation, master was configured correctly in master-config.yaml, and installation was successful.
namedCertificates:
- certFile: /etc/origin/master/named_certificates/master.example.com.crt
keyFile: /etc/origin/master/named_certificates/master.example.com.key
names:
- "internal-master.example.com"
- "master.example.com"
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2016:1984 |