Bug 1464546
Summary: | [3.2] openshift_cert_expiry Can not parse certs with DER encoded Serial Numbers | ||
---|---|---|---|
Product: | OpenShift Container Platform | Reporter: | Scott Dodson <sdodson> |
Component: | Installer | Assignee: | Tim Bielawa <tbielawa> |
Status: | CLOSED ERRATA | QA Contact: | Gaoyun Pei <gpei> |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | 3.2.1 | CC: | aos-bugs, jialiu, jokerman, mmccomas, tbielawa |
Target Milestone: | --- | ||
Target Release: | 3.2.1 | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: |
Cause: Hosts missing OpenSSL python library.
Consequence: Large Serial numbers could not be parsed using the existing manual parser work-around for missing OpenSSL libs.
Fix: Manual parser updated to account for format of certificates with large serial numbers.
Result: Certificates with large serials on hosts missing the OpenSSL python library can now be parsed (such as during cert expiration checking or certificate redeployment).
|
Story Points: | --- |
Clone Of: | 1464240 | Environment: | |
Last Closed: | 2017-06-29 13:34:41 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1464240 | ||
Bug Blocks: | 1464543, 1464544, 1464545 |
Description
Scott Dodson
2017-06-23 17:58:53 UTC
Verify this bug with openshift-ansible-3.2.61-1.git.0.4bf0fd2.el7 Generate a custom router cert issued by a self-signed CA cert, and the router cert should have a large serial number like: [cucushift@dhcp-129-188 files]$ openssl x509 -in m01.example.com.crt -text .. Serial Number: 0a:de:eb:24:04:75:ab:56:39:14:e9:5a:22:e2:85:c2 Install a containerized ocp-3.2 cluster on Atomic Host, set local router certificate used in ansible inventory file openshift_hosted_router_certificate={"certfile": "/files/m01.example.com.crt", "keyfile": "/files/m01.example.com.key", "cafile": "/files/rootCA.pem"} After installation finished, run certificate expiry checker easy-mode playbook ansible-playbook -i host_file /usr/share/ansible/openshift-ansible/playbooks/certificate_expiry/easy-mode.yaml The playbook works well without error. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2017:1666 |