Bug 1600866

Summary: katello-certs-check print "foreman-installer --scenario katello" and "foreman-proxy-certs-generate" on sat 6.4
Product: Red Hat Satellite Reporter: Nikhil Kathole <nkathole>
Component: BrandingAssignee: satellite6-bugs <satellite6-bugs>
Status: CLOSED ERRATA QA Contact: Nikhil Kathole <nkathole>
Severity: medium Docs Contact:
Priority: unspecified    
Version: 6.4CC: egolov, ehelms, inecas, pcreech, rdrazny, spetrosi, sshtein, zhunting
Target Milestone: 6.4.0Keywords: Regression, Triaged
Target Release: Unused   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: katello-installer-base-3.7.0.3-1 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2018-10-16 19:25:54 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 1625255    

Description Nikhil Kathole 2018-07-13 08:39:10 UTC
Description of problem: Output of katello-certs-check utility prints

To install the Katello main server with the custom certificates, run:

    foreman-installer --scenario katello\
                      --certs-server-cert "/tmp/server.valid.crt"\
                      --certs-server-key "/tmp/server.key"\
                      --certs-server-ca-cert "/tmp/rootCA.pem"

To update the certificates on a currently running Katello installation, run:

    foreman-installer --scenario katello\
                      --certs-server-cert "/tmp/server.valid.crt"\
                      --certs-server-key "/tmp/server.key"\
                      --certs-server-ca-cert "/tmp/rootCA.pem"\
                      --certs-update-server --certs-update-server-ca

To use them inside a NEW $FOREMAN_PROXY, run this command:

    foreman-proxy-certs-generate --foreman-proxy-fqdn "$FOREMAN_PROXY"\
                                 --certs-tar  "~/$FOREMAN_PROXY-certs.tar"\
                                 --server-cert "/tmp/server.valid.crt"\
                                 --server-key "/tmp/server.key"\
                                 --server-ca-cert "/tmp/rootCA.pem"\

To use them inside an EXISTING $FOREMAN_PROXY, run this command INSTEAD:

    foreman-proxy-certs-generate --foreman-proxy-fqdn "$FOREMAN_PROXY"\
                                 --certs-tar  "~/$FOREMAN_PROXY-certs.tar"\
                                 --server-cert "/tmp/server.valid.crt"\
                                 --server-key "/tmp/server.key"\
                                 --server-ca-cert "/tmp/rootCA.pem"\
                                 --certs-update-server


Version-Release number of selected component (if applicable):

Satellite 6.4 snap 11


How reproducible: always


Steps to Reproduce:
1. katello-certs-check -c /tmp/server.valid.crt -k /tmp/server.key -b /tmp/rootCA.pem

Actual results: Output prints "foreman-installer --scenario katello" and "foreman-proxy-certs-generate".


Expected results: Output should print "satellite-installer --scenario satellite"
and "capsule-certs-generate"


Additional info:

Comment 3 Nikhil Kathole 2018-07-23 08:23:25 UTC
VERIFIED

Version tested:
satellite 6.4 snap 13

Validation succeeded.

To install the Katello main server with the custom certificates, run:

    satellite-installer --scenario satellite\
                      --certs-server-cert "/tmp/server.valid.crt"\
                      --certs-server-key "/tmp/server.key"\
                      --certs-server-ca-cert "/tmp/rootCA.pem"

To update the certificates on a currently running Katello installation, run:

    satellite-installer --scenario satellite\
                      --certs-server-cert "/tmp/server.valid.crt"\
                      --certs-server-key "/tmp/server.key"\
                      --certs-server-ca-cert "/tmp/rootCA.pem"\
                      --certs-update-server --certs-update-server-ca

To use them inside a NEW $FOREMAN_PROXY, run this command:

    capsule-certs-generate --foreman-proxy-fqdn "$FOREMAN_PROXY"\
                                 --certs-tar  "~/$FOREMAN_PROXY-certs.tar"\
                                 --server-cert "/tmp/server.valid.crt"\
                                 --server-key "/tmp/server.key"\
                                 --server-ca-cert "/tmp/rootCA.pem"\

To use them inside an EXISTING $FOREMAN_PROXY, run this command INSTEAD:

    capsule-certs-generate --foreman-proxy-fqdn "$FOREMAN_PROXY"\
                                 --certs-tar  "~/$FOREMAN_PROXY-certs.tar"\
                                 --server-cert "/tmp/server.valid.crt"\
                                 --server-key "/tmp/server.key"\
                                 --server-ca-cert "/tmp/rootCA.pem"\
                                 --certs-update-server

Comment 9 Nikhil Kathole 2018-09-10 14:11:26 UTC
VERIFIED

Version tested:
sat 6.4 snap 21

if CN=$(hostname)

Checking server certificate encoding: 
[OK]

Checking expiration of certificate: 
[OK]

Checking expiration of CA bundle: 
[OK]

Checking if server certificate has CA:TRUE flag 
[OK]

Checking to see if the private key matches the certificate: 
[OK]

Checking CA bundle against the certificate file: 
[OK]

Checking Subject Alt Name on certificate 
[WARNING]

The /root/server.valid.crt does not contain a Subject Alt Name.
Checking Key Usage extension on certificate for Key Encipherment 
[OK]

Validation succeeded


To install the Katello main server with the custom certificates, run:

    satellite-installer --scenario satellite\
                      --certs-server-cert "/root/server.valid.crt"\
                      --certs-server-key "/root/server.key"\
                      --certs-server-ca-cert "/root/rootCA.pem"

To update the certificates on a currently running Katello installation, run:

    satellite-installer --scenario satellite\
                      --certs-server-cert "/root/server.valid.crt"\
                      --certs-server-key "/root/server.key"\
                      --certs-server-ca-cert "/root/rootCA.pem"\
                      --certs-update-server --certs-update-server-ca

if CN!=$(hostname)

Checking server certificate encoding: 
[OK]

Checking expiration of certificate: 
[OK]

Checking expiration of CA bundle: 
[OK]

Checking if server certificate has CA:TRUE flag 
[OK]

Checking to see if the private key matches the certificate: 
[OK]

Checking CA bundle against the certificate file: 
[OK]

Checking Subject Alt Name on certificate 
[WARNING]

The /root/server.valid.crt does not contain a Subject Alt Name.
Checking Key Usage extension on certificate for Key Encipherment 
[OK]

Validation succeeded


  To use them inside a NEW $FOREMAN_PROXY, run this command:

      capsule-certs-generate --foreman-proxy-fqdn "$FOREMAN_PROXY"\
                                   --certs-tar  "~/$FOREMAN_PROXY-certs.tar"\
                                   --server-cert "/root/server.valid.crt"\
                                   --server-key "/root/server.key"\
                                   --server-ca-cert "/root/rootCA.pem"\

  To use them inside an EXISTING $FOREMAN_PROXY, run this command INSTEAD:

      capsule-certs-generate --foreman-proxy-fqdn "$FOREMAN_PROXY"\
                                   --certs-tar  "~/$FOREMAN_PROXY-certs.tar"\
                                   --server-cert "/root/server.valid.crt"\
                                   --server-key "/root/server.key"\
                                   --server-ca-cert "/root/rootCA.pem"\
                                   --certs-update-server

Comment 12 Bryan Kearney 2018-10-16 19:25:54 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHSA-2018:2927