Bug 1669012
| Summary: | host_del and host_disable fails, ra.find() search for every certificates instead of the host's certificate by subject | |||
|---|---|---|---|---|
| Product: | Red Hat Enterprise Linux 7 | Reporter: | Marc Sauton <msauton> | |
| Component: | ipa | Assignee: | IPA Maintainers <ipa-maint> | |
| Status: | CLOSED ERRATA | QA Contact: | ipa-qe <ipa-qe> | |
| Severity: | urgent | Docs Contact: | ||
| Priority: | urgent | |||
| Version: | 7.6 | CC: | cheimes, frenaud, gparente, jwooten, ksiddiqu, myusuf, ndehadra, pvoborni, rcritten, tscherf | |
| Target Milestone: | rc | Keywords: | ZStream | |
| Target Release: | --- | |||
| Hardware: | All | |||
| OS: | Linux | |||
| Whiteboard: | ||||
| Fixed In Version: | ipa-4.6.5-1.el7 | Doc Type: | If docs needed, set a value | |
| Doc Text: | Story Points: | --- | ||
| Clone Of: | ||||
| : | 1672176 (view as bug list) | Environment: | ||
| Last Closed: | 2019-08-06 13:09:30 UTC | Type: | Bug | |
| Regression: | --- | Mount Type: | --- | |
| Documentation: | --- | CRM: | ||
| Verified Versions: | Category: | --- | ||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
| Cloudforms Team: | --- | Target Upstream Version: | ||
| Embargoed: | ||||
| Bug Depends On: | ||||
| Bug Blocks: | 1672176 | |||
|
Description
Marc Sauton
2019-01-24 06:39:22 UTC
cu considers this a production down situation, and is requesting a work around. Is there a method to get around this issue? Fixed upstream master: https://pagure.io/freeipa/c/ae74d348c3da580264c56441c136af3fc6ae58df https://pagure.io/freeipa/c/6cd37542e6c563ddd8595d488712935a4d6b17bf Upstream ticket: https://pagure.io/freeipa/issue/7835 Fixed upstream ipa-4-6: https://pagure.io/freeipa/c/1e842f0fea290cbf8935eea79ea16e17650b7328 https://pagure.io/freeipa/c/9a0783f5ac8a2c7426b4db3a818fa6583bab16e1 ipa-4-7: https://pagure.io/freeipa/c/a243bd56a65e47b03ee3ba772413b580aeb35ba9 https://pagure.io/freeipa/c/2ccd4da44b5d66298bf1d4938fa3dc6ce2dbfa84 Version: ipa-server-4.6.5-6.el7.x86_64 Steps: 1. add a host to ipa # ipa host-add test.testrelm.test --force 2. Add a service # ipa service-add testservice/test.testrelm.test --force 3. Add service to the host # ipa service-add-host testservice/test.testrelm.test --hosts=$(hostname) 4. Issue a certificate to use the service on host # ipa-getcert request -k /etc/pki/tls/private/testservice.key -f /etc/pki/tls/certs/testservice.pem -w -N CN=test.testrelm.test -D test.testrelm.test -K testservice/test.ipa.example 5. check issued certificate, status should be valid # ipa cert-find --subject=test.testrelm.test 6. delete the host # ipa host-del test.testrelm.test 7. check certificate status as revoked. # ipa cert-find --subject=test.testrelm.test Actual result: [root@master ~]# ipa host-add test.testrelm.test --force ------------------------------- Added host "test.testrelm.test" ------------------------------- Host name: test.testrelm.test Principal name: host/test.testrelm.test Principal alias: host/test.testrelm.test Password: False Keytab: False Managed by: test.testrelm.test [root@master ~]# [root@master ~]# ipa service-add testservice/test.testrelm.test --force ------------------------------------------------------------ Added service "testservice/test.testrelm.test" ------------------------------------------------------------ Principal name: testservice/test.testrelm.test Principal alias: testservice/test.testrelm.test Managed by: test.testrelm.test [root@master ~]# ipa service-add-host testservice/test.testrelm.test --hosts=$(hostname) Principal name: testservice/test.testrelm.test Principal alias: testservice/test.testrelm.test Managed by: test.testrelm.test, master.testrelm.test ------------------------- Number of members added 1 ------------------------- [root@master ~]# ipa-getcert request -k /etc/pki/tls/private/testservice.key -f /etc/pki/tls/certs/testservice.pem -w -N CN=test.testrelm.test -D test.testrelm.test -K testservice/test.testrelm.test New signing request "20190502112859" added. [root@master ~]# ipa cert-find --subject=test.testrelm.test --------------------- 1 certificate matched --------------------- Issuing CA: ipa Subject: CN=test.testrelm.test,O=TESTRELM.TEST Issuer: CN=Certificate Authority,O=TESTRELM.TEST Not Before: Thu May 02 16:59:02 2019 UTC Not After: Sun May 02 16:59:02 2021 UTC Serial number: 11 Serial number (hex): 0xB Status: VALID Revoked: False ---------------------------- Number of entries returned 1 ---------------------------- [root@master ~]# ipa host-del test.testrelm.test --------------------------------- Deleted host "test.testrelm.test" --------------------------------- [root@master ~]# ipa cert-find --subject=test.testrelm.test --------------------- 1 certificate matched --------------------- Issuing CA: ipa Subject: CN=test.testrelm.test,O=TESTRELM.TEST Issuer: CN=Certificate Authority,O=TESTRELM.TEST Not Before: Thu May 02 16:59:02 2019 UTC Not After: Sun May 02 16:59:02 2021 UTC Serial number: 11 Serial number (hex): 0xB Status: REVOKED Revoked: True ---------------------------- Number of entries returned 1 ---------------------------- Tested with around 46k certificate. Host delete properly revokes the certificate. [root@master ~]# ipa cert-find --sizelimit=0 [..] -------------------------------- Number of entries returned 46417 -------------------------------- [root@master ~]# ipa host-del test1525437.testrelm.test ---------------------------------------- Deleted host "test1525437.testrelm.test" ---------------------------------------- [root@master ~]# [root@master ~]# [root@master ~]# ipa cert-find --subject=test1525437.testrelm.test ipa: WARNING: Search result has been truncated: Configured size limit exceeded --------------------- 1 certificate matched --------------------- Issuing CA: ipa Subject: CN=test1525437.testrelm.test,O=TESTRELM.TEST Issuer: CN=Certificate Authority,O=TESTRELM.TEST Not Before: Thu May 09 12:44:08 2019 UTC Not After: Sun May 09 12:44:08 2021 UTC Serial number: 46417 Serial number (hex): 0xB551 Status: REVOKED Revoked: True ---------------------------- Number of entries returned 1 ---------------------------- Automation also passed in CI. Hence based on these observations, marking the bug as verified. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2019:2241 |