Bug 1669257
Summary: | [RFE] Offline Certificate Renewal System | ||||||
---|---|---|---|---|---|---|---|
Product: | Red Hat Enterprise Linux 8 | Reporter: | Matthew Harmsen <mharmsen> | ||||
Component: | pki-core | Assignee: | Dinesh Prasanth <dmoluguw> | ||||
Status: | CLOSED CURRENTRELEASE | QA Contact: | Asha Akkiangady <aakkiang> | ||||
Severity: | urgent | Docs Contact: | Marc Muehlfeld <mmuehlfe> | ||||
Priority: | urgent | ||||||
Version: | 8.0 | CC: | cpelland, dmoluguw, ftweedal, sumenon | ||||
Target Milestone: | rc | Keywords: | FutureFeature, TestCaseProvided | ||||
Target Release: | 8.0 | ||||||
Hardware: | Unspecified | ||||||
OS: | Unspecified | ||||||
Whiteboard: | |||||||
Fixed In Version: | pki-core-10.6-820181130193715.5a87be8a | Doc Type: | Enhancement | ||||
Doc Text: |
.Certificate System now supports offline renewal of system certificates
With this enhancement, administrators can use the offline renewal feature to renew system certificates configured in Certificate System. When a system certificate expires, Certificate System fails to start. As a result of the enhancement, administrators no longer need workarounds to replace an expired system certificate.
|
Story Points: | --- | ||||
Clone Of: | 1468348 | Environment: | |||||
Last Closed: | 2019-06-14 01:20:24 UTC | Type: | Bug | ||||
Regression: | --- | Mount Type: | --- | ||||
Documentation: | --- | CRM: | |||||
Verified Versions: | Category: | --- | |||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
Cloudforms Team: | --- | Target Upstream Version: | |||||
Embargoed: | |||||||
Bug Depends On: | 1468348, 1690191, 1696849 | ||||||
Bug Blocks: | 1472344, 1550132, 1644708 | ||||||
Attachments: |
|
Comment 1
Dinesh Prasanth
2019-01-24 19:33:38 UTC
Fix is seen. Verified using [root@pki test]# cat /etc/redhat-release Red Hat Enterprise Linux release 8.0 Beta (Ootpa) [root@pki test]# rpm -qa | grep pki pki-base-10.6.9-2.module+el8+2728+a4ad6bba.noarch pki-base-java-10.6.9-2.module+el8+2728+a4ad6bba.noarch pki-servlet-container-9.0.7-13.module+el8+2468+c564cec5.noarch python3-pki-10.6.9-2.module+el8+2728+a4ad6bba.noarch pki-symkey-10.6.9-2.module+el8+2728+a4ad6bba.x86_64 pki-tools-10.6.9-2.module+el8+2728+a4ad6bba.x86_64 pki-ca-10.6.9-2.module+el8+2728+a4ad6bba.noarch pki-servlet-4.0-api-9.0.7-13.module+el8+2468+c564cec5.noarch pki-server-10.6.9-2.module+el8+2728+a4ad6bba.noarch Created attachment 1536592 [details]
Verified Steps
Marking the bug as VERIFIED as per comment #7 and #8. Corner cases identified: ======================== 1. PKI server needs to operate on default secure port 8443 for the `cert-fix` tool to submit system certificates renewal request. Sol: The port is hardcoded: https://github.com/dogtagpki/pki/blob/master/base/server/python/pki/server/__init__.py#L378 We can modify the code to accept a port number via `-p <port>` option. 2. While running the `cert-fix` tool, we saw the following error. ```` [root@master test]# pki-server cert-fix -d . -c Secret123 -n caadmin2 --cert sslserver -i topology-02-CA ERROR: HTTPSConnectionPool(host='master.rhel80.test', port=8443): Max retries exceeded with url: /ca/rest/certrequests/profiles/caManualRenewal (Caused by SSLError(SSLError(185073780, '[X509: KEY_VALUES_MISMATCH] key values mismatch (_ssl.c:3550)'),)) ```` This error was seen only when `Root CA signing` cert was imported into the client NSS db. To track corner cases, a new BZ has been filed: https://bugzilla.redhat.com/show_bug.cgi?id=1679480 *** Bug 1403016 has been marked as a duplicate of this bug. *** |