Bug 2133866
| Summary: | overcloud fails to deploy with FIPS and tls-everywhere | ||
|---|---|---|---|
| Product: | Red Hat OpenStack | Reporter: | Jeremy Agee <jagee> |
| Component: | openstack-tripleo-heat-templates | Assignee: | OSP Team <rhos-maint> |
| Status: | CLOSED ERRATA | QA Contact: | Joe H. Rahme <jhakimra> |
| Severity: | high | Docs Contact: | |
| Priority: | medium | ||
| Version: | 17.0 (Wallaby) | CC: | alee, jjoyce, jschluet, lmiccini, ltoscano, mburns, rhos-maint, slinaber, tvignaud |
| Target Milestone: | ga | Keywords: | Triaged |
| Target Release: | 17.1 | Flags: | astillma:
needinfo?
(rhos-maint) |
| Hardware: | x86_64 | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | openstack-tripleo-heat-templates-14.3.1-1.20230224221431.eef23eb.el9ost | Doc Type: | If docs needed, set a value |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2023-08-16 01:12:25 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
|
Description
Jeremy Agee
2022-10-11 16:44:26 UTC
/usr/share/openstack-tripleo-heat-templates/environments/fips.yaml already contains: parameter_defaults: # Set ISCSI Chap algorithms to specifically disallow MD5 IscsidCHAPAlgorithms: 'SHA3-256,SHA256,SHA1' # Set SnmpdReadonlyUserAuthType to not be 'MD5' SnmpdReadonlyUserAuthType: 'SHA' # Add RabbitAdditionalErlArgs for FIPS RabbitFIPS: true maybe we should add the gcomm_cipher override to this template (or expose it as parameter in THT?). Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Release of components for Red Hat OpenStack Platform 17.1 (Wallaby)), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHEA-2023:4577 |