Bug 1100226 - can't login the rhevh with correct password exception happened.
Summary: can't login the rhevh with correct password exception happened.
Keywords:
Status: CLOSED CURRENTRELEASE
Alias: None
Product: Red Hat Enterprise Virtualization Manager
Classification: Red Hat
Component: ovirt-node-plugin-vdsm
Version: 3.4.0
Hardware: Unspecified
OS: Unspecified
urgent
urgent
Target Milestone: ---
: 3.4.0
Assignee: Douglas Schilling Landgraf
QA Contact: cshao
URL:
Whiteboard: infra
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2014-05-22 10:25 UTC by cshao
Modified: 2016-02-10 19:30 UTC (History)
21 users (show)

Fixed In Version: ovirt-node-plugin-vdsm-0.1.1-21.el6ev
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed:
oVirt Team: Infra
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)
loginfo.png (77.43 KB, image/png)
2014-05-22 10:25 UTC, cshao
no flags Details


Links
System ID Private Priority Status Summary Last Updated
oVirt gerrit 28043 0 master MERGED engine_page: catch exception from vdscli.connect() Never
oVirt gerrit 28069 0 node-3.0 MERGED engine_page: catch exception from vdscli.connect() Never

Description cshao 2014-05-22 10:25:45 UTC
Created attachment 898331 [details]
loginfo.png

Description of problem:
Can't login the hypervisor with correct password.
Exception: No permission to read file: /etc/pki/vdsm/keys/vdsmkey.pem

Version-Release number of selected component (if applicable):
rhev-hypervisor6-6.5-20140521.0.el6ev
ovirt-node-3.0.1-18.el6_5.10.noarch
ovirt-node-plugin-vdsm-0.1.1-20.el6ev.noarch
vdsm-4.14.7-3.el6ev.x86_64

How reproducible:
100%

Steps to Reproduce:
1. Install rhev-hypervisor6-6.5-20140521.0.el6ev.
2. After reboot, login the hypervisor with correct password.
3. Please see attachment for more details.

Actual results:
Can't login the hypervisor with correct password, it will jump to the login screen again.

Expected results:
login the hypervisor with correct password can successful.

Additional info:
No such issue with rhev-hypervisor6-6.5-20140513.0(vdsm-4.14.7-2.el6ev.x86_64), so it is a regression bug.

Comment 3 Fabian Deutsch 2014-05-22 11:11:37 UTC
Moving to ovirt-node-plugin-vdsm as this should handle this exception correctly.

Comment 4 Dan Kenigsberg 2014-05-22 13:39:26 UTC
"No permission to read file: /etc/pki/vdsm/keys/vdsmkey.pem"

This was caused by http://gerrit.ovirt.org/#/c/27779/ (the fix for bug 1097645).

Which user runs the the TUI? I think it's safe to add it to the kvm group.

Comment 5 cshao 2014-05-23 02:53:29 UTC
(In reply to Dan Kenigsberg from comment #4)
> "No permission to read file: /etc/pki/vdsm/keys/vdsmkey.pem"
> 
> This was caused by http://gerrit.ovirt.org/#/c/27779/ (the fix for bug
> 1097645).
> 
> Which user runs the the TUI? I think it's safe to add it to the kvm group.
admin user can't login.


Enter rescue mode and set password for root user, and then login the hypervisor with root can successful, but run "setup" command can't enter TUI and encounter the original bug again.

Thanks!

Comment 6 Douglas Schilling Landgraf 2014-05-23 19:21:49 UTC
(In reply to Dan Kenigsberg from comment #4)
> "No permission to read file: /etc/pki/vdsm/keys/vdsmkey.pem"
> 
> This was caused by http://gerrit.ovirt.org/#/c/27779/ (the fix for bug
> 1097645).
> 
> Which user runs the the TUI? I think it's safe to add it to the kvm group.

Just to clarify, what happened:
vdscli.py cannot find /etc/pki/vdsm/certs/<files> during the first boot of ovirt-node/before the registration and raised this exception. I have added code to handle the exception and we should be fine. During my previous tests with http://gerrit.ovirt.org/#/c/27779/  I had the files already in the system, that's why I didn't see it before.

Comment 8 Ying Cui 2014-05-29 10:28:13 UTC
Verified this bug on build 
rhev-hypervisor6-6.5-20140527.0.el6ev 
ovirt-node-plugin-vdsm-0.1.1-22.el6ev

admin user can login RHEV-H, there is no exception happened.

Comment 9 Itamar Heim 2014-06-12 14:09:18 UTC
Closing as part of 3.4.0


Note You need to log in before you can comment on or make changes to this bug.