Red Hat Bugzilla – Bug 1346261
two times authentication are required when connecting to vm by ovirt uri
Last modified: 2016-08-23 16:53:31 EDT
+++ This bug was initially created as a clone of Bug #1346256 +++ Description of problem: two times authentication are required when connecting to vm by ovirt uri Version-Release number of selected component (if applicable): libgovirt-0.3.3-2.el7.x86_64 virt-viewer-2.0-8.el7.x86_64 How reproducible: 100% Steps to Reproduce: 1. Prepare a running vm in ovirt 3.6. 2. Got the ca file from ovirt 3.6. $ wget http://rhevm3.6-hp-dl360eg8-03/ca.crt 3. Connect the vm by remote-viewer with ovirt uri. $ remote-viewer --ovirt-ca-file=ca.crt ovirt://rhevm3.6-hp-dl360eg8-03/$your_vm 4. An authentication dialog pops up, then type correct username and password and click OK. Actual results: an authentication dialog pops up again. Expected results: The second authentication is not necessary. Additional info: 1) when the second authentication dialog pops up, click cancel button to cancel it directly, foreign menu can display correctly. 2) when the second authentication dialog pops up, type wrong password, then click OK, after authentication failed then click cancel button to cancel it, foreign menu can't display correctly. --- Additional comment from Christophe Fergeau on 2016-06-14 07:40:28 EDT --- This is a regression introduced by the sso-token support patches, namely https://git.gnome.org/browse/libgovirt/commit/?id=d3683c20e62d889e187406b3fa3fe75e00df228d The whole commit can probably be reverted without any bad side-effect for now. More work seems to be needed for proper RHEV 4.0 support anyway.
Just copying Christophe's comment on the original bug: "(In reply to Christophe Fergeau from comment #1) > The whole commit can probably be reverted without any bad side-effect for > now. More work seems to be needed for proper RHEV 4.0 support anyway. @@ -815,6 +812,7 @@ static void ovirt_proxy_set_sso_token(OvirtProxy *proxy, const char *sso_token) g_free(proxy->priv->sso_token); proxy->priv->sso_token = g_strdup(sso_token); + ovirt_proxy_add_header(proxy, "Prefer", NULL); header_value = g_strdup_printf("Bearer %s", sso_token); ovirt_proxy_add_header(proxy, "Authorization", header_value); g_free(header_value); would probably be nice to have if the commit is reverted."
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://rhn.redhat.com/errata/RHEA-2016-1681.html