Bug 1534484
| Summary: | RFE: [Deployment] Encrypt vnc traffic from controller node to compute nodes if ssl_only turned on | ||
|---|---|---|---|
| Product: | Red Hat OpenStack | Reporter: | Stephen Finucane <stephenfin> |
| Component: | puppet-tripleo | Assignee: | Ollie Walsh <owalsh> |
| Status: | CLOSED ERRATA | QA Contact: | Archit Modi <amodi> |
| Severity: | high | Docs Contact: | |
| Priority: | low | ||
| Version: | 13.0 (Queens) | CC: | amodi, awaugama, berrange, brault, dciabrin, eglynn, jhakimra, jjoyce, josorior, jschluet, lyarwood, markmc, mburns, mtessun, nlevinki, owalsh, pneedle, rhel-osp-director-maint, rhos-integ, sclewis, scorcora, sgordon, slinaber, srevivo, stephenfin, tvignaud, vpopovic |
| Target Milestone: | beta | Keywords: | FutureFeature, Triaged |
| Target Release: | 13.0 (Queens) | ||
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| URL: | https://blueprints.launchpad.net/nova/+spec/websocket-proxy-to-host-security | ||
| Whiteboard: | upstream_milestone_none upstream_definition_approved upstream_status_needs-code-review | ||
| Fixed In Version: | puppet-tripleo-8.3.1-0.20180304033907.ed3285e.el7ost openstack-tripleo-heat-templates-8.0.0-0.20180304031147.el7ost | Doc Type: | Enhancement |
| Doc Text: | Story Points: | --- | |
| Clone Of: | encrypt_vnc_traffic | Environment: | |
| Last Closed: | 2018-06-27 13:42:10 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 1025429, 1539408, 1563173 | ||
| Bug Blocks: | 1077198, 1419948, 1442136 | ||
|
Comment 11
Jon Schlueter
2018-03-16 18:16:46 UTC
When deploying OSP13 2018-03-29.1, I get a deployment failure at Step1:
"Notice: /Stage[main]/Tripleo::Certmonger::Ca::Crl/Exec[tripleo-ca-crl-process-command]: Dependency File[tripleo-ca-crl] has failures: true",
Which apparently is due to a SELinux denial:
[root@compute-1 ~]# /usr/bin/getcert list -i libvirt-vnc-server-cert
Number of certificates and requests being tracked: 4.
Request ID 'libvirt-vnc-server-cert':
status: NEED_CA_CERT_SAVE_PERMS
stuck: yes
key pair storage: type=FILE,location='/etc/pki/libvirt-vnc/server-key.pem'
certificate: type=FILE,location='/etc/pki/libvirt-vnc/server-cert.pem'
CA: IPA
issuer:
subject:
expires: unknown
pre-save command:
post-save command: "systemctl reload libvirtd"
track: yes
auto-renew: yes
[root@compute-1 ~]# grep -i denied /var/log/audit/audit.log
type=AVC msg=audit(1522743223.463:133): avc: denied { create } for pid=15813 comm="certmonger" name="vnc.crt" scontext=system_u:system_r:certmonger_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=file
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHEA-2018:2086 |