Bug 1643879
| Summary: | CC: Identify version/release of pki-ca, pki-kra, pki-ocsp, pki-tks, and pki-tps remotely [RHEL] [rhel-7.6.z] | ||
|---|---|---|---|
| Product: | Red Hat Enterprise Linux 7 | Reporter: | Oneata Mircea Teodor <toneata> |
| Component: | pki-core | Assignee: | Jack Magne <jmagne> |
| Status: | CLOSED ERRATA | QA Contact: | Asha Akkiangady <aakkiang> |
| Severity: | high | Docs Contact: | Marc Muehlfeld <mmuehlfe> |
| Priority: | high | ||
| Version: | 7.6 | CC: | bbhavsar, cfu, cpelland, dmoluguw, edewata, jmagne, mharmsen, msauton |
| Target Milestone: | rc | Keywords: | TestCaseProvided, ZStream |
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | All | ||
| Whiteboard: | |||
| Fixed In Version: | pki-core-10.5.9-7.el7_6 | Doc Type: | Enhancement |
| Doc Text: |
With this enhancement, users can display the product version of a Red Hat Certificate System subsystem if the redhat-pki-server-theme package is installed on the Certificate System server. If the package is installed, open the following URLs to display the version of the subsystems:
* CA: http://<host_name>:8080/ca/admin/ca/getStatus
* KRA: http://<host_name>:8080/kra/admin/kra/getStatus
* OCSP: http://<host_name>:8080/ocsp/admin/ocsp/getStatus
* TKS: http://<host_name>:8080/tks/admin/tks/getStatus
* TPS: http://<host_name>:8080/tps/admin/tps/getStatus
Note that the version of redhat-pki-server-theme must be identical to the installed subsystem packages, such as pki-ca, pki-kra, pki-ocsp, pki-tks, and pki-tps.
|
Story Points: | --- |
| Clone Of: | 1624097 | Environment: | |
| Last Closed: | 2019-01-29 17:21:55 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 1624097 | ||
| Bug Blocks: | |||
|
Description
Oneata Mircea Teodor
2018-10-29 10:17:58 UTC
Jack Magne 2018-10-19 19:32:12 EDT
Test Procedure:
(1) install all 10.5.9 packages including redhat-pki-server-theme.
(2) Verify that the following file exists:
% ls /usr/share/pki/CS_SERVER_VERSION
/usr/share/pki/CS_SERVER_VERSION
% cat /usr/share/pki/CS_SERVER_VERSION
Red Hat Certificate System 9.4
(3) Install a CA using default values
(4) Execute the following URL in a browser:
https://<pki.example.com>:8443/ca/services
(5) Verify that the title reads:
Red Hat® Certificate System 9.4
(6) Hover the mouse over the shadowman icon in the page; instructions to visit
www.dogtagpki.org should be displayed
(7) Click on the shadowman icon to verify that the external Dogtag Wiki is
displayed:
http://www.dogtagpki.org/wiki/PKI_Main_Page
(8) Test the getStatus page for the CA like follows:
Use a browser and view the info at the following url:
http://<pki.example.com>:8080/ca/admin/ca/getStatus
It should look similar to this:
<XMLResponse>
<State>1</State>
<Type>CA</Type>
<Status>running</Status>
<Version>10.5.9-5.0.el7</Version>
<ProductVersion>Red Hat Certificate System 9.4</ProductVersion>
</XMLResponse>
(9) Install and test the other subsystems as follows:
* http://<pki.example.com>:8080/kra/admin/kra/getStatus
* http://<pki.example.com>:8080/ocsp/admin/ocsp/getStatus
* http://<pki.example.com>:8080/tks/admin/tks/getStatus
* http://<pki.example.com>:8080/tps/admin/tps/getStatus
Verified with redhat-pki-server-theme.noarch 0:10.5.9-1.el7pki Steps followed as in comment #8 1. Installed all 10.5.9 packages including redhat-pki-server-theme 2. # cat /usr/share/pki/CS_SERVER_VERSION Red Hat Certificate System 9.4 3. https://<pki.example.com>:8443/ca/services Displays title as Red Hat® Certificate System 9.4 4. Hovering over shadowman instructions to visit www.dogtagpki.org appears 5. clicking on shadowman logo takes to following page: https://www.dogtagpki.org/wiki/PKI_Main_Page 6. Get status for subsystem result: http://10.8.253.182:20080/ca/admin/ca/getStatus <XMLResponse> <State>1</State> <Type>CA</Type> <Status>running</Status> <Version>10.5.9-7.el7_6</Version> <ProductVersion>Red Hat Certificate System 9.4</ProductVersion> </XMLResponse> http://10.8.253.182:21080/kra/admin/kra/getStatus <XMLResponse> <State>1</State> <Type>KRA</Type> <Status>running</Status> <Version>10.5.9-7.el7_6</Version> <ProductVersion>Red Hat Certificate System 9.4</ProductVersion> </XMLResponse> http://10.8.253.182:22080/ocsp/admin/ocsp/getStatus <XMLResponse> <State>1</State> <Type>OCSP</Type> <Status>running</Status> <Version>10.5.9-7.el7_6</Version> <ProductVersion>Red Hat Certificate System 9.4</ProductVersion> </XMLResponse> http://10.8.253.182:23080/tks/admin/tks/getStatus <XMLResponse> <State>1</State> <Type>TKS</Type> <Status>running</Status> <Version>10.5.9-7.el7_6</Version> <ProductVersion>Red Hat Certificate System 9.4</ProductVersion> </XMLResponse> http://10.8.253.182:25080/tps/admin/tps/getStatus <XMLResponse> <State>1</State> <Type>TPS</Type> <Status>running</Status> <Version>10.5.9-7.el7_6</Version> <ProductVersion>Red Hat Certificate System 9.4</ProductVersion> </XMLResponse> Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2019:0168 |