Bug 1928158 - Rename 'CA Certificate' link in welcome page to 'Engine CA certificate'
Summary: Rename 'CA Certificate' link in welcome page to 'Engine CA certificate'
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise Virtualization Manager
Classification: Red Hat
Component: ovirt-engine
Version: 4.4.4
Hardware: x86_64
OS: Linux
unspecified
medium
Target Milestone: ovirt-4.4.6
: ---
Assignee: Sharon Gratch
QA Contact: Ivana Saranova
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2021-02-12 14:07 UTC by Sam Wachira
Modified: 2024-06-14 00:16 UTC (History)
12 users (show)

Fixed In Version: rhv-4.4.6-7
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2021-06-01 13:22:12 UTC
oVirt Team: UX
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2021:2179 0 None None None 2021-06-01 13:23:04 UTC
oVirt gerrit 114518 0 master MERGED engine: rename the "CA Certificate" entry in landing page 2021-04-28 07:02:46 UTC

Description Sam Wachira 2021-02-12 14:07:40 UTC
Description of problem:
(http://rhvm.example.org/ovirt-engine/services/pki-resource?resource=ca-certificate&format=X509-PEM-CA) by default serves the CA certificate located at /etc/pki/ovirt-engine/ca.pem.

On a default RHV-M installation, /etc/pki/ovirt-engine/apache-ca.pem is a symbolic link pointing to /etc/pki/ovirt-engine/ca.pem.

# ls -l /etc/pki/ovirt-engine/apache-ca.pem
lrwxrwxrwx. 1 root root 28 Jan 20 16:18 /etc/pki/ovirt-engine/apache-ca.pem -> /etc/pki/ovirt-engine/ca.pem

However, when using custom TLS certificates for Apache, the URL still serves /etc/pki/ovirt-engine/ca.pem which is not valid.


Steps to Reproduce:
1. On a default RHV-M installation, access URL to download the CA certificate (http://rhvm.example.org/ovirt-engine/services/pki-resource?resource=ca-certificate&format=X509-PEM-CA)
2. Replace the Apache certificate and CA certificate as per (https://access.redhat.com/documentation/en-us/red_hat_virtualization/4.4/html-single/administration_guide/index#Replacing_the_Manager_CA_Certificate)
3. Access URL to download the CA certificate (http://rhvm.example.org/ovirt-engine/services/pki-resource?resource=ca-certificate&format=X509-PEM-CA)

Actual results:
When using custom TLS certificates the URL still serves /etc/pki/ovirt-engine/ca.pem which is not valid.

Expected results:
When using custom TLS certificates the URL should serve /etc/pki/ovirt-engine/apache-ca.pem.

Additional info:
Removing the symbolic link /etc/pki/ovirt-engine/apache-ca.pem and replacing it with the custom CA certificate does not make a difference to the URL.
Overwriting /etc/pki/ovirt-engine/ca.pem with the custom Apache CA certificate makes the URL to serve the correct certificate. **Not a recommended approach.

Comment 2 Martin Perina 2021-02-15 06:14:01 UTC
That's by design, because the URL http://rhvm.example.org/ovirt-engine/services/pki-resource?resource=ca-certificate&format=X509-PEM-CA is defined to retrieve engine CA certificate, which is used:

1. To sign engine HTTPS certificate (by default, but HTTPS certificate can be replaced by custom certificate signed by custom CA)
2. To sign certificates of hypervisors to allow encrypted communication between engine and VDSM on hypervisors

So when customer supplies it's own HTTPS certificate signed by custom CA, we cannot provide that custom CA on above URL, because we would break the valid URL to get engine CA for engine-VDSM communication.

When customer supplies custom HTTPS certificate signed by custom CA, it's his responsibility to distribute the custom CA on on all clients.

Also there is a difference in returning a link to CA certificate for console resources in .vv file:

1. When engine CA is used, we are pointing to CA URL http://rhvm.example.org/ovirt-engine/services/pki-resource?resource=ca-certificate&format=X509-PEM-CA as a part of .vv file

2. When custom CA is used, we are not icnluding CA URL in .vv file and in this case virt-viewer expects that custom CA certificate is already included in trusted CAs of the client


So I suggest to close this as NOTABUG

Comment 3 Sam Wachira 2021-02-18 11:19:33 UTC
Thanks for the explanation Martin.

Perhaps it would help to clear up confusion by renaming the 'CA Certificate' link to 'Engine CA Certificate'?

Comment 4 Martin Perina 2021-03-01 09:55:10 UTC
(In reply to Sam Wachira from comment #3)
> Thanks for the explanation Martin.
> 
> Perhaps it would help to clear up confusion by renaming the 'CA Certificate'
> link to 'Engine CA Certificate'?

Do you mean to change it in the URL from

    http://rhvm.example.org/ovirt-engine/services/pki-resource?resource=ca-certificate&format=X509-PEM-CA

to

    http://rhvm.example.org/ovirt-engine/services/pki-resource?resource=engine-ca-certificate&format=X509-PEM-CA

?

If so, then we cannot easily do it, it would break all existing clients depending on that URL. We are using that URL on quite a lot of places non only internally within RHV, but also external applications might depend on it.

Also we don't have a description of that URL parameters in official RHV, so the only improvement which comes to my mind would be to add a note to 

https://access.redhat.com/documentation/en-us/red_hat_virtualization/4.4/html/administration_guide/appe-red_hat_enterprise_virtualization_and_ssl#Replacing_the_Manager_CA_Certificate

that after switching to custom HTTPS certificate singed by custom CA, below URL will still return engine CA and not a custom one:

    http://rhvm.example.org/ovirt-engine/services/pki-resource?resource=ca-certificate&format=X509-PEM-CA

Are you OK with that solution?

Comment 5 Sam Wachira 2021-03-01 10:47:34 UTC
Hi Martin,

I mean keeping the URL the same (https://rhvm.example.org/ovirt-engine/services/pki-resource?resource=ca-certificate&format=X509-PEM-CA) but,

rename

'CA Certificate'

to

'Engine CA Certificate'

on the RHV-M UI landing page (https://rhvm2.rhvmgmt.tamlab.rdu2.redhat.com/ovirt-engine/) .

Updating documentation after switching to custom HTTPS certificate signed by custom CA would also help.

Comment 6 Martin Perina 2021-03-08 09:26:46 UTC
(In reply to Sam Wachira from comment #5)
> Hi Martin,
> 
> I mean keeping the URL the same
> (https://rhvm.example.org/ovirt-engine/services/pki-resource?resource=ca-
> certificate&format=X509-PEM-CA) but,
> 
> rename
> 
> 'CA Certificate'
> 
> to
> 
> 'Engine CA Certificate'
> 
> on the RHV-M UI landing page
> (https://rhvm2.rhvmgmt.tamlab.rdu2.redhat.com/ovirt-engine/) .

That shouldn't be a problem. Welcome page content is managed by UX team, Sharon, could you please take over?

> 
> Updating documentation after switching to custom HTTPS certificate signed by
> custom CA would also help.

I've created BZ1936349 to handle that

Comment 9 Ivana Saranova 2021-05-06 11:45:21 UTC
Steps:
1) Check that link to engine ca certificate is renamed to Engine CA certificate on landing page

Results:
The link text is renamed and the content is still the original.

Verified in:
ovirt-engine-4.4.6.6-0.10.el8ev.noarch

Comment 13 errata-xmlrpc 2021-06-01 13:22:12 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Moderate: RHV Manager security update (ovirt-engine) [ovirt-4.4.6]), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHSA-2021:2179

Comment 14 meital avital 2022-08-03 20:20:21 UTC
Due to QE capacity, we are not going to cover this issue in our automation


Note You need to log in before you can comment on or make changes to this bug.