Bug 1969461
| Summary: | Injecting certificate with "podman cp" can break cluster monitoring and operation | ||
|---|---|---|---|
| Product: | Red Hat OpenStack | Reporter: | Luigi Toscano <ltoscano> |
| Component: | puppet-tripleo | Assignee: | Damien Ciabrini <dciabrin> |
| Status: | CLOSED ERRATA | QA Contact: | David Rosenfeld <drosenfe> |
| Severity: | high | Docs Contact: | |
| Priority: | high | ||
| Version: | 16.1 (Train) | CC: | aschultz, bdobreli, dabarzil, dciabrin, drosenfe, jjoyce, jmarcian, jpretori, jschluet, lmiccini, ltoscano, michele, pgrist, slinaber, spower, tvignaud |
| Target Milestone: | z7 | Keywords: | Triaged |
| Target Release: | 16.1 (Train on RHEL 8.2) | ||
| Hardware: | x86_64 | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | openstack-tripleo-heat-templates-11.3.2-1.20210720153312.el8ost puppet-tripleo-11.5.0-1.20210622133309.el8ost | Doc Type: | If docs needed, set a value |
| Doc Text: | Story Points: | --- | |
| Clone Of: | 1935621 | Environment: | |
| Last Closed: | 2021-12-09 20:19:41 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 1935621 | ||
| Bug Blocks: | |||
|
Description
Luigi Toscano
2021-06-08 13:32:40 UTC
Damien, can certmonger-rabbitmq-refresh.sh be fixed as it was for OSP16.2 in https://bugzilla.redhat.com/show_bug.cgi?id=1998917, please? (In reply to Julia Marciano from comment #14) > Damien, > can certmonger-rabbitmq-refresh.sh be fixed as it was for OSP16.2 in > https://bugzilla.redhat.com/show_bug.cgi?id=1998917, please? I just created the cloned bz https://bugzilla.redhat.com/show_bug.cgi?id=1999702 for tracking the fix or certmonger-rabbitmq-refresh.sh in 16.1. (In reply to Julia Marciano from comment #16) > The new certificate isn't being copied to the container, it seems 'tar' > command doesn't succeed: > // Run here a copy of the original /usr/bin/certmonger-haproxy-refresh.sh > with 'set -x' > [root@controller-0 ~]# date;/usr/bin/certmonger-haproxy-refresh.copy.sh > reload internal_api > Fri Sep 3 00:19:47 UTC 2021 > ... > + tar -c /etc/pki/tls/certs/haproxy/overcloud-haproxy-internal_api.pem > + podman exec -i haproxy-bundle-podman-0 tar -C / -xv > tar: Removing leading `/' from member names > tar: This does not look like a tar archive > tar: Exiting with failure status due to previous errors > ERRO[0000] read unixpacket > @->/var/run/libpod/socket/ > 1ac6566cb88b71e0cfb2f14f720126ee96d72753d52e826cf0c9bf12f0185a4a/attach: > read: connection reset by peer > Error: non zero exit code: 2: OCI runtime error > ... This is a separate issue. We forgot to patch some scripts in puppet-tripleo to workaround the podman cp breakage on rhel 8.2. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Red Hat OpenStack Platform 16.1.7 (Train) bug fix and enhancement advisory), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2021:3762 |