Bug 1998917
| Summary: | rabbitmq cert and keys are injected incorretly after certmonger regenerates them | |||
|---|---|---|---|---|
| Product: | Red Hat OpenStack | Reporter: | Julia Marciano <jmarcian> | |
| Component: | puppet-tripleo | Assignee: | OSP Team <rhos-maint> | |
| Status: | CLOSED ERRATA | QA Contact: | David Rosenfeld <drosenfe> | |
| Severity: | high | Docs Contact: | ||
| Priority: | high | |||
| Version: | 16.2 (Train) | CC: | dciabrin, jhajyahy, jjoyce, jschluet, lmiccini, slinaber, tvignaud | |
| Target Milestone: | z2 | Keywords: | Triaged | |
| Target Release: | 16.2 (Train on RHEL 8.4) | |||
| Hardware: | x86_64 | |||
| OS: | Linux | |||
| Whiteboard: | ||||
| Fixed In Version: | puppet-tripleo-11.7.0-2.20211224004900.be47189.el8ost | Doc Type: | If docs needed, set a value | |
| Doc Text: | Story Points: | --- | ||
| Clone Of: | ||||
| : | 1999702 (view as bug list) | Environment: | ||
| Last Closed: | 2022-03-23 22:11:37 UTC | Type: | Bug | |
| Regression: | --- | Mount Type: | --- | |
| Documentation: | --- | CRM: | ||
| Verified Versions: | Category: | --- | ||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
| Cloudforms Team: | --- | Target Upstream Version: | ||
| Embargoed: | ||||
| Bug Depends On: | ||||
| Bug Blocks: | 1999702 | |||
|
Description
Julia Marciano
2021-08-30 00:32:05 UTC
Fixed upstream, instructions for testing: 1. check the current certificate for rabbitmq # md5sum /etc/pki/tls/certs/rabbitmq.crt 921441554988987b997a67978c2e4689 /etc/pki/tls/certs/rabbitmq.crt 2. generate a new certificate with certmonger # getcert resubmit -i rabbitmq Resubmitting "rabbitmq" to "IPA". 3. verify that a new certificate has been retrieved by certmonger on the host # md5sum /etc/pki/tls/certs/rabbitmq.crt 439789f66ce25332786891aace6f18da /etc/pki/tls/certs/rabbitmq.crt 4. verify that the cert got injected in the rabbitmq container as expected # podman exec $(podman ps -q --filter name=rabbitmq) md5sum /etc/pki/tls/certs/rabbitmq.crt 439789f66ce25332786891aace6f18da /etc/pki/tls/certs/rabbitmq.crt 5. double check that the cert injection uses "tar" instead of "podman cp" # /usr/bin/certmonger-rabbitmq-refresh.sh tar: Removing leading `/' from member names tar: Removing leading `/' from hard link targets etc/pki/tls/certs/rabbitmq.crt etc/pki/tls/private/rabbitmq.key ok Note: it's ok for certmonger-redis-refresh.sh to still use 'podman cp', as it injects the new certificate into a container managed by paunch (redis_tls_proxy) and not the redis container managed by pacemaker. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Release of components for Red Hat OpenStack Platform 16.2.2), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2022:1001 |