Bug 2056021 - [BUG]: "Enroll Certificate" operation not updating libvirt-vnc cert and key
Summary: [BUG]: "Enroll Certificate" operation not updating libvirt-vnc cert and key
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise Virtualization Manager
Classification: Red Hat
Component: ovirt-engine
Version: 4.4.9
Hardware: Unspecified
OS: Unspecified
high
high
Target Milestone: ovirt-4.5.0
: 4.5.0
Assignee: Dana
QA Contact: Pavol Brilla
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2022-02-18 12:09 UTC by nsurati
Modified: 2022-08-08 20:00 UTC (History)
6 users (show)

Fixed In Version: ovirt-engine-4.5.0.1
Doc Type: Release Note
Doc Text:
Previously, renewing of the libvirt-vnc certificate was omitted during the Enroll Certificate flow. With the release of RHV 4.4 SP1 and libvirt-vnc certificates are renewed during the Enroll Certificate flow.
Clone Of:
Environment:
Last Closed: 2022-05-26 16:23:53 UTC
oVirt Team: Infra
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Github oVirt ovirt-engine pull 138 0 None open update libvirt-vnc cert & key when executing enroll certificates 2022-03-10 22:50:13 UTC
Red Hat Issue Tracker RHV-44720 0 None None None 2022-02-18 12:10:31 UTC
Red Hat Product Errata RHSA-2022:4711 0 None None None 2022-05-26 16:24:10 UTC

Description nsurati 2022-02-18 12:09:16 UTC
Description of problem:

"Enroll Certificate" operation not updating libvirt-vnc cert and key

Version-Release number of selected component (if applicable):

rhvm-4.4.9.5

How reproducible:

Always

Steps to Reproduce:
1. Do "Enroll Certificate" from RHV Manager GUI and check validity of certs

2. Check certs validity on Host

# openssl x509 -in /etc/pki/vdsm/certs/vdsmcert.pem -noout -dates

# openssl x509 -in /etc/pki/vdsm/libvirt-spice/server-cert.pem -noout -dates

# openssl x509 -in /etc/pki/libvirt/clientcert.pem -noout -dates

-- Only VNC server certs not updated

# openssl x509 -in /etc/pki/vdsm/libvirt-vnc/server-cert.pem -noout -dates

Actual results:

libvirt-vnc/server-cert.pem not getting updated

Expected results:

libvirt-vnc/server-cert.pem should get updated like other certs


Additional info:

After enrolling certs also we might end up with following error as vnc certs not getting updated.

Exit message: internal error: process exited while connecting to monitor: 2022-02-17T10:38:49.781518Z qemu-kvm: -object tls-creds-x509,id=vnc-tls-creds0,dir=/etc/pki/vdsm/libvirt-vnc,endpoint=server,verify-peer=no: The server certificate /etc/pki/vdsm/libvirt-vnc/server-cert.pem has expired.

Comment 2 Rik Theys 2022-03-09 07:55:11 UTC
Hi,

We are affected by this bug as our libvirt-vnc certificate has expired. We can no longer start/migrate VM's on these hosts.

Are there any instructions on how to manually update these certificates until this issue is resolved?

Regards,
Rik

Comment 3 nsurati 2022-03-10 07:21:56 UTC
Rik,

If only vnc certs affected. Following steps should help 

Please run following command to on Host to renew VNC certs.

# TIMESTAMP=$(date +%Y%m%d%H%M%S)

# mv -v /etc/pki/vdsm/libvirt-vnc/server-cert.pem etc/pki/vdsm/libvirt-vnc/server-cert.pem.$TIMESTAMP

# mv -v /etc/pki/vdsm/libvirt-vnc/server-key.pem etc/pki/vdsm/libvirt-vnc/server-key.pem.$TIMESTAMP

# cp -v /etc/pki/vdsm/libvirt-spice/server-cert.pem /etc/pki/vdsm/libvirt-vnc/server-cert.pem

# cp -v /etc/pki/vdsm/libvirt-spice/server-key.pem /etc/pki/vdsm/libvirt-vnc/server-key.pem

Comment 4 Rik Theys 2022-03-10 11:21:29 UTC
Hi,

(In reply to nsurati from comment #3)
> 
> If only vnc certs affected. Following steps should help 
> 

I used this workaround (using a symlink instead of copying the file) to make sure I can start/migrate VM's again, but it seems the VNC console no longer works.

Which is strange as I don't see any specific settings in the original cert and they seem signed by the same CA, so I'm not sure if this problem existed before.

Regards,
Rik

Comment 5 nsurati 2022-03-10 15:29:57 UTC
(In reply to Rik Theys from comment #4)
> Hi,
> 
> (In reply to nsurati from comment #3)
> > 
> > If only vnc certs affected. Following steps should help 
> > 
> 
> I used this workaround (using a symlink instead of copying the file) to make
> sure I can start/migrate VM's again, but it seems the VNC console no longer
> works.
> 
> Which is strange as I don't see any specific settings in the original cert
> and they seem signed by the same CA, so I'm not sure if this problem existed
> before.
> 
> Regards,
> Rik

You can try couple of things to conclude.

- Restart vdsmd and libvirtd service ( Note: Power Management Host should be disable while restarting )

- shutdown and then start the VM. OR just try to create new VM and take console.

Comment 9 Pavol Brilla 2022-05-04 07:48:48 UTC
Verified on Software Version:4.5.0.5-0.7.el8ev


Enroll Certificate updated also server-cert.pem on host machine

Comment 14 errata-xmlrpc 2022-05-26 16:23:53 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Moderate: RHV Manager (ovirt-engine) [ovirt-4.5.0] security update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHSA-2022:4711

Comment 15 meital avital 2022-08-08 20:00:29 UTC
Due to QE capacity, we are not going to cover this issue in our automation


Note You need to log in before you can comment on or make changes to this bug.