Red Hat Satellite engineering is moving the tracking of its product development work on Satellite to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "Satellite project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs will be migrated starting at the end of May. If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "Satellite project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/SAT-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.
Bug 2280065 - Can't update custom certs on the 6.15.0
Summary: Can't update custom certs on the 6.15.0
Keywords:
Status: CLOSED DUPLICATE of bug 2174489
Alias: None
Product: Red Hat Satellite
Classification: Red Hat
Component: Installation
Version: 6.15.0
Hardware: x86_64
OS: Linux
urgent
high
Target Milestone: Unspecified
Assignee: satellite6-bugs
QA Contact: Satellite QE Team
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2024-05-11 00:37 UTC by Amar Ganbat
Modified: 2024-05-30 12:42 UTC (History)
3 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2024-05-30 12:42:01 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Issue Tracker SAT-25060 0 None None None 2024-05-11 00:38:10 UTC

Comment 1 Pavel Moravec 2024-05-11 12:04:29 UTC
The certs *can* be *generally* updated on 6.15. The above is no reproducer, I can update my certs that way.

What makes the scenario unique / failing? I *think* this bit can be relevant for..

katello-certs-check \
> -c <satellite_cert.pem> \
> -k <satellite_cert_key.pem> \
> -b <ca_cert_bundle.pem>

..:

function check-expiration () {
    CERT_EXP=$(openssl x509 -noout -enddate -in $CERT_FILE | sed -e 's/notAfter=//' | awk '{$NF="";}1')
    CA_EXP=$(openssl x509 -noout -enddate -in $CA_BUNDLE_FILE | sed -e 's/notAfter=//' | awk '{$NF="";}1')

what if <ca_cert_bundle.pem> is a CA chain and *some* intermediate CA is out of validity? The openssl prints just first (or last?) cert details.

We might need to split the CA per:

awk 'BEGIN {c=0;} /BEGIN CERT/{c++} { print > "ca_cert." c ".pem"}' < $CA_BUNDLE_FILE

and get the soonest expiration timestamp from all the ca_cert.*.pem files.


(I should play with this reproducer more, though, but I think this is a real bug in katello-certs-check; maybe independent on the originally reported bug)

Comment 2 Eric Helms 2024-05-30 12:42:01 UTC

*** This bug has been marked as a duplicate of bug 2174489 ***


Note You need to log in before you can comment on or make changes to this bug.