Bug 712980
| Summary: | Import Certificate neglects to also import the corresponding key.pem | ||||||
|---|---|---|---|---|---|---|---|
| Product: | Red Hat Enterprise Linux 6 | Reporter: | John Sefler <jsefler> | ||||
| Component: | subscription-manager | Assignee: | Bryan Kearney <bkearney> | ||||
| Status: | CLOSED ERRATA | QA Contact: | John Sefler <jsefler> | ||||
| Severity: | high | Docs Contact: | |||||
| Priority: | unspecified | ||||||
| Version: | 6.1 | CC: | ggainey, mstead, spandey, tsmart | ||||
| Target Milestone: | rc | Keywords: | ZStream | ||||
| Target Release: | --- | ||||||
| Hardware: | Unspecified | ||||||
| OS: | Unspecified | ||||||
| Whiteboard: | |||||||
| Fixed In Version: | Doc Type: | Bug Fix | |||||
| Doc Text: | Story Points: | --- | |||||
| Clone Of: | 712978 | Environment: | |||||
| Last Closed: | 2011-12-06 17:15:15 UTC | Type: | --- | ||||
| Regression: | --- | Mount Type: | --- | ||||
| Documentation: | --- | CRM: | |||||
| Verified Versions: | Category: | --- | |||||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
| Cloudforms Team: | --- | Target Upstream Version: | |||||
| Embargoed: | |||||||
| Bug Depends On: | |||||||
| Bug Blocks: | 682238 | ||||||
| Attachments: |
|
||||||
|
Description
John Sefler
2011-06-13 19:33:47 UTC
This has been addressed by commit 158de0a80e0f2b62d63834d6751c9cf6489630a1 in the master branch. Verifying Version... [root@jsefler-onprem-62server entitlement]# rpm -q subscription-manager-gnome subscription-manager-gnome-0.96.4-1.git.63.7bb4765.el6.x86_64 Using the certificates in comments 4, 5, and 6, I am able to perform the following tests: [root@jsefler-onprem-62server ~]# subscription-manager clean All local data removed [root@jsefler-onprem-62server ~]# ls /etc/pki/entitlement/ [root@jsefler-onprem-62server ~]# ^^^ VERIFIED NO CERTS Case 1: Use the subscription-manager gui to Import Certificate 70317698734240.pem from attachment 515342 [details]. [root@jsefler-onprem-62server ~]# grep -H -- --- /etc/pki/entitlement/* /etc/pki/entitlement/70317698734240-key.pem:-----BEGIN RSA PRIVATE KEY----- /etc/pki/entitlement/70317698734240-key.pem:-----END RSA PRIVATE KEY----- /etc/pki/entitlement/70317698734240.pem:-----BEGIN CERTIFICATE----- /etc/pki/entitlement/70317698734240.pem:-----END CERTIFICATE----- [root@jsefler-onprem-62server ~]# ^^^ VERIFIED THE IMPORT SUCCESSFULLY SPLIT THE CERT INTO A SEPARATE CERT AND KEY FILE WITH THE SAME SUFFIX 70317698734240 [root@jsefler-onprem-62server ~]# rm -rf /etc/pki/entitlement/ Case 2: Use the subscription-manager gui to Import Certificate 70317698734240_CERT-ONLY.pem from attachment 515343 [details] [root@jsefler-onprem-62server ~]# grep -H -- --- /etc/pki/entitlement/* /etc/pki/entitlement/70317698734240_CERT-ONLY.pem:-----BEGIN CERTIFICATE----- /etc/pki/entitlement/70317698734240_CERT-ONLY.pem:-----END CERTIFICATE----- [root@jsefler-onprem-62server ~]# ^^^ VERIFIED THAT THE CERT WAS SUCCESSFULLY IMPORTED, AND BECAUSE THERE WAS NO KEY IN THE FILE THERE WAS NO NEED TO CREATE A SEPARATE KEY.PEM. THE MISSING KEY WAS SIMPLY SKIPPED. [root@jsefler-onprem-62server ~]# rm -rf /etc/pki/entitlement/ Case 3: Use the subscription-manager gui to Import Certificate 70317698734240_KEY-ONLY.pem from attachment 515344 [details] [root@jsefler-onprem-62server ~]# ls /etc/pki/entitlement/ [root@jsefler-onprem-62server ~]# ^^^ VERIFIED THAT THE IMPORT IS BLOCKED IN THE GUI WITH AN ERROR DIALOG THAT STATES "70317698734240_KEY-ONLY.pem is not a valid certificate file. Please upload a valid certificate." MOREOVER, NO KEY IS IMPORTED. Variants also tested: duplicate import of 70317698734240.pem from attachment 515342 [details]: result - no change in certs because the original was already imported import of 70317698734240.pem and 70317698734240_CERT-ONLY.pem result - two entitlements to the same product subscription. That's fine and correct. Unsubscribe of imported certificates result - entitlement certs and keys are removed. (see bug 723363) Moving to VERIFIED Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. http://rhn.redhat.com/errata/RHBA-2011-1695.html |