Bug 798227 - The guest's entitlement cert can't revoked after the guest moving to another host.
Summary: The guest's entitlement cert can't revoked after the guest moving to another ...
Keywords:
Status: CLOSED CURRENTRELEASE
Alias: None
Product: Subscription Asset Manager
Classification: Retired
Component: candlepin
Version: 1.0.0
Hardware: Unspecified
OS: Unspecified
high
high
Target Milestone: rc
: ---
Assignee: Bryan Kearney
QA Contact: SAM QE List
URL:
Whiteboard:
Depends On:
Blocks: 703617
TreeView+ depends on / blocked
 
Reported: 2012-02-28 11:38 UTC by Hui Wang
Modified: 2013-01-10 10:59 UTC (History)
3 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2012-04-27 00:20:05 UTC


Attachments (Terms of Use)

Description Hui Wang 2012-02-28 11:38:32 UTC
Description of problem:

A guest that has been installed on "auto assigned host" is running on host1, stop/pause the guest. Then restart/resume the guest, the guest may be running on host2(the host is no longer host1 ). If the guest is running on host2 now, the guest's entitlement cert can't revoked after refreshing the local data. (The scenarios is similar as migration.)

Version-Release number of selected component (if applicable):
katello-glue-candlepin-0.1.300-1.el6.noarch
katello-certs-tools-1.0.2-2.el6.noarch
katello-cli-common-0.1.100-2.el6.noarch
katello-httpd-ssl-key-pair-1.0-1.noarch
katello-headpin-0.1.140-3.el6.noarch
katello-headpin-all-0.1.140-3.el6.noarch
katello-selinux-0.1.7-1.el6.noarch
katello-configure-0.1.100-7.el6.noarch
katello-trusted-ssl-cert-1.0-1.noarch
katello-qpid-broker-key-pair-1.0-1.noarch
katello-common-0.1.300-1.el6.noarch
katello-cli-headpin-0.1.15-2.el6.noarch
candlepin-0.5.22-1.el6.noarch
candlepin-tomcat6-0.5.22-1.el6.noarch
thumbslug-0.0.21-1.el6.noarch



How reproducible:

always

Steps to Reproduce:

1.Install guest G on auto assigned host(HOST1) by RHEV-M.
2.Register HOST H1 and GUEST G and HOST H2 to SAM useing
username/password/org(admin/admin/ACME_Corporation)
3.GUEST G consumed the bonus pool on HOST1
[root@dhcp-66-73-175 rhsm]# subscription-manager list --consumed
+-------------------------------------------+
    Consumed Product Subscriptions
+-------------------------------------------+


ProductName:        	Red Hat Enterprise Linux Server
ContractNumber:     	2635105                  
AccountNumber:      	1508153                  
SerialNumber:       	836926580069604390       
Active:             	True                     
QuantityUsed:       	1                        
Begins:             	11/21/2011               
Expires:            	11/21/2012           

4.Stop/pause the GUEST G, then restart/resume GUEST G. The GUEST G may be running on HOST2(the host no longer HOST1) that auto assigned by RHEV-M.

5.Refresh the local data on GUEST G that running on HOST2 now, and check the entitlement cert
[root@dhcp-66-73-175 rhsm]# subscription-manager refresh
All local data refreshed
[root@dhcp-66-73-175 rhsm]# subscription-manager list --consumed
+-------------------------------------------+
    Consumed Product Subscriptions
+-------------------------------------------+


ProductName:        	Red Hat Enterprise Linux Server
ContractNumber:     	2635105                  
AccountNumber:      	1508153                  
SerialNumber:       	836926580069604390       
Active:             	True                     
QuantityUsed:       	1                        
Begins:             	11/21/2011               
Expires:            	11/21/2012   


Actual results:
The guest's entitlement cert can not be revoked after moving to another host.

Expected results:
The guest's entitlement cert will be revoked after moving to another host.

Additional info:

Comment 1 James Bowes 2012-03-05 20:48:00 UTC
Fixed in candlepin master, 783bba1

Comment 3 Hui Wang 2012-03-12 05:39:50 UTC
I verified the issue, the result is PASS.

A guest that has been installed on "auto assigned host" is running on host1,
stop/pause the guest. Then restart/resume the guest, the guest is running
on host2, and the guest's entitlement cert can revoked after refreshing the local data. The steps as comment0.


Version-Release number of selected component (if applicable):
katello-cli-common-0.1.103-1.el6.noarch
katello-candlepin-cert-key-pair-1.0-1.noarch
katello-glue-candlepin-0.1.303-1.el6.noarch
katello-selinux-0.1.8-1.el6.noarch
katello-headpin-all-0.1.142-1.el6.noarch
katello-common-0.1.303-1.el6.noarch
katello-configure-0.1.106-1.el6.noarch
katello-cli-headpin-0.1.16-1.el6.noarch
katello-certs-tools-1.0.4-1.el6.noarch
katello-headpin-0.1.142-1.el6.noarch
katello-candlepin-cert-key-pair-1.0-1.noarch
candlepin-tomcat6-0.5.24-1.el6.noarch
candlepin-0.5.24-1.el6.noarch
thumbslug-0.0.21-1.el6.noarch


Note You need to log in before you can comment on or make changes to this bug.