Simone Tiraboschi has posted comments on this change.
Change subject: packaging: setup: getting a cert for a remote wsp via support
files
......................................................................
Patch Set 2: Verified+1
Verified on a couple of f19 hosts both with the file based and with the inline
approach.
File based:
[stirabos@f19t6 ~]$ sudo engine-setup
[ INFO ] Stage: Initializing
[ INFO ] Stage: Environment setup
Configuration files: []
Log file:
/var/log/ovirt-engine/setup/ovirt-engine-setup-20140801172806-4pys6h.log
Version: otopi-1.3.0_master
(otopi-1.3.0-0.0.master.20140715.git336a22e.fc19)
[ INFO ] Stage: Environment packages setup
[ INFO ] Stage: Programs detection
[ INFO ] Stage: Environment setup
[ INFO ] Stage: Environment customization
--== PRODUCT OPTIONS ==--
Configure WebSocket Proxy on this host (Yes, No) [Yes]:
Setup can automatically configure the firewall on this system.
Note: automatic configuration of the firewall may overwrite current
settings.
Do you want Setup to configure the firewall? (Yes, No) [Yes]:
[ INFO ] firewalld will be configured as firewall manager.
Host fully qualified DNS name of this server [f19t6.localdomain]:
[WARNING] Failed to resolve f19t6.localdomain using DNS, it can be resolved
only locally
[ INFO ] Stage: Setup validation
--== CONFIGURATION PREVIEW ==--
Update Firewall : True
Host FQDN : f19t6.localdomain
Firewall manager : firewalld
Configure WebSocket Proxy : True
Please confirm installation settings (OK, Cancel) [OK]:
[ INFO ] Stage: Transaction setup
[ INFO ] Stopping websocket-proxy service
[ INFO ] Stage: Misc configuration
[ INFO ] Stage: Package installation
[ INFO ] Stage: Misc configuration
[ INFO ] Configuring WebSocket Proxy
ATTENTION
Manual actions are required on the engine host
in order to enroll certs for this host and configure the engine
about it.
Please execute this command on the engine host:
engine-config -s WebSocketProxy=f19t6.localdomain:6100
Do you prefer to manage certificate signing request and response
inline or thought support files? (Inline, Files) [Inline]: files
The certificate signing request is available at:
/tmp/tmpjpMuGJ
Enroll SSL certificate for the websocket proxy service.
It can be done using engine internal CA, if no 3rd party CA is
available,
with this sequence:
1. Copy and save certificate request at
/etc/pki/ovirt-engine/requests/websocket-proxy-f19t6.localdomain.req
on the engine host
2. execute, on the engine host, this command to enroll the cert:
/usr/share/ovirt-engine/bin/pki-enroll-request.sh \
--name=websocket-proxy-f19t6.localdomain \
--subject="/C=<country>/O=<organization>/CN=f19t6.localdomain"
Substitute <country>, <organization> to suite your environment
(i.e. the values must match values in the certificate authority of
your engine)
3. Certificate will be available at
/etc/pki/ovirt-engine/certs/websocket-proxy-f19t6.localdomain.cer
on the engine host, please copy that file here and provide its
location when required
Please input the location of the file where you copied
back the signed cert on this host: /tmp/pluto
[WARNING] Error reading /tmp/pluto file, please try again
Please input the location of the file where you copied
back the signed cert on this host: /tmp/pippo
[WARNING] The cert you provided doesn't match the required CSR. Please try
again
Please input the location of the file where you copied
back the signed cert on this host: /tmp/goodcert
Please provide the FQDN or IP of the remote engine host:
f19t5.localdomain
[ INFO ] Generating post install configuration file
'/etc/ovirt-engine-setup.conf.d/20-setup-ovirt-post.conf'
[ INFO ] Stage: Transaction commit
[ INFO ] Stage: Closing up
--== SUMMARY ==--
--== END OF SUMMARY ==--
[ INFO ] Stage: Clean up
Log file is located at
/var/log/ovirt-engine/setup/ovirt-engine-setup-20140801172806-4pys6h.log
[ INFO ] Generating answer file
'/var/lib/ovirt-engine/setup/answers/20140801174332-setup.conf'
[ INFO ] Stage: Pre-termination
[ INFO ] Stage: Termination
[ INFO ] Execution of setup completed successfully
And inline with error validation:
[stirabos@f19t6 ~]$ sudo engine-setup
[ INFO ] Stage: Initializing
[ INFO ] Stage: Environment setup
Configuration files: []
Log file:
/var/log/ovirt-engine/setup/ovirt-engine-setup-20140801174818-a7uxxy.log
Version: otopi-1.3.0_master
(otopi-1.3.0-0.0.master.20140715.git336a22e.fc19)
[ INFO ] Stage: Environment packages setup
[ INFO ] Stage: Programs detection
[ INFO ] Stage: Environment setup
[ INFO ] Stage: Environment customization
--== PRODUCT OPTIONS ==--
Configure WebSocket Proxy on this host (Yes, No) [Yes]:
Setup can automatically configure the firewall on this system.
Note: automatic configuration of the firewall may overwrite current
settings.
Do you want Setup to configure the firewall? (Yes, No) [Yes]:
[ INFO ] firewalld will be configured as firewall manager.
Host fully qualified DNS name of this server [f19t6.localdomain]:
[WARNING] Failed to resolve f19t6.localdomain using DNS, it can be resolved
only locally
[ INFO ] Stage: Setup validation
--== CONFIGURATION PREVIEW ==--
Update Firewall : True
Host FQDN : f19t6.localdomain
Firewall manager : firewalld
Configure WebSocket Proxy : True
Please confirm installation settings (OK, Cancel) [OK]:
[ INFO ] Stage: Transaction setup
[ INFO ] Stopping websocket-proxy service
[ INFO ] Stage: Misc configuration
[ INFO ] Stage: Package installation
[ INFO ] Stage: Misc configuration
[ INFO ] Configuring WebSocket Proxy
ATTENTION
Manual actions are required on the engine host
in order to enroll certs for this host and configure the engine
about it.
Please execute this command on the engine host:
engine-config -s WebSocketProxy=f19t6.localdomain:6100
Do you prefer to manage certificate signing request and response
inline or thought support files? (Inline, Files) [Inline]: inline
Please issue WebSocket Proxy certificate based on this certificate
request
D:MULTI-STRING WSP_CERTIFICATE_REQUEST
--=451b80dc-996f-432e-9e4f-2b29ef6d1141=--
-----BEGIN CERTIFICATE REQUEST-----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-----END CERTIFICATE REQUEST-----
--=451b80dc-996f-432e-9e4f-2b29ef6d1141=--
Enroll SSL certificate for the websocket proxy service.
It can be done using engine internal CA, if no 3rd party CA is
available,
with this sequence:
1. Copy and save certificate request at
/etc/pki/ovirt-engine/requests/websocket-proxy-f19t6.localdomain.req
on the engine host
2. execute, on the engine host, this command to enroll the cert:
/usr/share/ovirt-engine/bin/pki-enroll-request.sh \
--name=websocket-proxy-f19t6.localdomain \
--subject="/C=<country>/O=<organization>/CN=f19t6.localdomain"
Substitute <country>, <organization> to suite your environment
(i.e. the values must match values in the certificate authority of
your engine)
3. Certificate will be available at
/etc/pki/ovirt-engine/certs/websocket-proxy-f19t6.localdomain.cer
on the engine host, please paste that content here when required
Please input WSP certificate chain that matches certificate request,
(issuer is not mandatory, from intermediate and upper)
type '--=451b80dc-996f-432e-9e4f-2b29ef6d1141=--' in own line to
mark end.
bad text
bad bad text
bad bad bad text
--=451b80dc-996f-432e-9e4f-2b29ef6d1141=--
[WARNING] The cert you provided is invalid. Please try again
Please input WSP certificate chain that matches certificate request,
(issuer is not mandatory, from intermediate and upper)
type '--=451b80dc-996f-432e-9e4f-2b29ef6d1141=--' in own line to
mark end.
# mismatching cert
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 4106 (0x100a)
Signature Algorithm: sha1WithRSAEncryption
Issuer: C=US, O=localdomain, CN=f19t5.localdomain.83394
Validity
Not Before: Jul 31 15:25:46 2014
Not After : Jul 6 15:25:46 2019 GMT
Subject: C=US, O=localdomain, CN=f19t6.localdomain
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (2048 bit)
Modulus:
00:ad:c9:fa:10:12:0d:32:25:0f:7d:c8:0c:cb:21:
f1:43:c2:86:f7:63:46:16:c6:a2:d9:b0:64:14:68:
95:d3:10:44:47:28:a8:42:31:ee:f9:85:9a:8e:8e:
e4:90:9b:1a:06:d3:18:0a:56:9b:be:ca:33:0b:2e:
c5:45:c1:0e:b0:d1:47:1f:31:28:33:92:46:dc:db:
ce:29:c0:2d:b5:16:37:12:a5:de:09:c2:84:fc:c6:
aa:04:cb:f3:d4:5a:54:20:ed:97:35:8e:6b:ad:2b:
c5:fd:9a:7a:1e:7d:9a:c0:d6:f4:02:10:0a:c8:1f:
df:55:c5:ff:aa:29:dd:95:48:7f:8a:81:44:49:05:
21:de:ec:62:96:c8:9c:a3:fd:a9:50:52:01:4f:9e:
ec:02:2a:71:9f:54:40:7f:ad:19:9a:c4:c4:b0:cf:
b6:bd:73:21:25:5e:ec:f5:8a:f7:52:10:3a:0d:b9:
fb:d2:bc:3d:aa:5e:b0:8b:b6:b9:ee:b5:82:7d:40:
59:52:b2:bc:db:87:4b:be:db:13:2e:96:25:ed:3b:
cc:29:66:ab:29:4d:2b:4e:ac:d9:35:4f:24:fb:2c:
dc:5b:6f:da:d6:1c:6e:4c:db:1a:db:71:e0:cb:03:
9b:22:d7:b2:e0:3b:47:72:96:12:df:be:b1:69:79:
5a:75
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Subject Key Identifier:
AE:26:80:9D:21:B3:33:68:43:A9:D3:7C:4E:9F:6C:AB:02:3D:12:C8
Authority Information Access:
CA Issuers -
URI:http://f19t5.localdomain:80/ovirt-engine/services/pki-resource?resource=ca-certificate&format=X509-PEM-CA
X509v3 Authority Key Identifier:
keyid:05:AD:D9:D7:34:D2:80:FD:20:0D:10:1B:98:72:7B:2D:93:6C:64:72
DirName:/C=US/O=localdomain/CN=f19t5.localdomain.83394
serial:10:00
X509v3 Basic Constraints:
CA:FALSE
X509v3 Key Usage: critical
Digital Signature, Key Encipherment
X509v3 Extended Key Usage: critical
TLS Web Server Authentication, TLS Web Client Authentication
Signature Algorithm: sha1WithRSAEncryption
19:0f:15:f3:d8:b4:c3:3f:1d:ee:e6:03:14:07:8f:74:6e:90:
92:ca:54:26:4e:fd:9e:77:1b:58:8b:89:dc:63:1c:8b:14:95:
e0:c4:49:05:31:d2:d8:1e:9e:f4:3a:17:f6:d2:5e:c4:0d:cd:
48:e9:ed:23:a5:ea:a0:3b:f6:1c:a1:c5:6e:eb:1e:57:e9:ee:
04:b9:d5:f6:42:21:bc:dd:b5:9c:36:85:b3:4b:77:9f:55:51:
78:4b:e0:3b:73:4d:eb:76:23:ac:e2:76:0e:b1:bf:f1:33:be:
19:9c:d2:45:41:e7:6e:76:52:89:d8:e1:09:e3:e5:bb:96:39:
97:c1:8e:8a:57:29:c7:8b:0b:76:26:5a:1b:6b:cd:ee:92:cb:
00:d6:a1:fa:a5:ed:d2:22:25:a3:29:99:cb:e4:ec:53:4a:ce:
50:bf:7b:fd:f3:08:e7:98:50:95:da:38:d3:9c:d1:22:7e:ac:
71:de:05:af:23:66:1c:19:cc:2d:03:97:e6:43:3d:e7:86:28:
51:d7:e5:22:96:a5:92:35:2d:dd:88:63:47:2b:c1:40:5c:df:
01:d0:91:e3:a8:b4:36:98:55:ee:00:b7:ea:85:77:2e:2f:7c:
df:f0:13:83:1f:fe:ea:98:75:5f:83:25:67:81:bb:e1:c1:63:
76:b8:21:9b
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
--=451b80dc-996f-432e-9e4f-2b29ef6d1141=--
[WARNING] The cert you provided doesn'tmatch the required CSR. Please try again
Please input WSP certificate chain that matches certificate request,
(issuer is not mandatory, from intermediate and upper)
type '--=451b80dc-996f-432e-9e4f-2b29ef6d1141=--' in own line to
mark end.
# Valid cert
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 4109 (0x100d)
Signature Algorithm: sha1WithRSAEncryption
Issuer: C=US, O=localdomain, CN=f19t5.localdomain.83394
Validity
Not Before: Jul 31 15:51:40 2014
Not After : Jul 6 15:51:40 2019 GMT
Subject: C=US, O=localdomain, CN=f19t6.localdomain
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (2048 bit)
Modulus:
00:d9:f2:a7:ea:f9:ad:ef:91:b6:4b:11:6c:dd:50:
c3:46:08:4f:5c:13:b8:2d:72:c6:a9:ef:2c:5e:65:
7f:12:cf:f3:36:4a:d9:71:9e:99:9c:57:d3:9b:64:
a9:de:d8:db:7d:48:fc:a3:cc:f5:b1:2d:c4:25:d6:
6d:c7:2a:81:4b:46:be:b7:37:6a:09:aa:c8:9f:a3:
1b:2c:c9:26:2d:b5:b0:24:1a:db:ef:83:fe:be:53:
1b:e6:8a:6e:c6:7d:eb:de:5c:dc:70:cb:2a:a3:36:
5b:37:e1:a3:19:f4:4a:b2:9f:83:f5:d9:b1:73:82:
0b:d0:99:bb:32:3e:29:f4:18:6c:8c:f8:7b:10:09:
b5:a9:cf:8e:bb:98:cd:09:fb:30:91:b2:ac:97:2c:
74:66:19:e0:58:19:86:3d:88:76:2d:df:ec:2e:09:
2f:d9:bf:98:ed:a7:59:45:84:ee:f4:fb:58:95:f0:
ad:90:4d:a1:8e:73:52:05:8c:f5:5b:94:60:a9:6f:
61:a2:35:c8:ae:d7:d8:d2:60:e9:82:07:56:43:79:
55:dd:ab:bd:0d:7a:52:8c:b9:d7:ea:e2:12:e9:f0:
25:87:81:1d:f9:89:2d:76:66:42:d6:aa:16:6b:88:
15:51:d1:3c:c1:04:7a:26:d5:9b:21:9d:a7:0f:b5:
d7:bd
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Subject Key Identifier:
69:22:F6:1F:D9:B3:15:C7:EA:12:9E:D3:F3:CF:D4:D9:AE:2A:AC:59
Authority Information Access:
CA Issuers -
URI:http://f19t5.localdomain:80/ovirt-engine/services/pki-resource?resource=ca-certificate&format=X509-PEM-CA
X509v3 Authority Key Identifier:
keyid:05:AD:D9:D7:34:D2:80:FD:20:0D:10:1B:98:72:7B:2D:93:6C:64:72
DirName:/C=US/O=localdomain/CN=f19t5.localdomain.83394
serial:10:00
X509v3 Basic Constraints:
CA:FALSE
X509v3 Key Usage: critical
Digital Signature, Key Encipherment
X509v3 Extended Key Usage: critical
TLS Web Server Authentication, TLS Web Client Authentication
Signature Algorithm: sha1WithRSAEncryption
78:f2:8c:ef:1f:09:0d:52:cb:d0:99:dd:c1:60:56:43:ef:d7:
6e:4a:26:09:ae:d6:90:e2:7b:cc:98:f4:e1:f5:16:1a:38:da:
4b:bd:18:52:df:94:e0:10:58:73:02:da:70:ad:44:0f:f9:73:
d3:11:6c:ec:82:3c:3e:7a:2f:19:c6:ce:91:ca:f7:34:61:ed:
66:c1:7e:00:8f:f7:b4:b3:3a:46:db:9a:28:1d:1b:a0:f4:20:
e4:31:2f:13:55:61:b8:70:22:cb:3e:b8:f8:a8:86:d5:da:6c:
59:9b:bb:ab:7f:02:98:1b:ac:7b:2b:f0:39:a0:71:f4:37:41:
2d:98:58:9a:66:61:af:38:0b:a8:c4:65:b9:66:fa:61:a3:e2:
9b:b7:26:50:20:60:a2:44:c7:ba:d2:1c:96:ec:bf:60:5d:d7:
3f:13:99:72:cf:78:29:74:ef:eb:e0:43:a0:9e:eb:e2:ad:03:
e5:c7:5a:81:16:9a:cf:32:88:30:39:47:e9:6b:07:e5:cc:99:
fa:39:a1:cb:6f:d5:04:64:50:90:22:a3:5f:08:68:e4:a8:29:
b3:94:cf:eb:4e:62:eb:a0:38:61:ef:1e:a7:41:09:1a:3a:80:
2c:b2:6c:38:d5:42:ad:b2:29:22:f9:95:c1:f6:1b:7f:1c:44:
73:b1:87:77
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
--=451b80dc-996f-432e-9e4f-2b29ef6d1141=--
Please provide the FQDN or IP of the remote engine host:
f19t5.localdomain
[ INFO ] Generating post install configuration file
'/etc/ovirt-engine-setup.conf.d/20-setup-ovirt-post.conf'
[ INFO ] Stage: Transaction commit
[ INFO ] Stage: Closing up
--== SUMMARY ==--
--== END OF SUMMARY ==--
[ INFO ] Stage: Clean up
Log file is located at
/var/log/ovirt-engine/setup/ovirt-engine-setup-20140801174818-a7uxxy.log
[ INFO ] Generating answer file
'/var/lib/ovirt-engine/setup/answers/20140801175223-setup.conf'
[ INFO ] Stage: Pre-termination
[ INFO ] Stage: Termination
[ INFO ] Execution of setup completed successfully
--
To view, visit http://gerrit.ovirt.org/30932
To unsubscribe, visit http://gerrit.ovirt.org/settings
Gerrit-MessageType: comment
Gerrit-Change-Id: I24384e213470ff521a8a3651920fef594e4d7c9d
Gerrit-PatchSet: 2
Gerrit-Project: ovirt-engine
Gerrit-Branch: master
Gerrit-Owner: Simone Tiraboschi <[email protected]>
Gerrit-Reviewer: Simone Tiraboschi <[email protected]>
Gerrit-Reviewer: [email protected]
Gerrit-HasComments: No
_______________________________________________
Engine-patches mailing list
[email protected]
http://lists.ovirt.org/mailman/listinfo/engine-patches