Hi Harri,
as far as I can tell your inventory config looks ok.
Is in the certificate "/work/okd01/ssl/okd01.cert.pem" the hostname/CN "
okd01.example.com" listed? For example '*.okd01.example.com' wouldn't work.
I remember having a similar issue...
Did you get any warnings while running the redeploy_certificates playbook?
Did you check the master API logs (run from master node with 'master-logs
api api') is there a hint why the certs aren't delivered?
Is in the /etc/origin/master/master-config.yaml (see namedCertificates) the
correct certificate referenced?
Did you used on purpose the same key for two different certificates?

Regards,
Nikolas

Am Di., 26. März 2019 um 17:21 Uhr schrieb James Cassell <
fedoraproj...@cyberpear.com>:

> On Tue, Mar 26, 2019, at 11:49 AM, Harald Dunkel wrote:
> > Hi folks,
> >
> > I am running okd 3.11 on Centos 7.6. The inventory file registers
> > 2 certificate chains (based upon a common, private CA), as described on
> >
> https://docs.openshift.com/container-platform/3.11/install_config/certificate_customization.html
> >
> > :
> > openshift_master_overwrite_named_certificates=true
> > openshift_master_named_certificates=[{"certfile":
> > "/work/okd01/ssl/okd01.cert.pem", "keyfile":
> > "/work/okd01/ssl/okd01.key.pem", "names": ["okd01.example.com"],
> > "cafile": "/work/okd01/ssl/ca.cert.pem" }]
> > openshift_hosted_router_certificate={"certfile":
> > "/work/okd01/ssl/star.okd01.cert.pem", "keyfile":
> > "/work/okd01/ssl/okd01.key.pem", "cafile":
> > "/work/okd01/ssl/ca.cert.pem" }
> > :
> >
>
> Here's what worked for me:
>
> # Custom Certs: https://blog.openshift.com/lets-encrypt-acme-v2-api/
> openshift_master_overwrite_named_certificates=true
> <https://blog.openshift.com/lets-encrypt-acme-v2-api/openshift_master_overwrite_named_certificates=true>
> openshift_master_named_certificates=[{"certfile": "{{ inventory_dir
> }}/certs/archive/master.example.com/fullchain1.pem", "keyfile": "{{
> inventory_dir }}/certs/archive/master.example.com/privkey1.pem", "names":
> ["master.example.com"], "cafile": "{{ inventory_dir }}/certs/archive/
> master.example.com/fullchain1.pem"}]
> openshift_hosted_router_certificate={"certfile": "{{ inventory_dir
> }}/certs/archive/master.example.com/fullchain1.pem", "keyfile": "{{
> inventory_dir }}/certs/archive/master.example.com/privkey1.pem",
> "cafile": "{{ inventory_dir }}/certs/archive/
> master.example.com/fullchain1.pem"}
>
>
> I may have had to re-deploy OpenShift to make it take full effect, but I
> think it worked mostly fine with the redeploy-certificates.yml playbook.
>
> I don't know if it's supported to have the console/api domain as a
> subdomain of router wildcard domain?
>
>
> V/r,
> James Cassell
>
>
>
> > Problem is: I see all certificates in /etc/origin/master and
> > especially /etc/origin/master/named_certificates, but apparently
> > the web interface doesn't use it. openssl tells me:
> >
> > % openssl s_client -connect okd01.example.com:8443
> > depth=1 CN = openshift-signer@1553169466
> > verify error:num=19:self signed certificate in certificate chain
> > CONNECTED(00000003)
> > ---
> > Certificate chain
> >   0 s:/CN=172.19.96.96
> >     i:/CN=openshift-signer@1553169466
> >   1 s:/CN=openshift-signer@1553169466
> >     i:/CN=openshift-signer@1553169466
> > ---
> > :
> > :
> >
> > Please note the self signed certificates. For the cluster console
> > I see the expected certificates instead:
> >
> > % openssl s_client -connect console.okd01.example.com:443
> > depth=2 C = DE, O = example AG, OU = example Certificate Authority, CN =
> root-CA
> > verify return:1
> > depth=1 C = DE, O = example AG, OU = example Certificate Authority, CN =
> tls-CA
> > verify return:1
> > depth=0 C = DE, O = example AG, CN = *.okd01.example.com
> > verify return:1
> > CONNECTED(00000003)
> > ---
> > Certificate chain
> >   0 s:/C=DE/O=example AG/CN=*.okd01.example.com
> >     i:/C=DE/O=example AG/OU=example Certificate Authority/CN=tls-CA
> >   1 s:/C=DE/O=example AG/OU=example Certificate Authority/CN=tls-CA
> >     i:/C=DE/O=example AG/OU=example Certificate Authority/CN=root-CA
> >   2 s:/C=DE/O=example AG/OU=example Certificate Authority/CN=root-CA
> >     i:/C=DE/O=example AG/OU=example Certificate Authority/CN=root-CA
> > ---
> > Server certificate
> > :
> > :
> >
> > How comes my named certificates have been lost/ignored? Are there
> > additional steps required I was too blind to see?
> >
> >
> > Every helpful comment is highly appreciated
> > Harri
> >
> > _______________________________________________
> > users mailing list
> > users@lists.openshift.redhat.com
> > http://lists.openshift.redhat.com/openshiftmm/listinfo/users
> >
>
> _______________________________________________
> users mailing list
> users@lists.openshift.redhat.com
> http://lists.openshift.redhat.com/openshiftmm/listinfo/users
>
_______________________________________________
users mailing list
users@lists.openshift.redhat.com
http://lists.openshift.redhat.com/openshiftmm/listinfo/users

Reply via email to