Hello again, I figured out, this resolve my question # curl -X POST -H "Accept: application/xml" -H "Content-type: application/xml" -u admin@internal:pass --cacert ca.crt -d "<action><ticket><expiry>120</expiry></ticket></action>" https://vm-srv:8443/api/vms/d3db360f-4ff5-46f5-b61d-db09465db52c/ticket <?xml version="1.0" encoding="UTF-8" standalone="yes"?> <action> <ticket> <value>+e/OUQvquJx4</value> <expiry>120</expiry> </ticket> <status> <state>complete</state> </status> </action>
Artem 2012/8/7 Artem <ar...@e-inet.ru>: > Hi all, thaks for lot, it's work > > 1) get CA to client "wget -O ${CA_FILE} > http://ovirt-engine.example.org/ca.crt" > 2) set "vdsClient -s 0 setVmTicket ${VM_UUID} ${PASSWORD} > ${VALIDITY_SECONDS}" on kvm host > 3) and connect to consle use this line "spicec --ca-file ${CA_FILE} -w > ${PASSWORD} -h vm-srv -s ${SECURE_PORT}" successfully > > but how to install "setVmTicket" without login as root on kvm host, > how to make it through the post request? > > > 2012/8/6 David Jaša <dj...@redhat.com>: >> @Itamar - this is recurring problem, what about creating a wiki page for >> it? >> >> @Artem: >> >> Artem píše v Po 06. 08. 2012 v 01:30 +0400: >>> yes engine and kvm(qemu-kvm) installed on same machine (vm-srv) >>> >>> i change host-subject but.. >>> >>> # spicec -h vm-srv -p 5900 -s 5901 --host-subject "C=US, O=ICL, >>> CN=vm-srv" --secure-channels=all >> >> 1) your command line is missing '--ca-file $CA_FILE' altoghether >> >> 2) you don't mention password >> >> 3) you shouldn't need to specify host subject at all because your host >> (-h) matches name of server in CN field of host subject. If you override >> it anyway, strip white spaces after commas in it: >> --host-subject='C=US,O=ICL,CN=vm-srv' >> >> 4) you could omit -p and --secure-channels altogether in order to >> achieve tls-only connection, but you can hit >> https://bugzilla.redhat.com/show_bug.cgi?id=723582 then >> >> So you should do (out of my head, may contain typos): >> get CA: >> * on engine, it is found here: >> CA_FILE=/etc/pki/ovirt-engine/ca.pem >> * on host, it's here: >> CA_FILE=/etc/pki/vdsm/libvirt-spice/ca-cert.pem >> * on any other host, get it from engine web interface: >> wget -O ${CA_FILE} http://ovirt-engine.example.org/ca.crt >> >> on the host, get UUID of the VM: >> $ VM_UUID="$(ps -ef | grep ${VM_NAME} | sed -e 's/^.*-uuid[ \t]\+\([ >> \t]\+\)[ \t].*$/\1/')" >> >> as root on the host, set ticket (password and its period of validity): >> # vdsClient -s 0 setVmTicket ${VM_UUID} ${PASSWORD} ${VALIDITY_SECONDS} >> (doing it via REST API is cleaner but more cumbersome for me) >> >> if the hostname you're connecting does not match what is in CN field of >> Subject of the server cert, get the subject without spaces after commas >> on the host: >> $ grep Subject: ${SERVER_CERT_FILE} | sed -e 's/^.*Subject:[ >> \t]*\(.*\)$/\1/;s/,[ \t]*/,/' >> >> connect to the spice-server: >> $ spicec --ca-file ${CA_FILE} -w ${PASSWORD} -h vm-srv -s ${SECURE_PORT} >> OR, with newer, shinier and overall better client :) >> # yum install virt-viewer >> $ remote-viewer --spice-ca-file /etc/pki/ovirt-engine/ca.pem >> spice://vm-srv/?tls-port=${SECURE_PORT} >> (you'll have to provide the password through the pop-up dialog) >> >> if you need to provide host subject (host name/IP not matching the one from >> server cert Subject): >> $ spicec --host-subject ${HOST_SUBJECT} [...] >> OR >> $ remote-viewer --spice-host-subject ${HOST_SUBJECT} [...] >> >> David >> >> >>> Error: subject mismatch: #entries cert=2, input=3 >>> Error: failed to connect w/SSL, ssl_error >>> error:00000001:lib(0):func(0):reason(1) >>> 3079539240:error:14090086:SSL >>> routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify >>> failed:s3_clnt.c:1063: >>> Warning: SSL Error: >>> >>> >>> 2012/8/6 Itamar Heim <ih...@redhat.com>: >>> > On 08/06/2012 12:07 AM, Artem wrote: >>> >> >>> >> hmm... not sure if understood correctly... >>> >> >>> >> vm-srv this KVM host.. (server) and I connect from another machine to vm >>> >> on kvm. >>> > >>> > >>> > did you install the engine and kvm host on same machine? >>> > >>> > >>> >> >>> >> this subject name i get in .spicec/spice_truststore.pem >>> > >>> > >>> > yes, spice trusts the CA, but client needs to validate the target host >>> > certificate. >>> > (if you run engine and host on same machine, try: >>> > "C=US, O=ICL, CN=vm-srv" >>> > (assuming you added the host with hostname of vm-srv to engine. if you >>> > added >>> > it with fqdn or ip, use them under last CN) >>> > >>> > >>> >> >>> >> ////////////////////////////////// >>> >> # cat .spicec/spice_truststore.pem >>> >> Certificate: >>> >> Data: >>> >> Version: 3 (0x2) >>> >> Serial Number: 1 (0x1) >>> >> Signature Algorithm: sha1WithRSAEncryption >>> >> Issuer: C=US, O=ICL, CN=CA-vm-srv.15064 >>> >> Validity >>> >> Not Before: Jul 28 03:42:06 2012 >>> >> Not After : Jul 26 23:42:07 2022 GMT >>> >> Subject: C=US, O=ICL, CN=CA-vm-srv.15064 >>> >> Subject Public Key Info: >>> >> Public Key Algorithm: rsaEncryption >>> >> Public-Key: (2048 bit) >>> >> Modulus: >>> >> /////////////////////////////////////////// >>> >> >>> >> 2012/8/6 Itamar Heim <ih...@redhat.com>: >>> >>> >>> >>> this looks like the subject name of the CA, not the host running the >>> >>> virtual >>> >>> machine? >>> > >>> > >>> > >>> _______________________________________________ >>> Users mailing list >>> Users@ovirt.org >>> http://lists.ovirt.org/mailman/listinfo/users >> >> -- >> >> David Jaša, RHCE >> >> SPICE QE based in Brno >> GPG Key: 22C33E24 >> Fingerprint: 513A 060B D1B4 2A72 7F0D 0278 B125 CD00 22C3 3E24 >> >> >> _______________________________________________ Users mailing list Users@ovirt.org http://lists.ovirt.org/mailman/listinfo/users