Browse Source

Merge "Revert "Point InternalTLSVncCAFile to /etc/ipa/ca.crt"" into stable/rocky

tags/9.4.1
Zuul 6 months ago
parent
commit
29dc880347
5 changed files with 4 additions and 14 deletions
  1. +1
    -1
      docker/services/nova-libvirt.yaml
  2. +1
    -1
      docker/services/nova-vnc-proxy.yaml
  3. +1
    -1
      puppet/services/nova-libvirt.yaml
  4. +1
    -1
      puppet/services/nova-vnc-proxy.yaml
  5. +0
    -10
      releasenotes/notes/nova-point-internalTLSVNCCAFile-to-ipa-ca-1dfccad609a4d4cb.yaml

+ 1
- 1
docker/services/nova-libvirt.yaml View File

@@ -97,7 +97,7 @@ parameters:
description: Specifies the default CA cert to use if TLS is used for
services in the internal network.
InternalTLSVncCAFile:
default: '/etc/ipa/ca.crt'
default: '/etc/pki/CA/certs/vnc.crt'
type: string
description: Specifies the CA cert to use for VNC TLS.
LibvirtCACert:

+ 1
- 1
docker/services/nova-vnc-proxy.yaml View File

@@ -55,7 +55,7 @@ parameters:
enable TLS transaport for libvirt VNC and configure the
relevant keys for libvirt.
InternalTLSVncCAFile:
default: '/etc/ipa/ca.crt'
default: '/etc/pki/CA/certs/vnc.crt'
type: string
description: Specifies the CA cert to use for VNC TLS.
LibvirtVncCACert:

+ 1
- 1
puppet/services/nova-libvirt.yaml View File

@@ -88,7 +88,7 @@ parameters:
description: Specifies the default CA cert to use if TLS is used for
services in the internal network.
InternalTLSVncCAFile:
default: '/etc/ipa/ca.crt'
default: '/etc/pki/CA/certs/vnc.crt'
type: string
description: Specifies the CA cert to use for VNC TLS.
LibvirtCACert:

+ 1
- 1
puppet/services/nova-vnc-proxy.yaml View File

@@ -56,7 +56,7 @@ parameters:
enable TLS transaport for libvirt VNC and configure the
relevant keys for libvirt.
InternalTLSVncCAFile:
default: '/etc/ipa/ca.crt'
default: '/etc/pki/CA/certs/vnc.crt'
type: string
description: Specifies the CA cert to use for VNC TLS.
LibvirtVncCACert:

+ 0
- 10
releasenotes/notes/nova-point-internalTLSVNCCAFile-to-ipa-ca-1dfccad609a4d4cb.yaml View File

@@ -1,10 +0,0 @@
---
fixes:
- |
In case the freeipa CA is a sub CA of an external CA the InternalTLSVncCAFile
requrested does not have the full CA chain and only have the free IPA
CA. As a result qemu which can not verify the vnc certificate sent by
the vnc-proxy. The issue is in certmonger as it does not return the full
CA chain.
As a workaround, until certmonger is fixed, this change points the
InternalTLSVncCAFile to /etc/ipa/ca.crt which has the full CA chain.

Loading…
Cancel
Save