Revert "Point InternalTLSVncCAFile to /etc/ipa/ca.crt"

We believe this change induced a regression[1] that is further breaking TripleO TLS-Everywhere deployments. Submitting a revert patch while we investigate and work on a more robust solution.

[1] - https://bugzilla.redhat.com/show_bug.cgi?id=1743485

This reverts commit b93c672313.

Change-Id: Ie46ae8b185d53adea6f0904a5e140957c6046c83
This commit is contained in:
Harry Rybacki 2019-08-20 18:56:34 +00:00
parent b93c672313
commit ad1a53934f
5 changed files with 4 additions and 14 deletions

View File

@ -95,7 +95,7 @@ parameters:
description: Specifies the default CA cert to use if TLS is used for
services in the internal network.
InternalTLSVncCAFile:
default: '/etc/ipa/ca.crt'
default: '/etc/pki/CA/certs/vnc.crt'
type: string
description: Specifies the CA cert to use for VNC TLS.
LibvirtCACert:

View File

@ -55,7 +55,7 @@ parameters:
enable TLS transaport for libvirt VNC and configure the
relevant keys for libvirt.
InternalTLSVncCAFile:
default: '/etc/ipa/ca.crt'
default: '/etc/pki/CA/certs/vnc.crt'
type: string
description: Specifies the CA cert to use for VNC TLS.
LibvirtVncCACert:

View File

@ -88,7 +88,7 @@ parameters:
description: Specifies the default CA cert to use if TLS is used for
services in the internal network.
InternalTLSVncCAFile:
default: '/etc/ipa/ca.crt'
default: '/etc/pki/CA/certs/vnc.crt'
type: string
description: Specifies the CA cert to use for VNC TLS.
LibvirtCACert:

View File

@ -56,7 +56,7 @@ parameters:
enable TLS transaport for libvirt VNC and configure the
relevant keys for libvirt.
InternalTLSVncCAFile:
default: '/etc/ipa/ca.crt'
default: '/etc/pki/CA/certs/vnc.crt'
type: string
description: Specifies the CA cert to use for VNC TLS.
LibvirtVncCACert:

View File

@ -1,10 +0,0 @@
---
fixes:
- |
In case the freeipa CA is a sub CA of an external CA the InternalTLSVncCAFile
requrested does not have the full CA chain and only have the free IPA
CA. As a result qemu which can not verify the vnc certificate sent by
the vnc-proxy. The issue is in certmonger as it does not return the full
CA chain.
As a workaround, until certmonger is fixed, this change points the
InternalTLSVncCAFile to /etc/ipa/ca.crt which has the full CA chain.