Revert "Point InternalTLSVncCAFile to /etc/ipa/ca.crt"
We believe this change induced a regression[1] that is further breaking TripleO TLS-Everywhere deployments. Submitting a revert patch while we investigate and work on a more robust solution.
[1] - https://bugzilla.redhat.com/show_bug.cgi?id=1743485
This reverts commit b93c672313
.
Change-Id: Ie46ae8b185d53adea6f0904a5e140957c6046c83
This commit is contained in:
parent
b93c672313
commit
ad1a53934f
|
@ -95,7 +95,7 @@ parameters:
|
|||
description: Specifies the default CA cert to use if TLS is used for
|
||||
services in the internal network.
|
||||
InternalTLSVncCAFile:
|
||||
default: '/etc/ipa/ca.crt'
|
||||
default: '/etc/pki/CA/certs/vnc.crt'
|
||||
type: string
|
||||
description: Specifies the CA cert to use for VNC TLS.
|
||||
LibvirtCACert:
|
||||
|
|
|
@ -55,7 +55,7 @@ parameters:
|
|||
enable TLS transaport for libvirt VNC and configure the
|
||||
relevant keys for libvirt.
|
||||
InternalTLSVncCAFile:
|
||||
default: '/etc/ipa/ca.crt'
|
||||
default: '/etc/pki/CA/certs/vnc.crt'
|
||||
type: string
|
||||
description: Specifies the CA cert to use for VNC TLS.
|
||||
LibvirtVncCACert:
|
||||
|
|
|
@ -88,7 +88,7 @@ parameters:
|
|||
description: Specifies the default CA cert to use if TLS is used for
|
||||
services in the internal network.
|
||||
InternalTLSVncCAFile:
|
||||
default: '/etc/ipa/ca.crt'
|
||||
default: '/etc/pki/CA/certs/vnc.crt'
|
||||
type: string
|
||||
description: Specifies the CA cert to use for VNC TLS.
|
||||
LibvirtCACert:
|
||||
|
|
|
@ -56,7 +56,7 @@ parameters:
|
|||
enable TLS transaport for libvirt VNC and configure the
|
||||
relevant keys for libvirt.
|
||||
InternalTLSVncCAFile:
|
||||
default: '/etc/ipa/ca.crt'
|
||||
default: '/etc/pki/CA/certs/vnc.crt'
|
||||
type: string
|
||||
description: Specifies the CA cert to use for VNC TLS.
|
||||
LibvirtVncCACert:
|
||||
|
|
|
@ -1,10 +0,0 @@
|
|||
---
|
||||
fixes:
|
||||
- |
|
||||
In case the freeipa CA is a sub CA of an external CA the InternalTLSVncCAFile
|
||||
requrested does not have the full CA chain and only have the free IPA
|
||||
CA. As a result qemu which can not verify the vnc certificate sent by
|
||||
the vnc-proxy. The issue is in certmonger as it does not return the full
|
||||
CA chain.
|
||||
As a workaround, until certmonger is fixed, this change points the
|
||||
InternalTLSVncCAFile to /etc/ipa/ca.crt which has the full CA chain.
|
Loading…
Reference in New Issue