Skip to content
Snippets Groups Projects
Select Git revision
  • 2092220634ffac8235abe2de5b3ad34c71a617f2
  • master default protected
  • v1.14.7
  • v1.14.6
  • v1.14.5
  • v1.14.4
  • v1.14.3
  • v1.14.2
  • v1.14.1
  • v1.14.0
  • v1.13.2
  • v1.13.1
  • v1.13.0
  • v1.12.1
  • v1.12.0
  • v1.11.1
  • v1.11.0
  • v1.10.0
  • v1.9.2
  • v1.9.1
  • v1.9.0
  • v1.8.4
22 results

ipareplica_test.py

  • Thomas Woerner's avatar
    20922206
    ipareplica: Make sure that certmonger picks the right master · 20922206
    Thomas Woerner authored
    This is related to freeipa#0f31564b35aac250456233f98730811560eda664
    
      During ipa-replica-install, http installation first creates a service
      principal for http/hostname (locally on the soon-to-be-replica), then
      waits for this entry to be replicated on the master picked for the
      install.
      In a later step, the installer requests a certificate for HTTPd. The local
      certmonger first tries the master defined in xmlrpc_uri (which is
      pointing to the soon-to-be-replica), but fails because the service is not
      up yet. Then certmonger tries to find a master by using the DNS and looking
      for a ldap service. This step can pick a different master, where the
      principal entry has not always be replicated yet.
      As the certificate request adds the principal if it does not exist, we can
      end by re-creating the principal and have a replication conflict.
    
      The replication conflict later causes kerberos issues, preventing
      from installing a new replica.
    
      The proposed fix forces xmlrpc_uri to point to the same master as the one
      picked for the installation, in order to make sure that the master already
      contains the principal entry.
    
      https://pagure.io/freeipa/issue/7041
    20922206
    History
    ipareplica: Make sure that certmonger picks the right master
    Thomas Woerner authored
    This is related to freeipa#0f31564b35aac250456233f98730811560eda664
    
      During ipa-replica-install, http installation first creates a service
      principal for http/hostname (locally on the soon-to-be-replica), then
      waits for this entry to be replicated on the master picked for the
      install.
      In a later step, the installer requests a certificate for HTTPd. The local
      certmonger first tries the master defined in xmlrpc_uri (which is
      pointing to the soon-to-be-replica), but fails because the service is not
      up yet. Then certmonger tries to find a master by using the DNS and looking
      for a ldap service. This step can pick a different master, where the
      principal entry has not always be replicated yet.
      As the certificate request adds the principal if it does not exist, we can
      end by re-creating the principal and have a replication conflict.
    
      The replication conflict later causes kerberos issues, preventing
      from installing a new replica.
    
      The proposed fix forces xmlrpc_uri to point to the same master as the one
      picked for the installation, in order to make sure that the master already
      contains the principal entry.
    
      https://pagure.io/freeipa/issue/7041