Anton Marchukov created OVIRT-2052:
--------------------------------------
Summary: Updated SSL Stores on
resources.ovirt.org
Key: OVIRT-2052
URL:
https://ovirt-jira.atlassian.net/browse/OVIRT-2052
Project: oVirt - virtualization made easy
Issue Type: By-EMAIL
Reporter: Anton Marchukov
Assignee: infra
resources.ovirt.org has old SSL stores and does not consider lets
encrypt certs as valid:
ovpn-205-70:~ amarchuk$ ssh
http://resources.ovirt.org
ssh: Could not resolve hostname
http://resources.ovirt.org: nodename
nor servname provided, or not known
ovpn-205-70:~ amarchuk$ ssh
resources.ovirt.org
Last login: Thu May 10 14:19:17 2018 from
monitoring.ovirt.org
[amarchuk@resources02 ~]$ curl
https://jenkins.ovirt.org/
curl: (60) Peer's Certificate issuer is not recognized.
More details here:
http://curl.haxx.se/docs/sslcerts.html
curl performs SSL certificate verification by default, using a "bundle"
of Certificate Authority (CA) public keys (CA certs). If the default
bundle file isn't adequate, you can specify an alternate file
using the --cacert option.
If this HTTPS server uses a certificate signed by a CA represented in
the bundle, the certificate verification probably failed due to a
problem with the certificate (it might be expired, or the name might
not match the domain name in the URL).
If you'd like to turn off curl's verification of the certificate, use
the -k (or --insecure) option.
We also have a python utility called repoman that uses the bundle
certs inside “python-requests” library so we need to make sure it is
updated too along with the system certs.
We might have the same problem on other servers, e.g. on Jenkins and
it’s slaves so might make sense to analyse the situation and extend
this ticket.
--
This message was sent by Atlassian Jira
(v1001.0.0-SNAPSHOT#100085)