I think part of my misunderstanding is that ovirt-websocket-proxy does a few things behind
the scene as it is not the source of the initial connection to ovirt.
I am going another route. My proxy are servers which get the console.vv file from ovirt
when they are alerted someone wants to make a webview to a particular Vm. at that point it
requests the console.vv file from ovirt using rest api and then create the websockify
process with a random port which they send back to the requesting app via another secure
channel. The receiving app then launches a browser tab connecting the web-spice-client to
the address of the webproxy and the port.
the http connection is encrypted using a letsencrypt certificate and that is working fine.
The part I am having difficulties is the connection part between the web proxy and the
ovirt host. Ovirt expect it to be encapsulated in TLS/1.2 if I am not mistaken, but
can't figure out how to make websockify to use the cafile, ssl-cyphers and the
host-subject to do so. I am missing a part which I think should be simple for someone
understanding ssl better than I do
Thanks