Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bug 1900138: Removed support for insecure mode for oVirt/RHV installation #4404

Merged
merged 1 commit into from Dec 5, 2020
Merged

Bug 1900138: Removed support for insecure mode for oVirt/RHV installation #4404

merged 1 commit into from Dec 5, 2020

Conversation

ghost
Copy link

@ghost ghost commented Nov 23, 2020

This change removes support for the insecure mode from the oVirt installer. Previously, when no certificate could be obtained from the oVirt engine the installer would proceed without certificate verification. This PR is based on #4387 and depends on OCPRHV-426.

Due to recent improvements this is no longer a valid use case and is being deprecated. The user is instead presented with a message explaining the situation and linking to the to-be-written documentation. If the user wants to use insecure mode they have to create a file named ~/.ovirt/ovirt-config.yaml with the following contents before running the installer:

ovirt_url: https://ovirt.example.com/ovirt-engine/api
ovirt_fqdn: ovirt.example.com
ovirt_pem_url: ""
ovirt_username: admin@internal
ovirt_password: super-secret-password
ovirt_insecure: true

User experience

$ bin/openshift-install create install-config
? SSH Public Key /home/janoszen/.ssh/id_rsa.pub
? Platform ovirt
? Engine FQDN[:PORT] vm-10-208.lab.eng.tlv2.redhat.com
INFO Loaded the following PEM file:
INFO    Version: 3
INFO    Signature Algorithm: SHA256-RSA
INFO    Serial Number: 4096
INFO    Issuer: CN=ovirt.example.com.39197,O=example.com,C=US
INFO    Validity:
INFO            Not Before: 2020-08-11 13:50:26 +0000 UTC
INFO            Not After: 2030-08-10 13:50:26 +0000 UTC
INFO    Subject: CN=ovirt.example.com.39197,O=example.com,C=US
? Would you like to use the above certificate to connect to Engine?  No
? Would you like to import another PEM bundle? No
ERROR ****************************************************************************
ERROR * Could not configure secure communication to the oVirt engine.            *
ERROR * As of 4.7 insecure mode for oVirt is no longer supported from the        *
ERROR * installer. Please see ____LINK____ for details how to configure insecure *
ERROR * mode manually.                                                           *
ERROR ****************************************************************************
ERROR oVirt configuration failed: cannot detect Engine CA cert imported in the system.
? Engine FQDN[:PORT]

@openshift-ci-robot openshift-ci-robot added do-not-merge/work-in-progress Indicates that a PR should not merge because it is a work in progress. bugzilla/severity-medium Referenced Bugzilla bug's severity is medium for the branch this PR is targeting. bugzilla/invalid-bug Indicates that a referenced Bugzilla bug is invalid for the branch this PR is targeting. labels Nov 23, 2020
@openshift-ci-robot
Copy link
Contributor

@janoszen: This pull request references Bugzilla bug 1900138, which is invalid:

  • expected the bug to target the "4.7.0" release, but it targets "---" instead

Comment /bugzilla refresh to re-evaluate validity if changes to the Bugzilla bug are made, or edit the title of this pull request to link to a different bug.

In response to this:

WIP: Bug 1900138: Removed support for insecure mode for oVirt/RHV installation

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@ghost
Copy link
Author

ghost commented Nov 23, 2020

/bugzilla refresh

@openshift-ci-robot openshift-ci-robot added bugzilla/valid-bug Indicates that a referenced Bugzilla bug is valid for the branch this PR is targeting. and removed bugzilla/invalid-bug Indicates that a referenced Bugzilla bug is invalid for the branch this PR is targeting. labels Nov 23, 2020
@openshift-ci-robot
Copy link
Contributor

@janoszen: This pull request references Bugzilla bug 1900138, which is valid. The bug has been moved to the POST state. The bug has been updated to refer to the pull request using the external bug tracker.

3 validation(s) were run on this bug
  • bug is open, matching expected state (open)
  • bug target release (4.7.0) matches configured target release for branch (4.7.0)
  • bug is in the state ASSIGNED, which is one of the valid states (NEW, ASSIGNED, ON_DEV, POST, POST)

In response to this:

/bugzilla refresh

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@ghost
Copy link
Author

ghost commented Nov 23, 2020

/retest

@ghost
Copy link
Author

ghost commented Nov 23, 2020

/assign @Gal-Zaidman

@openshift-ci-robot
Copy link
Contributor

@janoszen: This pull request references Bugzilla bug 1900138, which is valid.

3 validation(s) were run on this bug
  • bug is open, matching expected state (open)
  • bug target release (4.7.0) matches configured target release for branch (4.7.0)
  • bug is in the state POST, which is one of the valid states (NEW, ASSIGNED, ON_DEV, POST, POST)

In response to this:

WIP: Bug 1900138: Removed support for insecure mode for oVirt/RHV installation

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@ghost
Copy link
Author

ghost commented Nov 26, 2020

@Gal-Zaidman this one's next. We may need QA to look at this before we merge and we still need text for it.

@openshift-ci-robot
Copy link
Contributor

@janoszen: This pull request references Bugzilla bug 1900138, which is valid.

3 validation(s) were run on this bug
  • bug is open, matching expected state (open)
  • bug target release (4.7.0) matches configured target release for branch (4.7.0)
  • bug is in the state POST, which is one of the valid states (NEW, ASSIGNED, ON_DEV, POST, POST)

In response to this:

WIP: Bug 1900138: Removed support for insecure mode for oVirt/RHV installation

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

1 similar comment
@openshift-ci-robot
Copy link
Contributor

@janoszen: This pull request references Bugzilla bug 1900138, which is valid.

3 validation(s) were run on this bug
  • bug is open, matching expected state (open)
  • bug target release (4.7.0) matches configured target release for branch (4.7.0)
  • bug is in the state POST, which is one of the valid states (NEW, ASSIGNED, ON_DEV, POST, POST)

In response to this:

WIP: Bug 1900138: Removed support for insecure mode for oVirt/RHV installation

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@Gal-Zaidman
Copy link
Contributor

We may need QA to look at this before we merge and we still need text for it.

Can you also look at the commits I think something funky happened there

@ghost
Copy link
Author

ghost commented Nov 27, 2020

@Gal-Zaidman thanks, resolved the issue with the commits. QA got back to us and it looks good to them too, now we are just waiting for docs.

@Gal-Zaidman
Copy link
Contributor

/retest

Copy link
Contributor

@eslutsky eslutsky left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

we need to make sure that LINK is persistent as it will be hardcoded in the code

@ghost
Copy link
Author

ghost commented Nov 30, 2020

@eslutsky the docs bug is here: https://issues.redhat.com/browse/OCPRHV-426

@eslutsky
Copy link
Contributor

eslutsky commented Dec 1, 2020

@eslutsky the docs bug is here: https://issues.redhat.com/browse/OCPRHV-426

thanks , replied in the bug

…ure mode for oVirt/RHV installation

This change removes support for the insecure mode from the oVirt installer. Previously, when no certificate could be obtained from the oVirt engine the installer would proceed without certificate verification. Due to recent improvements this is no longer a valid use case and is being deprecated. The user is instead presented with a message explaining the situation and linking to the to-be-written documentation. If the user wants to use insecure mode they have to create a file named ~/.ovirt/ovirt-config.yaml with the following contents before running the installer:

```yaml
ovirt_url: https://ovirt.example.com/ovirt-engine/api
ovirt_fqdn: ovirt.example.com
ovirt_pem_url: ""
ovirt_username: admin@internal
ovirt_password: super-secret-password
ovirt_insecure: true
```
@ghost
Copy link
Author

ghost commented Dec 3, 2020

Link issue has been resolved in the latest update.

@dougsland
Copy link
Contributor

Can we start review this one? I see WIP in the title.

@ghost ghost changed the title WIP: Bug 1900138: Removed support for insecure mode for oVirt/RHV installation Bug 1900138: Removed support for insecure mode for oVirt/RHV installation Dec 3, 2020
@openshift-ci-robot openshift-ci-robot removed the do-not-merge/work-in-progress Indicates that a PR should not merge because it is a work in progress. label Dec 3, 2020
@dougsland
Copy link
Contributor

The patch looks good but I would exit the loop in case user reach the level of insecure as it's a critical thing and they would need to fix their env.

@ghost
Copy link
Author

ghost commented Dec 3, 2020

@dougsland not necessarily, they might just land in that branch by mistake. Very few people will actually want to use it without any verification, I can't even think of a single reason why you would want that.

@dougsland
Copy link
Contributor

@dougsland not necessarily, they might just land in that branch by mistake.
Very few people will actually want to use it without any verification,
I can't even think of a single reason why you would want that.

If you believe it's a dead code/scenario, probably consider removing the entire condition.
However, I believe we cannot guarantee the scenario for every single user out there.

ERROR **************************************************************************** 
ERROR * Could not configure secure communication to the oVirt engine.            * 
ERROR * As of 4.7 insecure mode for oVirt is no longer supported in the          * 
ERROR * installer. Please see the help article titled "Installing OpenShift on   * 
ERROR * RHV/oVirt in insecure mode" for details how to configure insecure mode   * 
ERROR * manually.                                                                * 
ERROR **************************************************************************** 
ERROR oVirt configuration failed: cannot detect engine ca cert imported in the system 

From my understanding:
This is a case where IPI installer detected an unsupported scenario and provided an error message to users.
On top of that, it's nothing something to solve in a blink of eyes (replaces/add certs) in the server with real users
depending on it (as might require maint window).

If you believe 100% users will achieve this code part as a mistake flow and want to continue the installer alive I would replace error with info message type.

@peterclauterbach
Copy link

From my understanding:
This is a case where IPI installer detected an unsupported scenario and provided an error message to users.
On top of that, it's nothing something to solve in a blink of eyes (replaces/add certs) in the server with real users
depending on it (as might require maint window).

If you believe 100% users will achieve this code part as a mistake flow and want to continue the installer alive I would replace error with info message type.

I think there is a case where you've made a genuine mistake in the certificates (like point to an expired one) , we should give you a chance to fix it, instead of failing immediately. The install will loop on this 3 times, and then fail. This seem like a good compromise of being forgiving, but not letting the user do something dangerous.

@dougsland
Copy link
Contributor

From my understanding:
This is a case where IPI installer detected an unsupported scenario and provided an error message to users.
On top of that, it's nothing something to solve in a blink of eyes (replaces/add certs) in the server with real users
depending on it (as might require maint window).
If you believe 100% users will achieve this code part as a mistake flow and want to continue the installer alive I would replace error with info message type.

I think there is a case where you've made a genuine mistake in the certificates (like point to an expired one) , we should give
you a chance to fix it, instead of failing immediately. The install will loop on this 3 times, and then fail. This seem like a good
compromise of being forgiving, but not letting the user do something dangerous.

Moving forward as PM requested.

@dougsland
Copy link
Contributor

/lgtm

@dougsland
Copy link
Contributor

/approve

@openshift-ci-robot openshift-ci-robot added the lgtm Indicates that a PR is ready to be merged. label Dec 4, 2020
@staebler
Copy link
Contributor

staebler commented Dec 4, 2020

/approve

@openshift-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: dougsland, staebler

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci-robot openshift-ci-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Dec 4, 2020
@openshift-bot
Copy link
Contributor

/retest

Please review the full test history for this PR and help us cut down flakes.

11 similar comments
@openshift-bot
Copy link
Contributor

/retest

Please review the full test history for this PR and help us cut down flakes.

@openshift-bot
Copy link
Contributor

/retest

Please review the full test history for this PR and help us cut down flakes.

@openshift-bot
Copy link
Contributor

/retest

Please review the full test history for this PR and help us cut down flakes.

@openshift-bot
Copy link
Contributor

/retest

Please review the full test history for this PR and help us cut down flakes.

@openshift-bot
Copy link
Contributor

/retest

Please review the full test history for this PR and help us cut down flakes.

@openshift-bot
Copy link
Contributor

/retest

Please review the full test history for this PR and help us cut down flakes.

@openshift-bot
Copy link
Contributor

/retest

Please review the full test history for this PR and help us cut down flakes.

@openshift-bot
Copy link
Contributor

/retest

Please review the full test history for this PR and help us cut down flakes.

@openshift-bot
Copy link
Contributor

/retest

Please review the full test history for this PR and help us cut down flakes.

@openshift-bot
Copy link
Contributor

/retest

Please review the full test history for this PR and help us cut down flakes.

@openshift-bot
Copy link
Contributor

/retest

Please review the full test history for this PR and help us cut down flakes.

@openshift-merge-robot
Copy link
Contributor

openshift-merge-robot commented Dec 5, 2020

@janoszen: The following test failed, say /retest to rerun all failed tests:

Test name Commit Details Rerun command
ci/prow/e2e-crc 4d8796a link /test e2e-crc

Full PR test history. Your PR dashboard.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here.

@openshift-merge-robot openshift-merge-robot merged commit b41e0ea into openshift:master Dec 5, 2020
@openshift-ci-robot
Copy link
Contributor

@janoszen: All pull requests linked via external trackers have merged:

Bugzilla bug 1900138 has been moved to the MODIFIED state.

In response to this:

Bug 1900138: Removed support for insecure mode for oVirt/RHV installation

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@ghost ghost deleted the bugzilla/1900138 branch December 7, 2020 09:30
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. bugzilla/severity-medium Referenced Bugzilla bug's severity is medium for the branch this PR is targeting. bugzilla/valid-bug Indicates that a referenced Bugzilla bug is valid for the branch this PR is targeting. lgtm Indicates that a PR is ready to be merged.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

8 participants