mirror of
https://github.com/openshift/installer.git
synced 2026-02-05 15:47:14 +01:00
openstack: Only check HTTPS certs on public endpoints
Before this change the validation steps, and the script, assumed that `internal` and `admin` OpenStack endpoints were always reachable. With this change, the manual steps and the script are amended to only check the validity of HTTPS certificates on the `public` endpoints of the OpenStack catalog.
This commit is contained in:
@@ -7,7 +7,7 @@ With OpenShift v4.10, HTTPS certificates not using the `Subject Alternative Name
|
||||
A script provided below automates the operation. However, it requires to have a set of tools available (including a relatively recent version of `python3-openstackclient`). To manually check your OpenStack infrastructure:
|
||||
|
||||
1. Collect the URL of the OpenStack public endpoints with `openstack catalog list` (HTTP (unsecured) endpoints do not need to be checked)
|
||||
2. For each HTTPS endpoint: collect the host (by removing the scheme, the port and the path) and the port
|
||||
2. For each public HTTPS endpoint: collect the host (by removing the scheme, the port and the path) and the port
|
||||
3. Run this openssl command to extract the SAN field of the certificate:
|
||||
|
||||
```plaintext
|
||||
@@ -49,7 +49,7 @@ readonly catalog san
|
||||
declare invalid=0
|
||||
|
||||
openstack catalog list --format json --column Name --column Endpoints \
|
||||
| jq -r '.[] | .Name as $name | .Endpoints[] | [$name, .interface, .url] | join(" ")' \
|
||||
| jq -r '.[] | .Name as $name | .Endpoints[] | select(.interface=="public") | [$name, .interface, .url] | join(" ")' \
|
||||
| sort \
|
||||
> "$catalog"
|
||||
|
||||
|
||||
Reference in New Issue
Block a user