On Dec 26, 2012, at 4:34 PM, John Kinsella <j...@stratosec.co> wrote:

> Chip, didya get this working? I took a quick look in the wiki and didn't see 
> any docs on it

I did actually. My problem boiled down to the client library I was
using hadn't been updated to match the server side API's desire to use
"+" as the space char.

Edison's instructions work.

>
> (Sorry all, I'm obviously catching up on some old threads )
> John
>
> On Nov 14, 2012, at 1:46 PM, Chip Childers <chip.child...@sungard.com> wrote:
>
>> On Fri, Nov 9, 2012 at 3:06 PM, Edison Su <edison...@citrix.com> wrote:
>>>
>>>
>>>> -----Original Message-----
>>>> From: Chip Childers [mailto:chip.child...@sungard.com]
>>>> Sent: Friday, November 09, 2012 10:46 AM
>>>> To: cloudstack-dev@incubator.apache.org
>>>> Subject: Help Needed: How can I use an SSL certificate that contains an
>>>> intermediate CA?
>>>>
>>>> Hi all,
>>>>
>>>> We're trying to use a certificate that has an intermediate CA in the cert 
>>>> chain
>>>> (top level CA > intermediate CA > certificate) for the console proxy.  Has
>>>> anyone documented the correct process for adding a cert chain?  The logic
>>>> for the uploadCustomCertificate API call only supports a single cert 
>>>> provided
>>>> by a top level CA right now.
>>>
>>>
>>> It can support cert chain, by use the id filed in the 
>>> uploadCustomCertificate api.
>>> Id =1 is root ca, 2 is intermediate ca, and so on.
>>>
>>>>
>>>> -chip
>>
>> I need some help with where to look next.  So far, I've got this in
>> the database (I'm not showing the cert or key fields):
>>
>> select id, name, domain_suffix, seq from keystore;
>> +----+-----------------+---------------------------+------+
>> | id | name            | domain_suffix             | seq  |
>> +----+-----------------+---------------------------+------+
>> |  1 | CPVMCertificate | console.test.com | NULL |
>> |  2 | root            | console.test.com |    1 |
>> |  8 | intermediate_ca | console.test.com |    2 |
>> +----+-----------------+---------------------------+------+
>> 3 rows in set (0.00 sec)
>>
>> However, after destroying the CPVM, and waiting for it to regenerate,
>> I see that it's still using the realhostip.keystore file.
>>
>> Looking at the code, I see that in
>> console-proxy/src/com/cloud/consoleproxy/ConsoleProxySecureServerFactoryImpl.java
>> there is an expectation for ksBits to be != null in order for an
>> alternate keystore file to be used.  That being said, I'm at a loss as
>> to how that value is set!
>>
>> Help would be appreciated.
>>
>> -chip
>
> Stratosec - Secure Infrastructure as a Service
> o: 415.315.9385
> @johnlkinsella
>

Reply via email to