Use only approved TLS1.2 FIPS cipher suites (libvirt)

* ECDHE-RSA-AES256-GCM-SHA384
* ECDHE-ECDSA-AES256-GCM-SHA384
* ECDHE-RSA-AES256-SHA384
* ECDHE-ECDSA-AES256-SHA384

Change-Id: Ib213f9eaffedee6bad302e598d0a5bf6d452815c
Related-Prod: PROD-27620
diff --git a/nova/compute/libvirt/ssl/init.yml b/nova/compute/libvirt/ssl/init.yml
index 4523183..6e29e07 100644
--- a/nova/compute/libvirt/ssl/init.yml
+++ b/nova/compute/libvirt/ssl/init.yml
@@ -16,6 +16,7 @@
           cert_file: ${_param:libvirtd_server_ssl_cert_file}
           ca_file: ${_param:libvirtd_ssl_ca_file}
           allowed_dn_list: ${_param:nova_compute_libvirt_allowed_dn_list}
+          priority: "SECURE256:-VERS-ALL:+VERS-TLS1.2:-KX-ALL:+ECDHE-RSA:+ECDHE-ECDSA:-CIPHER-ALL:+AES-256-GCM:+AES-256-CBC:-MAC-ALL:+AEAD:+SHA384"
           client:
             key_file: ${_param:libvirtd_client_ssl_key_file}
             cert_file: ${_param:libvirtd_client_ssl_cert_file}