manila/releasenotes/notes/1900191-netapp-fix-ssl-cert-path-option-35354c9b7a9c37e6.yaml
Felipe Rodrigues 70f7859f98 [NetApp] Fix hard-coded CA cert path for SSL
NetApp driver is hard-coding the location of CA certificates for SSL
verification during HTTPS requests. This location may change depending
on the environment or/and backend.

This patch adds the `netapp_ssl_cert_path` configuration, enabling
each backend to choose the directory with certificates of trusted CA
or the CA bundle. If set to a directory, it must have been processed
using the c_rehash utility supplied with OpenSSL. If not informed,
it will use the Mozilla's carefully curated collection of Root
Certificates for validating the trustworthiness of SSL certificates.

Closes-Bug: #1900191
Change-Id: Idbed4745104de26af99bb16e07c6890637dfcfd1
2020-11-16 16:04:26 -03:00

21 lines
1.1 KiB
YAML

---
upgrade:
- Added a new config option `netapp_ssl_cert_path` for NetApp driver.
This option enables the user to choose the directory with certificates of
trusted CA or the CA bundle. If set to a directory, it must have been
processed using the c_rehash utility supplied with OpenSSL. If not
informed, it will use the Mozilla's carefully curated collection of Root
Certificates for validating the trustworthiness of SSL certificates.
fixes:
- |
Fixed an issue on ONTAP NetApp driver that was forcing the location of
CA certificates for SSL verification during HTTPS requests. It adds the
`netapp_ssl_cert_path` configuration, enabling the user to choose the
directory with certificates of trusted CA or the CA bundle. If set to a
directory, it must have been processed using the c_rehash utility supplied
with OpenSSL. If not informed, it will use the Mozilla's carefully curated
collection of Root Certificates for validating the trustworthiness of SSL
certificates. Please refer to the
`Launchpad bug #1900191 <https://bugs.launchpad.net/manila/+bug/1900191>`_
for more details.