Allow configuration of external CA

Bug #1691874 reported by James Hebden
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
Ceph RADOS Gateway Charm
Incomplete
Medium
Unassigned

Bug Description

When using ceph-radosgw in an environment where all services, including keystone, are using certificates signed with an external CA, the ceph-radosgw charm is not able to communicate with Keystone.

Adding an option to specify an additional CA certificate, which could be added to the system trusted certificate bundle, or configured for use explicitly with the python requests library when making calls to keystone, would allow this to work.

James Hebden (ec0)
tags: added: canonical-bootstack
Revision history for this message
James Page (james-page) wrote :

Confirmed; the charm does not have any SSL configuration options, but will need to communicate over SSL to the keystone API for authentication; needs a ssl_ca configuration style option to allow a private enterprise CA to be used for the deployment.

Changed in charm-ceph-radosgw:
status: New → Triaged
importance: Undecided → Medium
milestone: none → 17.08
Ryan Beisner (1chb1n)
tags: added: adrastea
Revision history for this message
David Ames (thedac) wrote :

The ceph-radosgw charm does attempt to setup the keystone CA information:

https://github.com/openstack/charm-ceph-radosgw/blob/master/hooks/hooks.py#L219
https://github.com/openstack/charm-ceph-radosgw/blob/master/hooks/utils.py#L428

It would be very helpful to have some logs and error output on how this failed in a deployment. I'll see if I can recreate it in the lab.

Changed in charm-ceph-radosgw:
status: Triaged → Incomplete
Revision history for this message
David Ames (thedac) wrote :

Actually, this bug is a duplicate of #1691875 which is fix committed.

To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.