Bug 1701416
Summary: | [RFE] Enable SSL termination for RadosGW | ||
---|---|---|---|
Product: | Red Hat OpenStack | Reporter: | Giulio Fidente <gfidente> |
Component: | openstack-tripleo-heat-templates | Assignee: | Giulio Fidente <gfidente> |
Status: | CLOSED ERRATA | QA Contact: | Yogev Rabl <yrabl> |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | 16.1 (Train) | CC: | amcleod, astillma, cbodley, dbecker, fpantano, gcharot, jdurgin, johfulto, lhh, mburns, morazi, panburaj, sclewis, scohen, spower |
Target Milestone: | ga | Keywords: | FutureFeature, Triaged |
Target Release: | 16.1 (Train on RHEL 8.2) | ||
Hardware: | Unspecified | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | openstack-tripleo-heat-templates-11.3.2-0.20200315025718.033aae9.el8ost.noarch.rpm | Doc Type: | Enhancement |
Doc Text: |
With this enhancement, HTTP traffic that travels from the HAProxy load balancer to Red Hat Ceph Storage RadosGW instances is encrypted.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2020-07-29 07:49:26 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1722071, 1846812 | ||
Bug Blocks: | 1643715, 1947556 |
Description
Giulio Fidente
2019-04-18 22:08:46 UTC
*** Bug 1571225 has been marked as a duplicate of this bug. *** If this bug requires doc text for errata release, please set the 'Doc Type' and provide draft text according to the template in the 'Doc Text' field. The documentation team will review, edit, and approve the text. If this bug does not require doc text, please set the 'requires_doc_text' flag to '-'. Verified with CI on openstack-tripleo-heat-templates-11.3.2-0.20200616081529.396affd.el8ost.noarch Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2020:3148 |