Red Hat Bugzilla – Bug 1288188
Remove connection fallback to non ssl for Openstack providers
Last modified: 2016-02-10 10:21:55 EST
New commit detected on cfme/5.5.z: https://code.engineering.redhat.com/gerrit/gitweb?p=cfme.git;a=commitdiff;h=5f937ed3c8f42aea23a0dd689464159419804e52 commit 5f937ed3c8f42aea23a0dd689464159419804e52 Merge: f47b7ad 3e84fba Author: Greg Blomquist <gblomqui@redhat.com> AuthorDate: Tue Jan 12 08:28:35 2016 -0500 Commit: Greg Blomquist <gblomqui@redhat.com> CommitDate: Tue Jan 12 08:28:35 2016 -0500 Merge branch 'bz1288188' into '5.5.z' Bz1288188 Correct SSL handling for OpenStack provider and removing fallback to non ssl 5.5.z bugfix for: https://bugzilla.redhat.com/show_bug.cgi?id=1288188 Conflicts in UI form of: https://github.com/ManageIQ/manageiq/pull/5296 Conflicts: app/views/shared/views/ems_common/angular/_form.html.haml Clean cherry-pick of: https://github.com/ManageIQ/manageiq/pull/5862 Conflicts in test due to rspec should -> expect change: https://github.com/ManageIQ/manageiq/pull/5637 Conflicts: gems/pending/spec/openstack/openstack_handle/handle_spec.rb See merge request !706 .../ems_common/ems_common_form_controller.js | 3 ++ app/controllers/ems_cloud_controller.rb | 38 +++++++++-------- app/controllers/ems_common.rb | 38 +++++++++++++++-- app/models/ext_management_system.rb | 4 ++ .../manageiq/providers/openstack/cloud_manager.rb | 4 ++ .../manageiq/providers/openstack/infra_manager.rb | 4 ++ .../manageiq/providers/openstack/manager_mixin.rb | 2 +- app/views/ems_infra/_form_fields.html.haml | 2 +- .../views/ems_common/angular/_form.html.haml | 11 +++++ gems/pending/openstack/openstack_handle/handle.rb | 48 +++++++++++----------- .../openstack_handle/identity_delegate.rb | 2 +- .../spec/openstack/openstack_handle/handle_spec.rb | 17 ++------ 12 files changed, 112 insertions(+), 61 deletions(-)
Verified the following in 5.5.2.1 1)SSL that requires validation expected result : If certificate validation fails then the connection fails 2)SSL that doesn't require validation exp result : If certificate validation fails then it should continue with an encrypted connection and not fallback to non-ssl connection (unencrypted). Provider refresh succeeded.
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2016:0159