You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Attempting to use the netapp.um_info collection.
Latest version (21.8.1).
When using the collection in playbook (say na_um_list_clusters module), getting error message along the lines of:
(Caused by SSLError(SSLCertVerificationError(1, '[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: self-signed certificate in certificate chain (_ssl.c:1129)')
I can ignore this by setting validate_certs to false...but this isn't desired.
The cert is valid with a our internal/custom CA-signed certificate.
Is "seems" like this Ansible collection is possibly not leveraging the default/system keystore/truststore/CA bundle?
I can add the REQUESTS_CA_BUNDLE environment variable as a workaround as well...but seems odd/inconsistent to have to add the system/default CA bundle. Also...unsure if I should be relying on environment variables from the Python requests module in the netapp.um_info collection that aren't documented.
- name: List Clusters successfully with custom SSL CA bundle
netapp.um_info.na_um_list_clusters:
hostname: "{{ aiqum_hostname }}"
username: "{{ aiqum_username }}"
password: "{{ aiqum_password }}"
environment:
REQUESTS_CA_BUNDLE: /etc/pki/tls/certs/ca-bundle.crt
I expected the collection/modules to not need additional environment variables or configuration to be able to leverage the system default SSL Certificate Authorities.
Summary
Attempting to use the netapp.um_info collection.
Latest version (21.8.1).
When using the collection in playbook (say na_um_list_clusters module), getting error message along the lines of:
(Caused by SSLError(SSLCertVerificationError(1, '[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: self-signed certificate in certificate chain (_ssl.c:1129)')
I can ignore this by setting validate_certs to false...but this isn't desired.
The cert is valid with a our internal/custom CA-signed certificate.
Is "seems" like this Ansible collection is possibly not leveraging the default/system keystore/truststore/CA bundle?
I can add the REQUESTS_CA_BUNDLE environment variable as a workaround as well...but seems odd/inconsistent to have to add the system/default CA bundle. Also...unsure if I should be relying on environment variables from the Python requests module in the netapp.um_info collection that aren't documented.
Component Name
na_um_list_clusters
Ansible Version
UM_Info Collection Version
Playbook
Steps to Reproduce
Expected Results
I expected the collection/modules to not need additional environment variables or configuration to be able to leverage the system default SSL Certificate Authorities.
Actual Results
The text was updated successfully, but these errors were encountered: