Skip to content

Commit 68a81f3

Browse files
committed
Added information about SSL certificate checking.
1 parent 909f2a4 commit 68a81f3

File tree

1 file changed

+22
-0
lines changed

1 file changed

+22
-0
lines changed

doc/source/configuration.rst

Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -55,6 +55,28 @@ credentials to connect to the API). Check the following:
5555
mapping from VOs to local tenants as configured in Keystone-VOMS. If
5656
you are running ``cASO`` on keystone host, it likely
5757
is ``/etc/keystone/voms.json``. Otherwise, you have to sync this file.
58+
* ``insecure`` (default: ``False``), wether to check or not the server's
59+
certificate.
60+
61+
.. important::
62+
Your should not use ``insecure=True`` in production! If you get a SSL
63+
error ( ``CERTIFICATE_VERIFY_FAILED``), this is probably due to the fact
64+
that the request module CA bundle does not contain the CA of your server.
65+
66+
If you are using the request module of your distribution package, it is
67+
normally patched to use the system's default CA bundle
68+
(``/etc/ssl/certs/ca-certificates.crt`` from the ``ca-certificates``
69+
package on Debian systems and ``/etc/pki/tls/certs/ca-bundle.crt`` from the
70+
``ca-certificates``on RH systems). Check the packages documentation to add a
71+
new CA to those bundles.
72+
73+
If you are not installing request through the distribution packages (e.g.
74+
via pip), it uses its own vendorized CA bundle, located in the distribution
75+
directory (i.e. requests/cacert.pem). It should be enough to append the
76+
correct certificates to the end of the cacert.pem file. In a virtualenv,
77+
the bundle should be located at
78+
``$VIRTUAL_ENV/lib/python2.7/site-packages/requests/``
79+
5880

5981
``[ssm]`` section
6082
-----------------

0 commit comments

Comments
 (0)