add ability to use over https

Bug #975462 reported by Jamie Strandboge
28
This bug affects 5 people
Affects Status Importance Assigned to Milestone
MAAS
Fix Released
High
Unassigned
maas (Ubuntu)
Fix Released
High
Unassigned
Precise
Fix Released
High
Unassigned
Quantal
Fix Released
Undecided
Unassigned

Bug Description

This is a tracking bug for a dependency of the maas MIR (bug #961344).

Please add the capability of using https://<server>/MAAS for people who want to secure their MAAS deployment.

security vulnerability: no → yes
security vulnerability: yes → no
tags: added: rls-p-tracking
Changed in maas (Ubuntu Precise):
milestone: none → precise-updates
status: New → Triaged
Changed in maas (Ubuntu Precise):
importance: Undecided → High
Revision history for this message
Julian Edwards (julian-edwards) wrote :

This is a packaging issue - Apache handles all SSL not maas.

Changed in maas:
status: New → Invalid
Revision history for this message
Jamie Strandboge (jdstrand) wrote :

I would disagree-- see 'grep -r 'http://%s' ./*' in toplevel source (as an example). 'http://' is hardcoded in several places.

Revision history for this message
Julian Edwards (julian-edwards) wrote :

You're right, I had forgotten about those.

Changed in maas:
status: Invalid → Triaged
importance: Undecided → High
Changed in maas:
status: Triaged → Fix Released
status: Fix Released → Fix Committed
Changed in maas (Ubuntu Precise):
status: Triaged → Fix Released
Changed in maas:
status: Fix Committed → Fix Released
Revision history for this message
Andres Rodriguez (andreserl) wrote :

I'm marking this Fix Released and this seems to have been fixed upstream, hence, should be fixed in quantal

Changed in maas (Ubuntu Quantal):
status: Triaged → Fix Released
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Duplicates of this bug

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.