Currently, MAAS power drivers (e.g., for UCSM) do not have an option to bypass TLS validation. This becomes problematic in scenarios where internal environments use self-signed certificates or incomplete certificate chains.
Proposed Feature:
Introduce a flag for “insecure TLS” in the power drivers. This option would allow users to bypass TLS validation when interacting with BMCs or other components that use self-signed or non-standard certificates.
I’d be happy to collaborate on testing if needed.