-
Epic
-
Resolution: Done-Errata
-
Undefined
-
None
-
None
-
Support for FIPS compliant cert-manager operator
-
False
-
-
False
-
Not Selected
-
To Do
-
0% To Do, 40% In Progress, 60% Done
FIPS compliance is required by many customers to meet their regulatory needs.
Todo:
Review the internal guidance documents on FIPS compliance
Set the FIPS annotation in CSV to trigger FIPS compliance check: As per guidance, this would mean:
- Use the new check tool to scan images
- [*https://github.com/openshift/check-payload*]
- Checks CGO_ENABLED=1 , presence of openssl, strictfipsruntime tag, no_openssl tag, dynamic linking
- Include it in your CI workflows
- Run CI with fips enabled
- is related to
-
CM-242 Cert-manager Operator 1.14 release
- Closed
- links to
-
RHEA-2024:128547 cert-manager Operator for Red Hat OpenShift 1.14.0