-
Bug
-
Resolution: Unresolved
-
Normal
-
None
-
CNV I/U Operators Sprint 222
-
Medium
-
No
-
Red Hat OpenShift Virtualization
Description of problem:
----------------------
The certificate validity range does not conform to the values modified in the HCO CR (which are also propagated to CNAO CR).
Version-Release number of selected component (if applicable):
------------------------------------------------------------
4.9.0-249
How reproducible:
----------------
100%
Steps to Reproduce:
------------------
1. Modify the HCO CR spec.certconfig to:
{
"ca":
,
"server":
}
2. run the command:
$ oc get secrets -n openshift-cnv ssp-operator-service-cert -ojson | jq -r '.data["tls.crt"]' | base64 -d | openssl x509 -dates -noout
Actual results:
--------------
1. The notAfter is 2 years ahead of notBefore.
2. the notBefore is 1 day earlier from the current date.
Expected results:
----------------
1. The difference should have been 11 minutes.
2. notBefore should be today.
Additional info:
---------------
$ oc get hco kubevirt-hyperconverged -n openshift-cnv -ojson |jq -C '.spec.certConfig'
{
"ca":
,
"server":
}
$ oc get kubevirt kubevirt-kubevirt-hyperconverged -n openshift-cnv -ojson |jq -C '.spec.certificateRotateStrategy.selfSigned'
{
"ca":
,
"server":
}
$ oc get secrets -n openshift-cnv ssp-operator-service-cert -ojson | jq -r '.data["tls.crt"]' | base64 -d | openssl x509 -dates -noout
notBefore=Oct 25 10:10:02 2021 GMT
notAfter=Oct 24 10:10:02 2023 GMT
- is blocked by
-
OCPPLAN-9555 Platform Operators
- In Progress
- relates to
-
CNV-14625 [2017442] [certificate renewal] virt-template-validator-certs secret certificate is not updated according to HCO CR certconfig
- New
- external trackers