-
Bug
-
Resolution: Done
-
Undefined
-
None
-
None
-
None
-
False
-
None
-
False
-
-
When a Cluster CA private key is replaced, the operator needs to follow through a series of three different rolling updates:
- First rolling update establishes the trust to the new CA while still using the old server certificates and trusting the old CA as well
- Second rolling update issues and rolls out the new server certificates signed by the new CA (while still trusting the old CA as well)
- Third rolling update removes the trust in the old CA
When the operator crashes between the first and second step or during the second step, it will not roll out the new server certificates signed by the new CA, but it will instead just silently bump the CA generation IDs in the secret annotations. That will cause the operands still use the old server certificates even after phase 2. That will work seemingly fine as we still trust the old CA. But in phase 3, we remove the trust in the old CA and thus break the operands.
Created by Strimzi#8401