Uploaded image for project: 'Machine Config Operator'
  1. Machine Config Operator
  2. MCO-1457

Clean up bootstrap MCS CA & TLS cert objects for management

XMLWordPrintable

    • Icon: Story Story
    • Resolution: Done
    • Icon: Normal Normal
    • None
    • None
    • None
    • 8
    • False
    • None
    • False
    • OCPSTRAT-1825 - TLS Registry contains required metadata
    • MCO Sprint 264
    • 0
    • 0.000

      The CA/cert generated by the installer is not currently managed and also does not preserve the signing key; so the cert controller we are adding in the MCO(leveraged from library-go), throws away everything and starts fresh. Normally this happens fairly quickly so both the MCS and the -user-data secrets are updated together. However, in certain cases(such as agent based installations) where a bootstrap node joins the cluster late, it will have the old CA from installer, and unfortunately the MCS will have a TLS cert signed by the new CA - resulting in invalid TLS cert errors.

      To account for such cases, we have to ensure the first CA embedded in any machine is matching the format expected by the cert controller. To do this, we'll have to do the following in the installer:

      • Have the bootstrap MCC generate the CA/TLS cert using the cert controller, and populate them into the right places(this card)
      • Make changes in the installer to remove the creation of the CA/cert, since the bootstrap MCC will now handle this(https://issues.redhat.com/browse/MCO-1458) 
      • Template out all root-ca artifacts in the format expected by the library-go cert controller. This would involve adding certain annotations on the artifacts(with respect to validity of the cert and some other ownership metadata)
      • The root CA signing key is currently discarded by the installer, so this will have to be a new template in the installer.

              djoshy David Joshy
              djoshy David Joshy
              Votes:
              0 Vote for this issue
              Watchers:
              5 Start watching this issue

                Created:
                Updated:
                Resolved: