-
Feature
-
Resolution: Won't Do
-
Normal
-
None
-
None
-
Product / Portfolio Work
-
None
-
0% To Do, 0% In Progress, 100% Done
-
False
-
-
False
-
None
-
8
-
None
-
None
-
None
-
-
None
-
None
-
None
-
None
Feature Overview (aka. Goal Summary)
Provide administrators with real-time visibility into certificate rotation operations by implementing comprehensive status feedback mechanisms that communicate rotation progress, success, failure states, and any issues that require attention during automated certificate lifecycle management.
Goals (aka. expected user outcomes)
Cluster administrators and platform engineers will have clear visibility into certificate rotation status through:
- Real-time feedback on rotation operation progress and completion status
- Clear indication of successful rotations vs. failed operations requiring intervention
- Detailed error reporting for failed rotations with actionable remediation guidance
- Historical tracking of rotation events for compliance and audit purposes
- Integration with existing monitoring and alerting systems to notify administrators of rotation issues
Requirements (aka. Acceptance Criteria):
Rotation Status Feedback (CNTRLPLANE-1492):
- HyperShift must expose status indicating sa-signing-key rotation progress
- Status should clearly indicate "ready" vs "in progress" states
- Clusters Service can monitor this status to safely remove old public keys
Anyone reviewing this Feature needs to know which deployment configurations that the Feature will apply to (or not) once it's been completed. Describe specific needs (or indicate N/A) for each of the following deployment scenarios. For specific configurations that are out-of-scope for a given release, ensure you provide the OCPSTRAT (for the future to be supported configuration) as well.
| Deployment considerations | List applicable specific needs (N/A = not applicable) |
| Self-managed, managed, or both | |
| Classic (standalone cluster) | |
| Hosted control planes | |
| Multi node, Compact (three node), or Single node (SNO), or all | |
| Connected / Restricted Network | |
| Architectures, e.g. x86_x64, ARM (aarch64), IBM Power (ppc64le), and IBM Z (s390x) | |
| Operator compatibility | |
| Backport needed (list applicable versions) | |
| UI need (e.g. OpenShift Console, dynamic plugin, OCM) | |
| Other (please specify) |
Use Cases (Optional):
Include use case diagrams, main success scenarios, alternative flow scenarios. Initial completion during Refinement status.
<your text here>
Questions to Answer (Optional):
Include a list of refinement / architectural questions that may need to be answered before coding can begin. Initial completion during Refinement status.
<your text here>
Out of Scope
High-level list of items that are out of scope. Initial completion during Refinement status.
<your text here>
Background
Provide any additional context is needed to frame the feature. Initial completion during Refinement status.
<your text here>
Customer Considerations
Provide any additional customer-specific considerations that must be made when designing and delivering the Feature. Initial completion during Refinement status.
<your text here>
Documentation Considerations
Provide information that needs to be considered and planned so that documentation will meet customer needs. If the feature extends existing functionality, provide a link to its current documentation. Initial completion during Refinement status.
<your text here>
Interoperability Considerations
Which other projects, including ROSA/OSD/ARO, and versions in our portfolio does this feature impact? What interoperability test scenarios should be factored by the layered products? Initial completion during Refinement status.
<your text here>
- is related to
-
OCPSTRAT-2533 HyperShift bound service account signing keypair rotation enhancements and token expiration enforcement for ARO-HCP clusters
-
- In Progress
-