-
Feature
-
Resolution: Unresolved
-
Major
-
None
-
None
-
BU Product Work
-
False
-
-
False
-
50% To Do, 0% In Progress, 50% Done
-
6
-
0
Problem Statement
In line with OCPSTRAT-714, which overhauls the handling of OCP internal certs & keys, we need to ensure that the components deployed directly by the HyperShift operator, especially those which do not follow the usual operator approach, meet the new criteria.
TODO:
- Review all components directly deployed by the Hypershift operator, especially those like kas, etcd, kcm, konnectivity, etc. where we don't run the corresponding cluster operator.
- Ensure these components' certificate handling mechanisms are compliant with the criteria listed in OCPSTRAT-714.
- Implement changes if any discrepancies are found.
Additional Notes
This task focuses on the components unique to HyperShift and hosted control planes vs those deployed via the CPO (standard OpenShift components).
For CPO deployed components withing the HyperShift architecture, teams owning the OpenShift components that were refactored to match the HyperShift architecture, should keep updating their CI to ensure compliance with the cert rotation mechanisms.
- is related to
-
OCPSTRAT-693 Implement Rotation Procedure for Hypershift Cluster CAs/Certs/Keys
- Refinement
-
OCPSTRAT-714 Provide Detailed Administrative Control of all OCP Certs and Keys
- In Progress