Uploaded image for project: 'OpenShift Storage'
  1. OpenShift Storage
  2. STOR-1347

Support the standardized STS configuration flow via OLM and CCO for AWS EFS Operator

XMLWordPrintable

    • Standard STS config via CCO for OCP 4.14
    • 2
    • False
    • None
    • False
    • Green
    • To Do
    • OCPSTRAT-235 - STS enablement for critical OLM-managed operators
    • OCPSTRAT-235STS enablement for critical OLM-managed operators
    • 100
    • 100% 100%
    • If Release Note Needed, Set a Value

      Goals

      Establish a common and simplified configuration experience for the AWS EFS operator on STS-enabled clusters using the new, standardized configuration flow described in OCPBU-559. Users have a repeatable process to configure for the AWS EFS operator for STS with well-known inputs and behavior and can reuse the knowledge about that process with other operators.

      Non-Goals

      Support for any older version of OCP than 4.14.

      Motivation

      Today, the support for AWS STS authentication is well established in our core platform but fragmented at best among our layered products and OLM-managed operators. The configuration experience is also different between individual OLM-managed operators that support STS. OCPBU-4 aims to solve this for all cloud providers using the CloudCredentialOperator (CCO) and its CredentialRequest API.

      Based on this, customers get a repeatable and simple experience of installing and configuring for the AWS EFS operator, or any OLM-managed operator that supports it, for tokenized authentication with their cloud provider.

      TheAWS EFS operator has been identified as one of the first critical operators to support that flow to act on customer feedback from ROSA and OSD customers.

      Alternatives

      None.

      Acceptance Criteria

      • AWS EFS operator implements the standardized configuration flow for STS-enabled clusters using CCO and CredentialRequests described here: https://docs.google.com/document/d/1iFNpyycby_rOY1wUew-yl3uPWlE00krTgr9XHDZOTNo/edit#
      • AWS EFS operator gracefully falls back to regular operations when no role ARN is provided
      • AWS EFS operator degrades when the role ARN is provided but CCO does not reconcile the CredentialRequest (either due to a bug or due to running on an older than OCP 4.14 release)
      • AWS EFS operator documents what specific IAM permissions are needed when integrating with AWS using STS and provides easy to consume instructions to create those
      • AWS EFS operator supports this workflow and provides the documentation from 4.14 onwards

      Risk and Assumptions

      • Assumption: you don't currently have an existing way to integrate with STS
      • Risk: if the above assumption is wrong, you need to deprecate this configuration flow in favor of the flow defined in OCPBU-559

      Documentation Considerations

      • AWS EFS operator should rely on documentation the OLM portion of the OCP docs on how to carry out the configuration flow using either the OCP console or the CLI
      • AWS EFS operator in its own documentation section shall supply the required IAM credential instructions

      Open Questions

      Additional Notes

            rhn-engineering-jsafrane Jan Safranek
            DanielMesser Daniel Messer
            Rohit Patil Rohit Patil
            Votes:
            0 Vote for this issue
            Watchers:
            6 Start watching this issue

              Created:
              Updated:
              Resolved:

                Estimated:
                Original Estimate - 1 week, 2 days, 4 hours
                1w 2d 4h
                Remaining:
                0m
                Logged:
                Time Not Required
                Not Specified