-
Notifications
You must be signed in to change notification settings - Fork 236
OCPBUGS-44842: certrotation: set not-before/not-after annotations #1889
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
OCPBUGS-44842: certrotation: set not-before/not-after annotations #1889
Conversation
This ensures every secret managed by this controller has valid annotation set. Instead of analyzing potentially sensitive secret on customer cluster we should be able to tell if the certificate rotation didn't happen and certificate expired by looking into annotations
@vrutkovs: This pull request references Jira Issue OCPBUGS-44842, which is invalid:
Comment The bug has been updated to refer to the pull request using the external bug tracker. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
4d0a3e9
to
ff84afa
Compare
ff84afa
to
91216c7
Compare
/jira refresh |
@vrutkovs: This pull request references Jira Issue OCPBUGS-44842, which is valid. The bug has been moved to the POST state. 3 validation(s) were run on this bug
Requesting review from QA contact: In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
/retest |
1 similar comment
/retest |
@vrutkovs: all tests passed! Full PR test history. Your PR dashboard. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
@vrutkovs: This pull request references Jira Issue OCPBUGS-44842, which is valid. 3 validation(s) were run on this bug
Requesting review from QA contact: In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
/cherrypick release-4.18 |
@vrutkovs: once the present PR merges, I will cherry-pick it on top of In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Technically, the wiring is fine, it makes sense to add NotBefore
and NotAfter
to EnsureTLSMetadataUpdate
.
But the consequence is,
- that we need to invoke it twice and
- usually set the
AdditionalAnnotations
hand it down and execute it, while we could easily just set it in the given Secret.
To leverage EnsureTLSMetadataUpdate
, we would need to split cert creation from injecting it into the Secret or create a more general EnsureSecretUpdate
function that expects a TLS cert and then updates the metadata at once.
Yes, its unfortunate but see below
It would require us to copy paste the code which does:
|
/lgtm |
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: Elbehery, vrutkovs The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Issues go stale after 90d of inactivity. Mark the issue as fresh by commenting If this issue is safe to close now please do so with /lifecycle stale |
/remove-lifecycle stale |
This ensures every secret managed by this controller has valid
not-before/not-after annotation set.
Instead of analyzing potentially sensitive secret
on customer cluster we should be able to tell if the certificate
rotation didn't happen and certificate expired by looking into
annotations.
Tested in openshift/cluster-kube-apiserver-operator#1768 and openshift/cluster-authentication-operator#742