config/sysinv
Rei Oliveira 01a5ea0843 First check Root CAs on kube-cert-rotation.sh
As of now, the script only verifies the validity of leaf certificates
and, if expired, will regenerate them based on K8s/etcd Root CAs.
It doesn't account for the possibility of Root CAs being expired.
It will generate leaf certificates based on Root CAs, even if said
Root CAs are expired.

This change fixes that behaviour by first checking validity of
Root CAs and only allowing leaf certificate renewal if RCAs are
valid.

Test plan:

PASS: Cause Root CAs to expire, run kube-cert-rotation.sh script
      and verify that it fails with an error saying Root CAs are
      expired and leaf certificates are not renewed.
PASS: Ensure to have valid Root CAs, cause leaf certificates
      to expire, run kube-cert-rotation.sh and verify that the
      script executes normally and is able to renew
      the leaf certificates.

Closes-Bug: 2059708

Signed-off-by: Rei Oliveira <Reinildes.JoseMateusOliveira@windriver.com>
Change-Id: I98dfd8d1417754f3c723d8ddd52a856785ffc83b
2024-03-28 14:28:34 -03:00
..
cert-alarm Update debian package versions to use git commits 2023-02-10 20:11:06 +00:00
cert-mon Update debian package versions to use git commits 2023-02-10 20:11:06 +00:00
cgts-client Persist iSCSI Initiator Name, NVMe hostid and hostnqn [1/2] 2024-02-08 15:20:38 -03:00
ipsec-auth Add log messages to IPSec Auth Server and Client 2024-02-02 14:58:03 -03:00
sysinv First check Root CAs on kube-cert-rotation.sh 2024-03-28 14:28:34 -03:00
sysinv-agent Update debian package versions to use git commits 2023-02-10 20:11:06 +00:00