Skip to content

Commit

Permalink
Merge pull request #1661 from p0lyn0mial/revert-1652
Browse files Browse the repository at this point in the history
NO-ISSUE: Revert "certrotationcontroller: set AutoRegenerateAfterOfflineExpiry for generated certificates
  • Loading branch information
openshift-merge-bot[bot] committed Apr 4, 2024
2 parents e6cba0a + 5823d3d commit 7ae9875
Showing 1 changed file with 25 additions and 50 deletions.
75 changes: 25 additions & 50 deletions pkg/operator/certrotationcontroller/certrotationcontroller.go
Original file line number Diff line number Diff line change
Expand Up @@ -134,8 +134,7 @@ func newCertRotationController(
Namespace: operatorclient.OperatorNamespace,
Name: "aggregator-client-signer",
AdditionalAnnotations: certrotation.AdditionalAnnotations{
JiraComponent: "kube-apiserver",
AutoRegenerateAfterOfflineExpiry: "https://github.com/openshift/cluster-kube-apiserver-operator/pull/1631,'operator conditions openshift-apiserver'",
JiraComponent: "kube-apiserver",
},
Validity: 30 * rotationDay,
Refresh: 15 * rotationDay,
Expand All @@ -149,8 +148,7 @@ func newCertRotationController(
Namespace: operatorclient.GlobalMachineSpecifiedConfigNamespace,
Name: "kube-apiserver-aggregator-client-ca",
AdditionalAnnotations: certrotation.AdditionalAnnotations{
JiraComponent: "kube-apiserver",
AutoRegenerateAfterOfflineExpiry: "https://github.com/openshift/cluster-kube-apiserver-operator/pull/1631,'operator conditions openshift-apiserver'",
JiraComponent: "kube-apiserver",
},
Informer: kubeInformersForNamespaces.InformersFor(operatorclient.GlobalMachineSpecifiedConfigNamespace).Core().V1().ConfigMaps(),
Lister: kubeInformersForNamespaces.InformersFor(operatorclient.GlobalMachineSpecifiedConfigNamespace).Core().V1().ConfigMaps().Lister(),
Expand All @@ -161,8 +159,7 @@ func newCertRotationController(
Namespace: operatorclient.TargetNamespace,
Name: "aggregator-client",
AdditionalAnnotations: certrotation.AdditionalAnnotations{
JiraComponent: "kube-apiserver",
AutoRegenerateAfterOfflineExpiry: "https://github.com/openshift/cluster-kube-apiserver-operator/pull/1631,'operator conditions openshift-apiserver'",
JiraComponent: "kube-apiserver",
},
Validity: 30 * rotationDay,
Refresh: 15 * rotationDay,
Expand All @@ -186,8 +183,7 @@ func newCertRotationController(
Namespace: operatorclient.OperatorNamespace,
Name: "kube-apiserver-to-kubelet-signer",
AdditionalAnnotations: certrotation.AdditionalAnnotations{
JiraComponent: "kube-apiserver",
AutoRegenerateAfterOfflineExpiry: "https://github.com/openshift/cluster-kube-apiserver-operator/pull/1631,'[sig-cli] Kubectl logs logs should be able to retrieve and filter logs [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]'",
JiraComponent: "kube-apiserver",
},
Validity: 1 * 365 * defaultRotationDay, // this comes from the installer
// Refresh set to 80% of the validity.
Expand All @@ -203,8 +199,7 @@ func newCertRotationController(
Namespace: operatorclient.OperatorNamespace,
Name: "kube-apiserver-to-kubelet-client-ca",
AdditionalAnnotations: certrotation.AdditionalAnnotations{
JiraComponent: "kube-apiserver",
AutoRegenerateAfterOfflineExpiry: "https://github.com/openshift/cluster-kube-apiserver-operator/pull/1631,'[sig-cli] Kubectl logs logs should be able to retrieve and filter logs [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]'",
JiraComponent: "kube-apiserver",
},
Informer: kubeInformersForNamespaces.InformersFor(operatorclient.OperatorNamespace).Core().V1().ConfigMaps(),
Lister: kubeInformersForNamespaces.InformersFor(operatorclient.OperatorNamespace).Core().V1().ConfigMaps().Lister(),
Expand All @@ -215,8 +210,7 @@ func newCertRotationController(
Namespace: operatorclient.TargetNamespace,
Name: "kubelet-client",
AdditionalAnnotations: certrotation.AdditionalAnnotations{
JiraComponent: "kube-apiserver",
AutoRegenerateAfterOfflineExpiry: "https://github.com/openshift/cluster-kube-apiserver-operator/pull/1631,'[sig-cli] Kubectl logs logs should be able to retrieve and filter logs [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]'",
JiraComponent: "kube-apiserver",
},
Validity: 30 * rotationDay,
Refresh: 15 * rotationDay,
Expand Down Expand Up @@ -269,8 +263,7 @@ func newCertRotationController(
Namespace: operatorclient.TargetNamespace,
Name: "localhost-serving-cert-certkey",
AdditionalAnnotations: certrotation.AdditionalAnnotations{
JiraComponent: "kube-apiserver",
AutoRegenerateAfterOfflineExpiry: "https://github.com/openshift/cluster-kube-apiserver-operator/pull/1631,'operator conditions kube-apiserver'",
JiraComponent: "kube-apiserver",
},
Validity: 30 * rotationDay,
Refresh: 15 * rotationDay,
Expand Down Expand Up @@ -323,8 +316,7 @@ func newCertRotationController(
Namespace: operatorclient.TargetNamespace,
Name: "service-network-serving-certkey",
AdditionalAnnotations: certrotation.AdditionalAnnotations{
JiraComponent: "kube-apiserver",
AutoRegenerateAfterOfflineExpiry: "https://github.com/openshift/cluster-kube-apiserver-operator/pull/1631,'operator conditions kube-apiserver'",
JiraComponent: "kube-apiserver",
},
Validity: 30 * rotationDay,
Refresh: 15 * rotationDay,
Expand Down Expand Up @@ -378,8 +370,7 @@ func newCertRotationController(
Namespace: operatorclient.TargetNamespace,
Name: "external-loadbalancer-serving-certkey",
AdditionalAnnotations: certrotation.AdditionalAnnotations{
JiraComponent: "kube-apiserver",
AutoRegenerateAfterOfflineExpiry: "https://github.com/openshift/cluster-kube-apiserver-operator/pull/1631,'operator conditions kube-apiserver'",
JiraComponent: "kube-apiserver",
},
Validity: 30 * rotationDay,
Refresh: 15 * rotationDay,
Expand Down Expand Up @@ -433,8 +424,7 @@ func newCertRotationController(
Namespace: operatorclient.TargetNamespace,
Name: "internal-loadbalancer-serving-certkey",
AdditionalAnnotations: certrotation.AdditionalAnnotations{
JiraComponent: "kube-apiserver",
AutoRegenerateAfterOfflineExpiry: "https://github.com/openshift/cluster-kube-apiserver-operator/pull/1631,'[bz-kube-apiserver] kube-apiserver should be accessible by clients using internal load balancer without iptables issues'",
JiraComponent: "kube-apiserver",
},
Validity: 30 * rotationDay,
Refresh: 15 * rotationDay,
Expand Down Expand Up @@ -514,8 +504,7 @@ func newCertRotationController(
Namespace: operatorclient.OperatorNamespace,
Name: "kube-control-plane-signer",
AdditionalAnnotations: certrotation.AdditionalAnnotations{
JiraComponent: "kube-apiserver",
AutoRegenerateAfterOfflineExpiry: "https://github.com/openshift/cluster-kube-apiserver-operator/pull/1631,'operator conditions kube-controller-manager'",
JiraComponent: "kube-apiserver",
},
Validity: 60 * defaultRotationDay,
Refresh: 30 * defaultRotationDay,
Expand All @@ -529,8 +518,7 @@ func newCertRotationController(
Namespace: operatorclient.OperatorNamespace,
Name: "kube-control-plane-signer-ca",
AdditionalAnnotations: certrotation.AdditionalAnnotations{
JiraComponent: "kube-apiserver",
AutoRegenerateAfterOfflineExpiry: "https://github.com/openshift/cluster-kube-apiserver-operator/pull/1631,'operator conditions kube-controller-manager'",
JiraComponent: "kube-apiserver",
},
Informer: kubeInformersForNamespaces.InformersFor(operatorclient.OperatorNamespace).Core().V1().ConfigMaps(),
Lister: kubeInformersForNamespaces.InformersFor(operatorclient.OperatorNamespace).Core().V1().ConfigMaps().Lister(),
Expand All @@ -541,8 +529,7 @@ func newCertRotationController(
Namespace: operatorclient.GlobalMachineSpecifiedConfigNamespace,
Name: "kube-controller-manager-client-cert-key",
AdditionalAnnotations: certrotation.AdditionalAnnotations{
JiraComponent: "kube-apiserver",
AutoRegenerateAfterOfflineExpiry: "https://github.com/openshift/cluster-kube-apiserver-operator/pull/1631,'operator conditions kube-controller-manager'",
JiraComponent: "kube-apiserver",
},
Validity: 30 * rotationDay,
Refresh: 15 * rotationDay,
Expand All @@ -566,8 +553,7 @@ func newCertRotationController(
Namespace: operatorclient.OperatorNamespace,
Name: "kube-control-plane-signer",
AdditionalAnnotations: certrotation.AdditionalAnnotations{
JiraComponent: "kube-apiserver",
AutoRegenerateAfterOfflineExpiry: "https://github.com/openshift/cluster-kube-apiserver-operator/pull/1631,'operator conditions kube-scheduler'",
JiraComponent: "kube-apiserver",
},
Validity: 60 * defaultRotationDay,
Refresh: 30 * defaultRotationDay,
Expand All @@ -581,8 +567,7 @@ func newCertRotationController(
Namespace: operatorclient.OperatorNamespace,
Name: "kube-control-plane-signer-ca",
AdditionalAnnotations: certrotation.AdditionalAnnotations{
JiraComponent: "kube-apiserver",
AutoRegenerateAfterOfflineExpiry: "https://github.com/openshift/cluster-kube-apiserver-operator/pull/1631,'operator conditions kube-scheduler'",
JiraComponent: "kube-apiserver",
},
Informer: kubeInformersForNamespaces.InformersFor(operatorclient.OperatorNamespace).Core().V1().ConfigMaps(),
Lister: kubeInformersForNamespaces.InformersFor(operatorclient.OperatorNamespace).Core().V1().ConfigMaps().Lister(),
Expand All @@ -593,8 +578,7 @@ func newCertRotationController(
Namespace: operatorclient.GlobalMachineSpecifiedConfigNamespace,
Name: "kube-scheduler-client-cert-key",
AdditionalAnnotations: certrotation.AdditionalAnnotations{
JiraComponent: "kube-apiserver",
AutoRegenerateAfterOfflineExpiry: "https://github.com/openshift/cluster-kube-apiserver-operator/pull/1631,'operator conditions kube-scheduler'",
JiraComponent: "kube-apiserver",
},
Validity: 30 * rotationDay,
Refresh: 15 * rotationDay,
Expand All @@ -618,8 +602,7 @@ func newCertRotationController(
Namespace: operatorclient.OperatorNamespace,
Name: "kube-control-plane-signer",
AdditionalAnnotations: certrotation.AdditionalAnnotations{
JiraComponent: "kube-apiserver",
AutoRegenerateAfterOfflineExpiry: "https://github.com/openshift/cluster-kube-apiserver-operator/pull/1631,'operator conditions kube-apiserver'",
JiraComponent: "kube-apiserver",
},
Validity: 60 * defaultRotationDay,
Refresh: 30 * defaultRotationDay,
Expand All @@ -633,8 +616,7 @@ func newCertRotationController(
Namespace: operatorclient.OperatorNamespace,
Name: "kube-control-plane-signer-ca",
AdditionalAnnotations: certrotation.AdditionalAnnotations{
JiraComponent: "kube-apiserver",
AutoRegenerateAfterOfflineExpiry: "https://github.com/openshift/cluster-kube-apiserver-operator/pull/1631,'operator conditions kube-apiserver'",
JiraComponent: "kube-apiserver",
},
Informer: kubeInformersForNamespaces.InformersFor(operatorclient.OperatorNamespace).Core().V1().ConfigMaps(),
Lister: kubeInformersForNamespaces.InformersFor(operatorclient.OperatorNamespace).Core().V1().ConfigMaps().Lister(),
Expand All @@ -645,8 +627,7 @@ func newCertRotationController(
Namespace: operatorclient.TargetNamespace,
Name: "control-plane-node-admin-client-cert-key",
AdditionalAnnotations: certrotation.AdditionalAnnotations{
JiraComponent: "kube-apiserver",
AutoRegenerateAfterOfflineExpiry: "https://github.com/openshift/cluster-kube-apiserver-operator/pull/1631,'operator conditions kube-apiserver'",
JiraComponent: "kube-apiserver",
},
Validity: 30 * rotationDay,
Refresh: 15 * rotationDay,
Expand All @@ -670,8 +651,7 @@ func newCertRotationController(
Namespace: operatorclient.OperatorNamespace,
Name: "kube-control-plane-signer",
AdditionalAnnotations: certrotation.AdditionalAnnotations{
JiraComponent: "kube-apiserver",
AutoRegenerateAfterOfflineExpiry: "https://github.com/openshift/cluster-kube-apiserver-operator/pull/1631,'operator conditions kube-apiserver'",
JiraComponent: "kube-apiserver",
},
Validity: 60 * defaultRotationDay,
Refresh: 30 * defaultRotationDay,
Expand All @@ -685,8 +665,7 @@ func newCertRotationController(
Namespace: operatorclient.OperatorNamespace,
Name: "kube-control-plane-signer-ca",
AdditionalAnnotations: certrotation.AdditionalAnnotations{
JiraComponent: "kube-apiserver",
AutoRegenerateAfterOfflineExpiry: "https://github.com/openshift/cluster-kube-apiserver-operator/pull/1631,'operator conditions kube-apiserver'",
JiraComponent: "kube-apiserver",
},
Informer: kubeInformersForNamespaces.InformersFor(operatorclient.OperatorNamespace).Core().V1().ConfigMaps(),
Lister: kubeInformersForNamespaces.InformersFor(operatorclient.OperatorNamespace).Core().V1().ConfigMaps().Lister(),
Expand All @@ -697,8 +676,7 @@ func newCertRotationController(
Namespace: operatorclient.TargetNamespace,
Name: "check-endpoints-client-cert-key",
AdditionalAnnotations: certrotation.AdditionalAnnotations{
JiraComponent: "kube-apiserver",
AutoRegenerateAfterOfflineExpiry: "https://github.com/openshift/cluster-kube-apiserver-operator/pull/1631,'operator conditions kube-apiserver'",
JiraComponent: "kube-apiserver",
},
Validity: 30 * rotationDay,
Refresh: 15 * rotationDay,
Expand All @@ -722,8 +700,7 @@ func newCertRotationController(
Namespace: operatorclient.OperatorNamespace,
Name: "node-system-admin-signer",
AdditionalAnnotations: certrotation.AdditionalAnnotations{
JiraComponent: "kube-apiserver",
AutoRegenerateAfterOfflineExpiry: "https://github.com/openshift/cluster-kube-apiserver-operator/pull/1631,'operator conditions kube-apiserver'",
JiraComponent: "kube-apiserver",
},
Validity: 1 * 365 * defaultRotationDay,
// Refresh set to 80% of the validity.
Expand All @@ -739,8 +716,7 @@ func newCertRotationController(
Namespace: operatorclient.OperatorNamespace,
Name: "node-system-admin-ca",
AdditionalAnnotations: certrotation.AdditionalAnnotations{
JiraComponent: "kube-apiserver",
AutoRegenerateAfterOfflineExpiry: "https://github.com/openshift/cluster-kube-apiserver-operator/pull/1631,'operator conditions kube-apiserver'",
JiraComponent: "kube-apiserver",
},
Informer: kubeInformersForNamespaces.InformersFor(operatorclient.OperatorNamespace).Core().V1().ConfigMaps(),
Lister: kubeInformersForNamespaces.InformersFor(operatorclient.OperatorNamespace).Core().V1().ConfigMaps().Lister(),
Expand All @@ -751,8 +727,7 @@ func newCertRotationController(
Namespace: operatorclient.OperatorNamespace,
Name: "node-system-admin-client",
AdditionalAnnotations: certrotation.AdditionalAnnotations{
JiraComponent: "kube-apiserver",
AutoRegenerateAfterOfflineExpiry: "https://github.com/openshift/cluster-kube-apiserver-operator/pull/1631,'operator conditions kube-apiserver'",
JiraComponent: "kube-apiserver",
},
// This needs to live longer then control plane certs so there is high chance that if a cluster breaks
// because of expired certs these are still valid to use for collecting data using localhost-recovery
Expand Down

0 comments on commit 7ae9875

Please sign in to comment.