Updated system_local_ca_cert` and `system_local_ca_key parameters
Updates for r9: https://review.opendev.org/c/starlingx/docs/+/923875 Change-Id: I587c01c04a0b504a9a61819ff15c869e05c25a88 Signed-off-by: Juanita Balaraj <juanita.balaraj@windriver.com>
This commit is contained in:
committed by
Juanita-Balaraj
parent
5bd242ac15
commit
1f6c03c451
@@ -24,7 +24,7 @@ commonly used in the |org| community and in this documentation.
|
||||
|
||||
In a configuration running OpenStack, a worker node:
|
||||
|
||||
- is labeled as 'compute'
|
||||
- is labeled as 'compute'
|
||||
- may be referred to as a compute node.
|
||||
- runs virtual switch for realizing virtual networks.
|
||||
- provides L3 routing and NET services.
|
||||
@@ -44,7 +44,7 @@ commonly used in the |org| community and in this documentation.
|
||||
functions either active/active or active/standby.
|
||||
|
||||
Data Network(s)
|
||||
Networks attached to pci-passthrough and/or sriov interfaces that are made
|
||||
Networks attached to pci-passthrough and/or sriov interfaces that are made
|
||||
available to hosted containers or hosted |VMs| for pci-passthrough and/or |SRIOV|
|
||||
interfaces.
|
||||
|
||||
@@ -62,6 +62,11 @@ commonly used in the |org| community and in this documentation.
|
||||
Tools that make the process of distributing, installing, and managing
|
||||
updates.
|
||||
|
||||
Elliptic Curve Digital Signature Algorithm (ECDSA)
|
||||
|
||||
ECDSA is an asymmetric key encryption algorithm that uses Elliptic curve
|
||||
cryptography to produce keys and sign data.
|
||||
|
||||
Edge Computing
|
||||
The delivery of computing capabilities to the logical extremes of a
|
||||
network in order to improve the performance, operating cost and
|
||||
@@ -185,7 +190,7 @@ commonly used in the |org| community and in this documentation.
|
||||
An instance of a node provided by software (a hypervisor), which runs
|
||||
within the host operating system and hardware.
|
||||
|
||||
Rollback
|
||||
Rollback
|
||||
The process of reverting changes made to a system or database to a
|
||||
previous state. For |prod|, *Rollback* is a capability that is supported
|
||||
during an upgrade or update.
|
||||
@@ -216,6 +221,6 @@ commonly used in the |org| community and in this documentation.
|
||||
the existing deployment in preparation for an upgrade.
|
||||
|
||||
Shared NIC
|
||||
A single physical port that can be shared by two or more system networks (oam, mgmt.,
|
||||
A single physical port that can be shared by two or more system networks (oam, mgmt.,
|
||||
cluster-host, pxeboot and data)
|
||||
For more information, see :ref:`sriov-port-sharing`.
|
||||
For more information, see :ref:`sriov-port-sharing`.
|
||||
|
||||
@@ -1,7 +1,6 @@
|
||||
.. Greg updates required for -High Security Vulnerability Document Updates
|
||||
.. Is this the target file that the rest of the updates need to point to??
|
||||
|
||||
|
||||
.. _migrate-platform-certificates-to-use-cert-manager-c0b1727e4e5d:
|
||||
|
||||
===========================================================================
|
||||
@@ -86,23 +85,86 @@ playbook are:
|
||||
# Sudo password
|
||||
ansible_become_pass: <sysadmin-passwd>
|
||||
|
||||
|
||||
The inventory parameters have the following meanings:
|
||||
|
||||
``system_local_ca_cert`` and ``system_local_ca_key``
|
||||
Both values being the single-line base64 encoding of the corresponding
|
||||
|
||||
Platform issuer (system-local-ca) public certificate and private key
|
||||
pair, both values being the single-line base64 encoding of the corresponding
|
||||
pem file; i.e. the output of :command:`base64 -w0 <pem-file>`.
|
||||
|
||||
It is highly recommended that you use an Intermediate |CA|
|
||||
``system-local-ca``, where the ``system-local-ca``'s certificate and
|
||||
key are generated and signed by an external trusted Root |CA|. Refer
|
||||
``system-local-ca``, where the ``system-local-ca``'s certificate is
|
||||
generated and signed by an external trusted Root |CA|. Refer
|
||||
to the documentation for the external trusted Root |CA| that you are
|
||||
using, on how to create a public certificate and private key pair, for
|
||||
use in an Intermediate |CA|.
|
||||
using, on how to create an Intermediate |CA| public certificate and
|
||||
private key pair.
|
||||
|
||||
The duration of the Intermediate CA public certificate and private key
|
||||
pair should be at least 3 years. See *rca_duration/ica_duration* to
|
||||
modify this semantic check.
|
||||
The 'system_local_ca_cert' override must provide either:
|
||||
|
||||
- A single certificate, directly signed by the Root |CA|; or
|
||||
|
||||
- A bundle of Intermediate |CA| certificates where every certificate is
|
||||
signed by the next one, starting with ``system-local-ca``'s public
|
||||
certificate and ending with the Intermediate |CA| certificate that is
|
||||
directly signed by the Root |CA| certificate. The Root |CA| should not
|
||||
be included in this bundle.
|
||||
|
||||
The ``system_local_ca_key`` override must provide only the private
|
||||
key for ``system-local-ca``. Only RSA and |ECDSA| keys are supported.
|
||||
|
||||
The duration of the Intermediate |CA| public certificate should be at
|
||||
least 3 years. See *ica_duration* to modify this semantic check.
|
||||
|
||||
.. warning::
|
||||
|
||||
The private key for ``system-local-ca`` should be handled carefully,
|
||||
avoiding any possibility of transference between the cluster and
|
||||
the external |CA|.
|
||||
|
||||
.. note::
|
||||
|
||||
It is recommended that the private key is generated locally and
|
||||
used to create a Certificate Signing Request (CSR). The |CSR| and
|
||||
its challenge password should be exchanged securely with the
|
||||
external |CA| to obtain the signed public certificate for the
|
||||
Intermediate |CA|, while the private key is never transferred.
|
||||
|
||||
Using OpenSSL, the private key and the |CSR| can be generated via
|
||||
the CLI using the following command:
|
||||
|
||||
.. code-block::
|
||||
|
||||
$ openssl req -newkey rsa:4096 -keyout private_key.key -out cert.csr
|
||||
|
||||
You will be prompted to fill the certificate subject fields and to
|
||||
provide a challenge password. Refer to your external |CA| to generate
|
||||
an Intermediate |CA| public certificate that matches this private key
|
||||
that can be used to issue the internal platform certificates. The
|
||||
certificate should have the following extensions:
|
||||
|
||||
.. code-block::
|
||||
|
||||
subjectKeyIdentifier = hash
|
||||
authorityKeyIdentifier = keyid:always,issuer
|
||||
basicConstraints = critical, CA:true
|
||||
keyUsage = critical, digitalSignature, cRLSign, keyCertSign
|
||||
|
||||
For example, if you are running a private |PKI|, you can generate
|
||||
the Intermediate |CA| certificate ``cert.pem`` from ``cert.csr``
|
||||
using the following extensions:
|
||||
|
||||
.. code-block::
|
||||
|
||||
cat <<eof> extensions.conf
|
||||
[v3_req]
|
||||
subjectKeyIdentifier = hash
|
||||
authorityKeyIdentifier = keyid:always,issuer
|
||||
basicConstraints = critical, CA:true
|
||||
keyUsage = critical, digitalSignature, cRLSign, keyCertSign
|
||||
eof
|
||||
|
||||
$ openssl x509 -req -CA <CA-certificate-path> -CAkey <CA-private-key> -days <expiration-days> -in cert.csr -out cert.pem -extensions v3_req -extfile extensions.conf
|
||||
|
||||
``system_root_ca_cert``
|
||||
The public certificate of the Root |CA| that signed
|
||||
@@ -167,7 +229,7 @@ playbook are:
|
||||
If a separate set of overrides are required for a group of hosts,
|
||||
``children`` groups can be added under ``target_group``.
|
||||
|
||||
.. include:: /shared/_includes/recommended-renewbefore-value-for-certificates-c929cf42b03b.rest
|
||||
.. include:: /shared/_includes/recommended-renewbefore-value-for-certificates-c929cf42b03b.rest
|
||||
|
||||
The following example illustrates using one set of ssh/sudo passwords for
|
||||
subcloud1 and subcloud2 and another set of ssh/sudo passwords for
|
||||
|
||||
@@ -38,6 +38,7 @@
|
||||
.. |CSIs| replace:: :abbr:`CSIs (Container Storage Interfaces)`
|
||||
.. |CSK| replace:: :abbr:`CSK (Code Signing Key)`
|
||||
.. |CSKs| replace:: :abbr:`CSKs (Code Signing Keys)`
|
||||
.. |CSR| replace:: :abbr:`CSR (Certificate Signing Request)`
|
||||
.. |CSV| replace:: :abbr:`CSV (Comma-Separated Values)`
|
||||
.. |CVE| replace:: :abbr:`CVE (Common Vulnerabilities and Exposures)`
|
||||
.. |CVSS| replace:: :abbr:`CVSS (Common Vulnerability Scoring System)`
|
||||
@@ -62,6 +63,7 @@
|
||||
.. |DVR| replace:: :abbr:`DVR (Distributed Virtual Router)`
|
||||
.. |DWQ| replace:: abbr:`DWQ (Dedicated Work Queue)`
|
||||
.. |EMS| replace:: :abbr:`EMS (Element Management System)`
|
||||
.. |ECDSA| replace:: :abbr:`ECDSA (Elliptic Curve Digital Signature Algorithm)`
|
||||
.. |ePRTC| replace:: :abbr:`ePRTC (Enhanced Primary Reference Time Clock)`
|
||||
.. |FEC| replace:: :abbr:`FEC (Forward Error Correction)`
|
||||
.. |FPGA| replace:: :abbr:`FPGA (Field Programmable Gate Array)`
|
||||
@@ -136,6 +138,7 @@
|
||||
.. |PHB| replace:: :abbr:`PHB (Per-Hop Behavior)`
|
||||
.. |PHC| replace:: :abbr:`PHC (PTP Hardware Clock)`
|
||||
.. |PHCs| replace:: :abbr:`PHCs (PTP Hardware Clocks)`
|
||||
.. |PKI| replace:: :abbr:`PKI (Public Key Infrastructure)`
|
||||
.. |PMC| replace:: :abbr:`PMC (PTP Management Client)`
|
||||
.. |PMD| replace:: :abbr:`PMD (Pole Mode Driver)`
|
||||
.. |PMU| replace:: :abbr:`PMU (Performance Monitor Unit)`
|
||||
|
||||
Reference in New Issue
Block a user