CNF-22624: RAN Hardening (5.0) - API Encryption (M10)#678
CNF-22624: RAN Hardening (5.0) - API Encryption (M10)#678sebrandon1 wants to merge 1 commit intoopenshift-kni:mainfrom
Conversation
|
@sebrandon1: This pull request references CNF-22624 which is a valid jira issue. Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the story to target the "4.22.0" version, but no target version was set. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
|
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: sebrandon1 The full list of commands accepted by this bot can be found here. DetailsNeeds approval from an approver in each of these files:Approvers can indicate their approval by writing |
8e7429d to
a346d39
Compare
|
Note Reviews pausedIt looks like this branch is under active development. To avoid overwhelming you with review comments due to an influx of new commits, CodeRabbit has automatically paused this review. You can configure this behavior by changing the Use the following commands to manage reviews:
Use the checkboxes below for quick actions:
📝 WalkthroughWalkthroughAdded an OpenShift Changes
Estimated code review effort🎯 1 (Trivial) | ⏱️ ~2 minutes 🚥 Pre-merge checks | ✅ 3✅ Passed checks (3 passed)
✏️ Tip: You can configure your own custom pre-merge checks in the settings. ✨ Finishing Touches🧪 Generate unit tests (beta)
Warning Review ran into problems🔥 ProblemsGit: Failed to clone repository. Please run the Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment |
There was a problem hiding this comment.
Actionable comments posted: 1
🤖 Prompt for all review comments with AI agents
Verify each finding against the current code and only fix it if needed.
Inline comments:
In `@telco-ran/configuration/crds/75-api-server-encryption.yaml`:
- Around line 6-7: The encryption configuration currently sets encryption.type
to "aescbc"; update the CRD so the encryption.type field uses "aesgcm" instead
of "aescbc" (i.e., change the value in the encryption block) to enable
authenticated AEAD encryption as recommended by OpenShift; ensure no other
dependent fields or defaults assume CBC-specific settings when you make this
replacement.
ℹ️ Review info
⚙️ Run configuration
Configuration used: Organization UI
Review profile: CHILL
Plan: Pro
Run ID: 02c77cff-3c3a-4c46-b751-36908549ac42
📒 Files selected for processing (1)
telco-ran/configuration/crds/75-api-server-encryption.yaml
|
/hold |
42733a5 to
c35d4b6
Compare
0e0ac6f to
2756555
Compare
|
@sebrandon1: This pull request references CNF-22624 which is a valid jira issue. Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the story to target the "5.0.0" version, but no target version was set. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
2756555 to
9ba42b7
Compare
Verification Test ResultsTested on cnfdt16 (OCP 4.22, RHCOS 9.8.20260403-0, 3 masters + 2 workers). Apply: Applied Result: PASS — API server encryption set to |
9ba42b7 to
aa426a0
Compare
Summary
encryption.type: aescbcconfirmedRemediation Group
Jira
Test plan
encryption.type: aescbcset