Skip to content

Commit e6af1f4

Browse files
author
Bob Furu
authored
Merge pull request #32648 from miabbott/fips_x86
2 parents d10d15c + e00c1a8 commit e6af1f4

13 files changed

+100
-7
lines changed

installing/installing-fips.adoc

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ include::modules/common-attributes.adoc[]
55

66
toc::[]
77

8-
Starting with version 4.3, you can install an {product-title} cluster that uses FIPS Validated / Modules in Process cryptographic libraries.
8+
You can install an {product-title} cluster that uses FIPS Validated / Modules in Process cryptographic libraries on the `x86_64` architecture.
99

1010
For the {op-system-first} machines in your cluster, this change is applied when the machines are deployed based on the status of an option in the `install-config.yaml` file, which governs the cluster options that a user can change during cluster deployment. With {op-system-base-full} machines, you must enable FIPS mode when you install the operating system on the machines that you plan to use as worker machines. These configuration methods ensure that your cluster meet the requirements of a FIPS compliance audit: only FIPS Validated / Modules in Process cryptography packages are enabled before the initial system boot.
1111

@@ -37,6 +37,9 @@ Because FIPS must be enabled before the operating system that your cluster uses
3737
|Use of FIPS compatible golang compiler.
3838
|TLS FIPS support is not complete but is planned for future {product-title} releases.
3939

40+
|FIPS support across multiple architectures.
41+
|FIPS is currently only supported on {product-title} deployments using the `x86_64` architecture.
42+
4043
|===
4144

4245
[id="installation-about-fips-components_{context}"]

installing/installing-preparing.adoc

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -68,6 +68,12 @@ If you need to deploy your cluster to an xref:../installing/installing_aws/insta
6868

6969
ifndef::openshift-origin[]
7070
You can also configure the cluster machines to use xref:../installing/installing-fips.adoc#installing-fips[FIPS Validated / Modules in Process cryptographic libraries] during installation.
71+
72+
[IMPORTANT]
73+
====
74+
The use of FIPS Validated / Modules in Process cryptographic libraries is only supported on {product-title} deployments on the `x86_64` architecture.
75+
====
76+
7177
endif::[]
7278

7379
[id="installing-preparing-cluster-for-users"]

modules/installation-aws-config-yaml.adoc

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -242,6 +242,11 @@ host must trust the certificate.
242242
<10> The ID of your existing Route 53 private hosted zone. Providing an existing hosted zone requires that you supply your own VPC and the hosted zone is already associated with the VPC prior to installing your cluster. If undefined, the installation program creates a new hosted zone.
243243
ifndef::openshift-origin[]
244244
<11> Whether to enable or disable FIPS mode. By default, FIPS mode is not enabled. If FIPS mode is enabled, the {op-system-first} machines that {product-title} runs on bypass the default Kubernetes cryptography suite and use the cryptography modules that are provided with {op-system} instead.
245+
+
246+
[IMPORTANT]
247+
====
248+
The use of FIPS Validated / Modules in Process cryptographic libraries is only supported on {product-title} deployments on the `x86_64` architecture.
249+
====
245250
<12> You can optionally provide the `sshKey` value that you use to access the
246251
machines in your cluster.
247252
endif::openshift-origin[]
@@ -258,6 +263,11 @@ an unknown AWS region. The endpoint URL must use the `https` protocol and the
258263
host must trust the certificate.
259264
ifndef::openshift-origin[]
260265
<9> Whether to enable or disable FIPS mode. By default, FIPS mode is not enabled. If FIPS mode is enabled, the {op-system-first} machines that {product-title} runs on bypass the default Kubernetes cryptography suite and use the cryptography modules that are provided with {op-system} instead.
266+
+
267+
[IMPORTANT]
268+
====
269+
The use of FIPS Validated / Modules in Process cryptographic libraries is only supported on {product-title} deployments on the `x86_64` architecture.
270+
====
261271
<10> You can optionally provide the `sshKey` value that you use to access the
262272
machines in your cluster.
263273
endif::openshift-origin[]

modules/installation-azure-config-yaml.adoc

Lines changed: 22 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -101,10 +101,10 @@ endif::private,gov[]
101101
ifdef::private,gov[]
102102
outboundType: UserDefinedRouting <13>
103103
endif::private,gov[]
104-
ifndef::gov[]
104+
ifndef::gov[]
105105
cloudName: AzurePublicCloud
106106
endif::gov[]
107-
ifdef::gov[]
107+
ifdef::gov[]
108108
cloudName: AzureUSGovernmentCloud <14>
109109
endif::gov[]
110110
pullSecret: '{"auths": ...}' <1>
@@ -200,6 +200,11 @@ endif::gov[]
200200
ifdef::vnet[]
201201
ifndef::openshift-origin[]
202202
<13> Whether to enable or disable FIPS mode. By default, FIPS mode is not enabled. If FIPS mode is enabled, the {op-system-first} machines that {product-title} runs on bypass the default Kubernetes cryptography suite and use the cryptography modules that are provided with {op-system} instead.
203+
+
204+
[IMPORTANT]
205+
====
206+
The use of FIPS Validated / Modules in Process cryptographic libraries is only supported on {product-title} deployments on the `x86_64` architecture.
207+
====
203208
<14> You can optionally provide the `sshKey` value that you use to access the machines in your cluster.
204209
endif::openshift-origin[]
205210
ifdef::openshift-origin[]
@@ -209,6 +214,11 @@ endif::vnet[]
209214
ifdef::private[]
210215
ifndef::openshift-origin[]
211216
<14> Whether to enable or disable FIPS mode. By default, FIPS mode is not enabled. If FIPS mode is enabled, the {op-system-first} machines that {product-title} runs on bypass the default Kubernetes cryptography suite and use the cryptography modules that are provided with {op-system} instead.
217+
+
218+
[IMPORTANT]
219+
====
220+
The use of FIPS Validated / Modules in Process cryptographic libraries is only supported on {product-title} deployments on the `x86_64` architecture.
221+
====
212222
<15> You can optionally provide the `sshKey` value that you use to access the machines in your cluster.
213223
endif::openshift-origin[]
214224
ifdef::openshift-origin[]
@@ -218,6 +228,11 @@ endif::private[]
218228
ifdef::gov[]
219229
ifndef::openshift-origin[]
220230
<15> Whether to enable or disable FIPS mode. By default, FIPS mode is not enabled. If FIPS mode is enabled, the {op-system-first} machines that {product-title} runs on bypass the default Kubernetes cryptography suite and use the cryptography modules that are provided with {op-system} instead.
231+
+
232+
[IMPORTANT]
233+
====
234+
The use of FIPS Validated / Modules in Process cryptographic libraries is only supported on {product-title} deployments on the `x86_64` architecture.
235+
====
221236
<16> You can optionally provide the `sshKey` value that you use to access the machines in your cluster.
222237
endif::openshift-origin[]
223238
ifdef::openshift-origin[]
@@ -227,6 +242,11 @@ endif::gov[]
227242
ifndef::vnet,private,gov[]
228243
ifndef::openshift-origin[]
229244
<9> Whether to enable or disable FIPS mode. By default, FIPS mode is not enabled. If FIPS mode is enabled, the {op-system-first} machines that {product-title} runs on bypass the default Kubernetes cryptography suite and use the cryptography modules that are provided with {op-system} instead.
245+
+
246+
[IMPORTANT]
247+
====
248+
The use of FIPS Validated / Modules in Process cryptographic libraries is only supported on {product-title} deployments on the `x86_64` architecture.
249+
====
230250
<10> You can optionally provide the `sshKey` value that you use to access the machines in your cluster.
231251
endif::openshift-origin[]
232252
ifdef::openshift-origin[]

modules/installation-bare-metal-config-yaml.adoc

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -238,6 +238,11 @@ ifdef::ibm-power[IBM Power Systems infrastructure.]
238238
ifdef::rhv[RHV infrastructure.]
239239
ifndef::openshift-origin[]
240240
<11> Whether to enable or disable FIPS mode. By default, FIPS mode is not enabled. If FIPS mode is enabled, the {op-system-first} machines that {product-title} runs on bypass the default Kubernetes cryptography suite and use the cryptography modules that are provided with {op-system} instead.
241+
+
242+
[IMPORTANT]
243+
====
244+
The use of FIPS Validated / Modules in Process cryptographic libraries is only supported on {product-title} deployments on the `x86_64` architecture.
245+
====
241246
endif::openshift-origin[]
242247
ifndef::restricted[]
243248
<12> The pull secret that you obtained from the

modules/installation-configuration-parameters.adoc

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -272,6 +272,10 @@ Not all CCO modes are supported for all cloud providers. For more information on
272272
ifndef::openshift-origin[]
273273
|`fips`
274274
|Enable or disable FIPS mode. The default is `false` (disabled). If FIPS mode is enabled, the {op-system-first} machines that {product-title} runs on bypass the default Kubernetes cryptography suite and use the cryptography modules that are provided with {op-system} instead.
275+
[IMPORTANT]
276+
====
277+
The use of FIPS Validated / Modules in Process cryptographic libraries is only supported on {product-title} deployments on the `x86_64` architecture.
278+
====
275279
[NOTE]
276280
====
277281
If you are using Azure File storage, you cannot enable FIPS mode.

modules/installation-gcp-config-yaml.adoc

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -196,6 +196,11 @@ endif::restricted[]
196196
ifdef::vpc[]
197197
ifndef::openshift-origin[]
198198
<9> Whether to enable or disable FIPS mode. By default, FIPS mode is not enabled. If FIPS mode is enabled, the {op-system-first} machines that {product-title} runs on bypass the default Kubernetes cryptography suite and use the cryptography modules that are provided with {op-system} instead.
199+
+
200+
[IMPORTANT]
201+
====
202+
The use of FIPS Validated / Modules in Process cryptographic libraries is only supported on {product-title} deployments on the `x86_64` architecture.
203+
====
199204
<10> You can optionally provide the `sshKey` value that you use to access the machines in your cluster.
200205
endif::openshift-origin[]
201206
ifdef::openshift-origin[]
@@ -205,6 +210,11 @@ endif::vpc[]
205210
ifdef::restricted[]
206211
ifndef::openshift-origin[]
207212
<10> Whether to enable or disable FIPS mode. By default, FIPS mode is not enabled. If FIPS mode is enabled, the {op-system-first} machines that {product-title} runs on bypass the default Kubernetes cryptography suite and use the cryptography modules that are provided with {op-system} instead.
213+
+
214+
[IMPORTANT]
215+
====
216+
The use of FIPS Validated / Modules in Process cryptographic libraries is only supported on {product-title} deployments on the `x86_64` architecture.
217+
====
208218
<11> You can optionally provide the `sshKey` value that you use to access the machines in your cluster.
209219
endif::openshift-origin[]
210220
ifdef::openshift-origin[]
@@ -214,6 +224,11 @@ endif::restricted[]
214224
ifndef::vpc,restricted[]
215225
ifndef::openshift-origin[]
216226
<6> Whether to enable or disable FIPS mode. By default, FIPS mode is not enabled. If FIPS mode is enabled, the {op-system-first} machines that {product-title} runs on bypass the default Kubernetes cryptography suite and use the cryptography modules that are provided with {op-system} instead.
227+
+
228+
[IMPORTANT]
229+
====
230+
The use of FIPS Validated / Modules in Process cryptographic libraries is only supported on {product-title} deployments on the `x86_64` architecture.
231+
====
217232
<7> You can optionally provide the `sshKey` value that you use to access the machines in your cluster.
218233
endif::openshift-origin[]
219234
ifdef::openshift-origin[]

modules/installation-gcp-user-infra-shared-vpc-config-yaml.adoc

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,10 +76,15 @@ endif::openshift-origin[]
7676
====
7777
If you disable simultaneous multithreading, ensure that your capacity planning accounts for the dramatically decreased machine performance. Use larger machine types, such as `n1-standard-8`, for your machines if you disable simultaneous multithreading.
7878
====
79-
<5> Specify the main project where the VM instances reside.
79+
<5> Specify the main project where the VM instances reside.
8080
<6> Specify the region that your VPC network is in.
8181
ifndef::openshift-origin[]
8282
<7> Whether to enable or disable FIPS mode. By default, FIPS mode is not enabled. If FIPS mode is enabled, the {op-system-first} machines that {product-title} runs on bypass the default Kubernetes cryptography suite and use the cryptography modules that are provided with {op-system} instead.
83+
+
84+
[IMPORTANT]
85+
====
86+
The use of FIPS Validated / Modules in Process cryptographic libraries is only supported on {product-title} deployments on the `x86_64` architecture.
87+
====
8388
<8> You can optionally provide the `sshKey` value that you use to access the machines in your cluster.
8489
endif::openshift-origin[]
8590
ifdef::openshift-origin[]

modules/installation-vsphere-config-yaml.adoc

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -141,6 +141,11 @@ in vSphere.
141141
<12> Optional: For installer-provisioned infrastructure, the absolute path of an existing folder where the installation program creates the virtual machines, for example, `/<datacenter_name>/vm/<folder_name>/<subfolder_name>`. If you do not provide this value, the installation program creates a top-level folder in the datacenter virtual machine folder that is named with the infrastructure ID. If you are providing the infrastructure for the cluster, omit this parameter.
142142
ifndef::openshift-origin[]
143143
<13> Whether to enable or disable FIPS mode. By default, FIPS mode is not enabled. If FIPS mode is enabled, the {op-system-first} machines that {product-title} runs on bypass the default Kubernetes cryptography suite and use the cryptography modules that are provided with {op-system} instead.
144+
+
145+
[IMPORTANT]
146+
====
147+
The use of FIPS Validated / Modules in Process cryptographic libraries is only supported on {product-title} deployments on the `x86_64` architecture.
148+
====
144149
endif::openshift-origin[]
145150
ifndef::restricted[]
146151
ifndef::openshift-origin[]

modules/machine-config-overview.adoc

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -43,6 +43,11 @@ The kinds of components that MCO can change include:
4343
* **kernelType**: Optionally identify a non-standard kernel to use instead of the standard kernel. Use `realtime` to use the RT kernel (for RAN). This is only supported on select platforms.
4444
ifndef::openshift-origin[]
4545
* **fips**: Enable link:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html-single/security_hardening/index#using-the-system-wide-cryptographic-policies_security-hardening[FIPS] mode. FIPS should be set at installation-time setting and not a post-installation procedure.
46+
47+
[IMPORTANT]
48+
====
49+
The use of FIPS Validated / Modules in Process cryptographic libraries is only supported on {product-title} deployments on the `x86_64` architecture.
50+
====
4651
endif::openshift-origin[]
4752
* **extensions**: Extend {op-system} features by adding selected pre-packaged software. For this feature, available extensions include link:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html-single/security_hardening/index#protecting-systems-against-intrusive-usb-devices_security-hardening[usbguard] and kernel modules.
4853
* **Custom resources (for `ContainerRuntime` and `Kubelet`)**: Outside of machine configs, MCO manages two special custom resources for modifying CRI-O container runtime settings (`ContainerRuntime` CR) and the Kubelet service (`Kubelet` CR).

0 commit comments

Comments
 (0)