Skip to content

Conversation

@fonta-rh
Copy link
Contributor

TLDR: Since we're now transitioning to stopping/starting hypervisor and clusters frequently, a cert expiration startup problem will be more and more common. This addition to the shutdown-cluster.sh script (and helpers) tries to alleviate the issue

OpenShift uses short-lived (24h) intermediate signing certificates that automatically rotate. Leaf certificates are capped by the remaining validity of their signer. If you shut down a cluster when signers are close to expiration, the leaf certs may have very short remaining validity, causing startup failures if the cluster is stopped for too long.

This change adds:

  • helpers/refresh-certificates.sh: Standalone script that forces regeneration of all API server signer certificates with fresh 24-hour validity
  • Integration with shutdown-cluster.sh to automatically refresh certs before shutting down cluster VMs

The helper script can also be run independently when needed.

🤖 Generated with Claude Code

OpenShift uses short-lived (24h) intermediate signing certificates that
automatically rotate. Leaf certificates are capped by the remaining validity
of their signer. If you shut down a cluster when signers are close to
expiration, the leaf certs may have very short remaining validity, causing
startup failures if the cluster is stopped for too long.

This change adds:
- helpers/refresh-certificates.sh: Standalone script that forces regeneration
  of all API server signer certificates with fresh 24-hour validity
- Integration with shutdown-cluster.sh to automatically refresh certs before
  shutting down cluster VMs

The helper script can also be run independently when needed.

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude <noreply@anthropic.com>
@openshift-ci openshift-ci bot requested review from jaypoulz and qJkee January 15, 2026 11:12
@openshift-ci
Copy link

openshift-ci bot commented Jan 15, 2026

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: fonta-rh

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci openshift-ci bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Jan 15, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

approved Indicates a PR has been approved by an approver from all required OWNERS files.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant