Skip to content

Commit 4601a63

Browse files
authored
Merge pull request #77098 from bergerhoffer/adding-fips-snippet
OSDOCS#10138: Adding FIPS snippet for easier reuse
2 parents 67365b6 + d4663ac commit 4601a63

17 files changed

+96
-85
lines changed

modules/agent-installer-fips-compliance.adoc

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,4 @@
1010
For many {product-title} customers, regulatory readiness, or compliance, on some level is required before any systems can be put into production. That regulatory readiness can be imposed by national standards, industry standards or the organization's corporate governance framework.
1111
Federal Information Processing Standards (FIPS) compliance is one of the most critical components required in highly secure environments to ensure that only supported cryptographic technologies are allowed on nodes.
1212

13-
[IMPORTANT]
14-
====
15-
To enable FIPS mode for your cluster, you must run the installation program from a {op-system-base-full} computer configured to operate in FIPS mode. For more information about configuring FIPS mode on RHEL, see link:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/security_hardening/assembly_installing-the-system-in-fips-mode_security-hardening[Installing the system in FIPS mode]. When running {op-system-base-full} or {op-system-first} booted in FIPS mode, {product-title} core components use the {op-system-base} cryptographic libraries that have been submitted to NIST for FIPS 140-2/140-3 Validation on only the x86_64, ppc64le, and s390x architectures.
16-
====
13+
include::snippets/fips-snippet.adoc[]

modules/installation-aws-config-yaml.adoc

Lines changed: 6 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -358,10 +358,9 @@ host must trust the certificate.
358358
ifndef::openshift-origin[]
359359
<13> Whether to enable or disable FIPS mode. By default, FIPS mode is not enabled. If FIPS mode is enabled, the {op-system-first} machines that {product-title} runs on bypass the default Kubernetes cryptography suite and use the cryptography modules that are provided with {op-system} instead.
360360
+
361-
[IMPORTANT]
362-
====
363-
To enable FIPS mode for your cluster, you must run the installation program from a {op-system-base-full} computer configured to operate in FIPS mode. For more information about configuring FIPS mode on RHEL, see link:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/security_hardening/assembly_installing-the-system-in-fips-mode_security-hardening[Installing the system in FIPS mode]. When running {op-system-base-full} or {op-system-first} booted in FIPS mode, {product-title} core components use the {op-system-base} cryptographic libraries that have been submitted to NIST for FIPS 140-2/140-3 Validation on only the x86_64, ppc64le, and s390x architectures.
364-
====
361+
--
362+
include::snippets/fips-snippet.adoc[]
363+
--
365364
<14> You can optionally provide the `sshKey` value that you use to access the machines in your cluster.
366365
endif::openshift-origin[]
367366
ifdef::openshift-origin[]
@@ -374,10 +373,9 @@ ifndef::vpc,restricted,aws-outposts[]
374373
ifndef::openshift-origin[]
375374
<11> Whether to enable or disable FIPS mode. By default, FIPS mode is not enabled. If FIPS mode is enabled, the {op-system-first} machines that {product-title} runs on bypass the default Kubernetes cryptography suite and use the cryptography modules that are provided with {op-system} instead.
376375
+
377-
[IMPORTANT]
378-
====
379-
To enable FIPS mode for your cluster, you must run the installation program from a {op-system-base-full} computer configured to operate in FIPS mode. For more information about configuring FIPS mode on RHEL, see link:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/security_hardening/assembly_installing-the-system-in-fips-mode_security-hardening[Installing the system in FIPS mode]. When running {op-system-base-full} or {op-system-first} booted in FIPS mode, {product-title} core components use the {op-system-base} cryptographic libraries that have been submitted to NIST for FIPS 140-2/140-3 Validation on only the x86_64, ppc64le, and s390x architectures.
380-
====
376+
--
377+
include::snippets/fips-snippet.adoc[]
378+
--
381379
<12> You can optionally provide the `sshKey` value that you use to access the machines in your cluster.
382380
endif::openshift-origin[]
383381
ifdef::openshift-origin[]

modules/installation-azure-config-yaml.adoc

Lines changed: 15 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -252,20 +252,18 @@ ifdef::restricted[]
252252
<15> When using Azure Firewall to restrict Internet access, you must configure outbound routing to send traffic through the Azure Firewall. Configuring user-defined routing prevents exposing external endpoints in your cluster.
253253
<16> Whether to enable or disable FIPS mode. By default, FIPS mode is not enabled. If FIPS mode is enabled, the {op-system-first} machines that {product-title} runs on bypass the default Kubernetes cryptography suite and use the cryptography modules that are provided with {op-system} instead.
254254
+
255-
[IMPORTANT]
256-
====
257-
To enable FIPS mode for your cluster, you must run the installation program from a {op-system-base-full} computer configured to operate in FIPS mode. For more information about configuring FIPS mode on RHEL, see link:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/security_hardening/assembly_installing-the-system-in-fips-mode_security-hardening[Installing the system in FIPS mode]. The use of FIPS validated or Modules In Process cryptographic libraries is only supported on {product-title} deployments on the `x86_64`, `ppc64le`, and `s390x` architectures.
258-
====
255+
--
256+
include::snippets/fips-snippet.adoc[]
257+
--
259258
<17> You can optionally provide the `sshKey` value that you use to access the machines in your cluster.
260259
endif::restricted[]
261260
ifdef::vnet[]
262261
ifndef::openshift-origin[]
263262
<15> Whether to enable or disable FIPS mode. By default, FIPS mode is not enabled. If FIPS mode is enabled, the {op-system-first} machines that {product-title} runs on bypass the default Kubernetes cryptography suite and use the cryptography modules that are provided with {op-system} instead.
264263
+
265-
[IMPORTANT]
266-
====
267-
To enable FIPS mode for your cluster, you must run the installation program from a {op-system-base-full} computer configured to operate in FIPS mode. For more information about configuring FIPS mode on RHEL, see link:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/security_hardening/assembly_installing-the-system-in-fips-mode_security-hardening[Installing the system in FIPS mode]. When running {op-system-base-full} or {op-system-first} booted in FIPS mode, {product-title} core components use the {op-system-base} cryptographic libraries that have been submitted to NIST for FIPS 140-2/140-3 Validation on only the x86_64, ppc64le, and s390x architectures.
268-
====
264+
--
265+
include::snippets/fips-snippet.adoc[]
266+
--
269267
<16> You can optionally provide the `sshKey` value that you use to access the machines in your cluster.
270268
endif::openshift-origin[]
271269
ifdef::openshift-origin[]
@@ -276,10 +274,9 @@ ifdef::private[]
276274
ifndef::openshift-origin[]
277275
<16> Whether to enable or disable FIPS mode. By default, FIPS mode is not enabled. If FIPS mode is enabled, the {op-system-first} machines that {product-title} runs on bypass the default Kubernetes cryptography suite and use the cryptography modules that are provided with {op-system} instead.
278276
+
279-
[IMPORTANT]
280-
====
281-
To enable FIPS mode for your cluster, you must run the installation program from a {op-system-base-full} computer configured to operate in FIPS mode. For more information about configuring FIPS mode on RHEL, see link:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/security_hardening/assembly_installing-the-system-in-fips-mode_security-hardening[Installing the system in FIPS mode]. When running {op-system-base-full} or {op-system-first} booted in FIPS mode, {product-title} core components use the {op-system-base} cryptographic libraries that have been submitted to NIST for FIPS 140-2/140-3 Validation on only the x86_64, ppc64le, and s390x architectures.
282-
====
277+
--
278+
include::snippets/fips-snippet.adoc[]
279+
--
283280
<17> You can optionally provide the `sshKey` value that you use to access the machines in your cluster.
284281
endif::openshift-origin[]
285282
ifdef::openshift-origin[]
@@ -290,10 +287,9 @@ ifdef::gov[]
290287
ifndef::openshift-origin[]
291288
<17> Whether to enable or disable FIPS mode. By default, FIPS mode is not enabled. If FIPS mode is enabled, the {op-system-first} machines that {product-title} runs on bypass the default Kubernetes cryptography suite and use the cryptography modules that are provided with {op-system} instead.
292289
+
293-
[IMPORTANT]
294-
====
295-
To enable FIPS mode for your cluster, you must run the installation program from a {op-system-base-full} computer configured to operate in FIPS mode. For more information about configuring FIPS mode on RHEL, see link:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/security_hardening/assembly_installing-the-system-in-fips-mode_security-hardening[Installing the system in FIPS mode]. When running {op-system-base-full} or {op-system-first} booted in FIPS mode, {product-title} core components use the {op-system-base} cryptographic libraries that have been submitted to NIST for FIPS 140-2/140-3 Validation on only the x86_64, ppc64le, and s390x architectures.
296-
====
290+
--
291+
include::snippets/fips-snippet.adoc[]
292+
--
297293
<18> You can optionally provide the `sshKey` value that you use to access the machines in your cluster.
298294
endif::openshift-origin[]
299295
ifdef::openshift-origin[]
@@ -304,10 +300,9 @@ ifndef::vnet,private,gov,restricted[]
304300
ifndef::openshift-origin[]
305301
<11> Whether to enable or disable FIPS mode. By default, FIPS mode is not enabled. If FIPS mode is enabled, the {op-system-first} machines that {product-title} runs on bypass the default Kubernetes cryptography suite and use the cryptography modules that are provided with {op-system} instead.
306302
+
307-
[IMPORTANT]
308-
====
309-
To enable FIPS mode for your cluster, you must run the installation program from a {op-system-base-full} computer configured to operate in FIPS mode. For more information about configuring FIPS mode on RHEL, see link:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/security_hardening/assembly_installing-the-system-in-fips-mode_security-hardening[Installing the system in FIPS mode]. When running {op-system-base-full} or {op-system-first} booted in FIPS mode, {product-title} core components use the {op-system-base} cryptographic libraries that have been submitted to NIST for FIPS 140-2/140-3 Validation on only the x86_64, ppc64le, and s390x architectures.
310-
====
303+
--
304+
include::snippets/fips-snippet.adoc[]
305+
--
311306
<12> You can optionally provide the `sshKey` value that you use to access the machines in your cluster.
312307
endif::openshift-origin[]
313308
ifdef::openshift-origin[]

modules/installation-azure-stack-hub-config-yaml.adoc

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -93,10 +93,9 @@ endif::openshift-origin[]
9393
ifndef::openshift-origin[]
9494
<11> Whether to enable or disable FIPS mode. By default, FIPS mode is not enabled. If FIPS mode is enabled, the {op-system-first} machines that {product-title} runs on bypass the default Kubernetes cryptography suite and use the cryptography modules that are provided with {op-system} instead.
9595
+
96-
[IMPORTANT]
97-
====
98-
To enable FIPS mode for your cluster, you must run the installation program from a {op-system-base-full} computer configured to operate in FIPS mode. For more information about configuring FIPS mode on RHEL, see link:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/security_hardening/assembly_installing-the-system-in-fips-mode_security-hardening[Installing the system in FIPS mode]. When running {op-system-base-full} or {op-system-first} booted in FIPS mode, {product-title} core components use the {op-system-base} cryptographic libraries that have been submitted to NIST for FIPS 140-2/140-3 Validation on only the x86_64, ppc64le, and s390x architectures.
99-
====
96+
--
97+
include::snippets/fips-snippet.adoc[]
98+
--
10099
<12> If your Azure Stack Hub environment uses an internal certificate authority (CA), add the necessary certificate bundle in `.pem` format.
101100
<13> You can optionally provide the `sshKey` value that you use to access the machines in your cluster.
102101
endif::openshift-origin[]

modules/installation-bare-metal-config-yaml.adoc

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -243,10 +243,10 @@ Clusters that are installed with the platform type `none` are unable to use some
243243
ifndef::openshift-origin[]
244244
<12> Whether to enable or disable FIPS mode. By default, FIPS mode is not enabled. If FIPS mode is enabled, the {op-system-first} machines that {product-title} runs on bypass the default Kubernetes cryptography suite and use the cryptography modules that are provided with {op-system} instead.
245245
+
246-
[IMPORTANT]
247-
====
248-
To enable FIPS mode for your cluster, you must run the installation program from a {op-system-base-full} computer configured to operate in FIPS mode. For more information about configuring FIPS mode on RHEL, see link:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/security_hardening/assembly_installing-the-system-in-fips-mode_security-hardening[Installing the system in FIPS mode]. When running {op-system-base-full} or {op-system-first} booted in FIPS mode, {product-title} core components use the {op-system-base} cryptographic libraries that have been submitted to NIST for FIPS 140-2/140-3 Validation on only the x86_64, ppc64le, and s390x architectures.
249-
====
246+
--
247+
include::snippets/fips-snippet.adoc[]
248+
--
249+
250250
endif::openshift-origin[]
251251
ifndef::restricted[]
252252
ifndef::openshift-origin[]

modules/installation-configuration-parameters.adoc

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -640,10 +640,9 @@ endif::agent[]
640640
ifndef::openshift-origin,ibm-power-vs[]
641641
|fips:
642642
|Enable or disable FIPS mode. The default is `false` (disabled). If FIPS mode is enabled, the {op-system-first} machines that {product-title} runs on bypass the default Kubernetes cryptography suite and use the cryptography modules that are provided with {op-system} instead.
643-
[IMPORTANT]
644-
====
645-
To enable FIPS mode for your cluster, you must run the installation program from a {op-system-base-full} computer configured to operate in FIPS mode. For more information about configuring FIPS mode on RHEL, see link:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/security_hardening/assembly_installing-the-system-in-fips-mode_security-hardening[Installing the system in FIPS mode]. When running {op-system-base-full} or {op-system-first} booted in FIPS mode, {product-title} core components use the {op-system-base} cryptographic libraries that have been submitted to NIST for FIPS 140-2/140-3 Validation on only the x86_64, ppc64le, and s390x architectures.
646-
====
643+
644+
include::snippets/fips-snippet.adoc[]
645+
647646
[NOTE]
648647
====
649648
If you are using Azure File storage, you cannot enable FIPS mode.

modules/installation-gcp-config-yaml.adoc

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -216,10 +216,9 @@ ifdef::vpc[]
216216
ifndef::openshift-origin[]
217217
<13> Whether to enable or disable FIPS mode. By default, FIPS mode is not enabled. If FIPS mode is enabled, the {op-system-first} machines that {product-title} runs on bypass the default Kubernetes cryptography suite and use the cryptography modules that are provided with {op-system} instead.
218218
+
219-
[IMPORTANT]
220-
====
221-
To enable FIPS mode for your cluster, you must run the installation program from a {op-system-base-full} computer configured to operate in FIPS mode. For more information about configuring FIPS mode on RHEL, see link:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/security_hardening/assembly_installing-the-system-in-fips-mode_security-hardening[Installing the system in FIPS mode]. When running {op-system-base-full} or {op-system-first} booted in FIPS mode, {product-title} core components use the {op-system-base} cryptographic libraries that have been submitted to NIST for FIPS 140-2/140-3 Validation on only the x86_64, ppc64le, and s390x architectures.
222-
====
219+
--
220+
include::snippets/fips-snippet.adoc[]
221+
--
223222
<14> You can optionally provide the `sshKey` value that you use to access the machines in your cluster.
224223
endif::openshift-origin[]
225224
ifdef::openshift-origin[]

modules/installation-gcp-user-infra-shared-vpc-config-yaml.adoc

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -88,10 +88,9 @@ If you disable simultaneous multithreading, ensure that your capacity planning a
8888
ifndef::openshift-origin[]
8989
<9> Whether to enable or disable FIPS mode. By default, FIPS mode is not enabled. If FIPS mode is enabled, the {op-system-first} machines that {product-title} runs on bypass the default Kubernetes cryptography suite and use the cryptography modules that are provided with {op-system} instead.
9090
+
91-
[IMPORTANT]
92-
====
93-
To enable FIPS mode for your cluster, you must run the installation program from a {op-system-base-full} computer configured to operate in FIPS mode. For more information about configuring FIPS mode on RHEL, see link:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/security_hardening/assembly_installing-the-system-in-fips-mode_security-hardening[Installing the system in FIPS mode]. When running {op-system-base-full} or {op-system-first} booted in FIPS mode, {product-title} core components use the {op-system-base} cryptographic libraries that have been submitted to NIST for FIPS 140-2/140-3 Validation on only the x86_64, ppc64le, and s390x architectures.
94-
====
91+
--
92+
include::snippets/fips-snippet.adoc[]
93+
--
9594
<10> You can optionally provide the `sshKey` value that you use to access the machines in your cluster.
9695
endif::openshift-origin[]
9796
ifdef::openshift-origin[]

modules/installation-ibm-cloud-config-yaml.adoc

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -93,10 +93,9 @@ If you disable simultaneous multithreading, ensure that your capacity planning a
9393
ifndef::openshift-origin[]
9494
<6> Enables or disables FIPS mode. By default, FIPS mode is not enabled. If FIPS mode is enabled, the {op-system-first} machines that {product-title} runs on bypass the default Kubernetes cryptography suite and use the cryptography modules that are provided with {op-system} instead.
9595
+
96-
[IMPORTANT]
97-
====
98-
To enable FIPS mode for your cluster, you must run the installation program from a {op-system-base-full} computer configured to operate in FIPS mode. For more information about configuring FIPS mode on RHEL, see link:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/security_hardening/assembly_installing-the-system-in-fips-mode_security-hardening[Installing the system in FIPS mode]. When running {op-system-base-full} or {op-system-first} booted in FIPS mode, {product-title} core components use the {op-system-base} cryptographic libraries that have been submitted to NIST for FIPS 140-2/140-3 Validation on only the x86_64, ppc64le, and s390x architectures.
99-
====
96+
--
97+
include::snippets/fips-snippet.adoc[]
98+
--
10099
<7> Optional: provide the `sshKey` value that you use to access the machines in your cluster.
101100
endif::openshift-origin[]
102101
ifdef::openshift-origin[]

modules/installation-vsphere-config-yaml.adoc

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -156,10 +156,9 @@ The Cloud Controller Manager Operator performs a connectivity check on a provide
156156
ifndef::openshift-origin[]
157157
<14> Whether to enable or disable FIPS mode. By default, FIPS mode is not enabled. If FIPS mode is enabled, the {op-system-first} machines that {product-title} runs on bypass the default Kubernetes cryptography suite and use the cryptography modules that are provided with {op-system} instead.
158158
+
159-
[IMPORTANT]
160-
====
161-
To enable FIPS mode for your cluster, you must run the installation program from a {op-system-base-full} computer configured to operate in FIPS mode. For more information about configuring FIPS mode on RHEL, see link:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/security_hardening/assembly_installing-the-system-in-fips-mode_security-hardening[Installing the system in FIPS mode]. When running {op-system-base-full} or {op-system-first} booted in FIPS mode, {product-title} core components use the {op-system-base} cryptographic libraries that have been submitted to NIST for FIPS 140-2/140-3 Validation on only the x86_64, ppc64le, and s390x architectures.
162-
====
159+
--
160+
include::snippets/fips-snippet.adoc[]
161+
--
163162
endif::openshift-origin[]
164163
ifndef::restricted[]
165164
ifndef::openshift-origin[]

0 commit comments

Comments
 (0)