Skip to content

Conversation

@rrbadiani
Copy link
Member

Summary

This PR adds support for configuring FIPS mode level (140-2 or 140-3) and kernel-level FIPS enforcement.

Changes

  • Added fips_mode variable to configure FIPS 140-2 or FIPS 140-3 (defaults to fips-140-3 for CP 8.2+)
  • Added fips_kernel_level_enabled flag for kernel-level FIPS enforcement (defaults to false)
  • Added fips_reboot_timeout variable for reboot timeout configuration (defaults to 600 seconds)
  • Added validation for fips_mode values to ensure only valid values (fips-140-2, fips-140-3) are accepted
  • Implemented kernel-level FIPS setup with fips-mode-setup --enable command
  • Added automatic reboot and wait logic when kernel FIPS is enabled
  • Configured enable.fips.mode property for kafka_controller and kafka_broker

Testing

  • Verify FIPS mode configuration with valid values
  • Test kernel-level FIPS setup and reboot process
  • Validate that invalid fips_mode values are rejected

JIRA

https://confluentinc.atlassian.net/browse/ANSIENG-5777

…pport

- Add fips_mode variable to configure FIPS 140-2 or FIPS 140-3
- Add fips_kernel_level_enabled flag for kernel-level FIPS enforcement
- Add fips_reboot_timeout variable for reboot timeout configuration
- Add validation for fips_mode values (fips-140-2, fips-140-3)
- Implement kernel-level FIPS setup with fips-mode-setup command
- Add automatic reboot and wait logic when kernel FIPS is enabled
- Configure enable.fips.mode property for kafka_controller and kafka_broker
@rrbadiani rrbadiani requested a review from a team as a code owner December 18, 2025 13:03
rrbadiani and others added 5 commits December 18, 2025 21:02
…block

Remove kernel-level FIPS setup that required system reboot and fips-mode-setup --enable command. This simplifies FIPS configuration by only managing crypto policies without kernel-level enforcement.

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude <[email protected]>
Updates FIPS molecule test scenarios to use LDAPS (ldaps://ldap1:636) instead of plain LDAP (ldap://ldap1:389) for enhanced security. Configures custom SSL certificates for LDAP server and updates verification tests accordingly.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants