OCPBUGS-65885: added 1.34 required ELBv2 perms to CCM role#7339
OCPBUGS-65885: added 1.34 required ELBv2 perms to CCM role#7339openshift-merge-bot[bot] merged 2 commits intoopenshift:mainfrom
Conversation
|
Skipping CI for Draft Pull Request. |
|
Important Review skippedAuto reviews are limited based on label configuration. 🚫 Review skipped — only excluded labels are configured. (1)
Please check the settings in the CodeRabbit UI or the You can disable this status message by setting the WalkthroughAdds two ELBV2 delegation methods to the AWS client wrapper, excludes those APIs from ELB delegation configuration in the client generator, and adds corresponding IAM actions to the kubeControllerPolicy and docs. Changes
Estimated code review effort🎯 3 (Moderate) | ⏱️ ~20 minutes
Comment |
|
/test ? |
|
@mtulio: This pull request references Jira Issue OCPBUGS-65885, which is valid. The bug has been moved to the POST state. 3 validation(s) were run on this bug
No GitHub users were found matching the public email listed for the QA contact in Jira (jiezhao@redhat.com), skipping review request. The bug has been updated to refer to the pull request using the external bug tracker. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
|
@mtulio: The following commands are available to trigger required jobs: The following commands are available to trigger optional jobs: Use DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
|
/testwith openshift/origin/main/e2e-conformance openshift/origin/pull/30525 |
|
@mtulio, |
|
/test e2e-aws unit verify image security verify-deps e2e-aws |
|
/testwith openshift/origin/main/e2e-conformance openshift/origin#30525 |
|
@mtulio, |
|
/testwith openshift/hypershift/main/e2e-conformance openshift/origin#30525 |
PR rebased, will retry in following comment |
|
/testwith openshift/hypershift/main/e2e-conformance openshift/origin#30525 |
47242e5 to
63ee5d0
Compare
|
/testwith openshift/hypershift/main/e2e-conformance openshift/origin#30525 |
|
/test e2e-aws unit verify image security verify-deps e2e-aws |
|
/test verify |
|
/test unit verify-deps |
|
/test e2e-aws |
a92e9c2 to
668afd7
Compare
|
I found an very weird condition when appending inline policies when the role is the same (shared) : there is kind of race condition skipping the first entry (ingress policy for I realized the put is running in 70ms of difference, but the AWS API is eventually consistent. The approach taken in the last commit was to check if roles are the same and merge the conditionals/permissions, preserving the original name, otherwise it will create two inline policies when using ROSA managed Policies ( Re-testing the two tests that was failing caused by this condition: /test e2e-aws |
This fix[1] include updates in the policy cloud-controller used by KubeCloudControllerARN required by upstream CCM and exposed by OTE when enabled in the OCP payload, exercised in hypershift through job presubmit e2e-conformance (requires OTE binary[2]). There is also a hotfix on ROSA managed policy used on CI while managed policies is updated by AWS[3]. The policy ensure CCM AWS have enough permissions to deliver the feautre to HCP - already added in upstream[2]. [1] https://issues.redhat.com/browse/OCPBUGS-65885 [2] https://issues.redhat.com/browse/OCPSTRAT-2743 openshift/origin#30525 `https://github.com/kubernetes/cloud-provider-aws/pull/1214` [3] https://issues.redhat.com/browse/SREP-2895
Update documentation for AWS CCM permission changes described in https://issues.redhat.com/browse/OCPBUGS-65885.
|
Fixing |
|
/test e2e-aks |
|
Hi @bryan-cox and @csrwng , would you mind taking a look at this new approach to update the ROSA managed roles with inline policies? Thanks |
|
tests are now passing /hold cancel |
|
verified by @mtulio #7339 (comment) #7339 (comment) |
|
/verified by @mtulio #7339 (comment) #7339 (comment) |
|
@mtulio: This PR has been marked as verified by DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
|
/lgtm |
|
@mtulio: all tests passed! Full PR test history. Your PR dashboard. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
|
@mtulio: Jira Issue OCPBUGS-65885: All pull requests linked via external trackers have merged: Jira Issue OCPBUGS-65885 has been moved to the MODIFIED state. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
|
@mtulio: #7339 failed to apply on top of branch "release-4.21": DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
|
Fix included in accepted release 4.22.0-0.nightly-2026-01-22-122134 |
What this PR does / why we need it:
Added permission to IAM managed policy for control plane controllers affecting a specific case where it is required to reconcile the NLB target group with non-default attributes..
The new permissions was added after upstream PR
https://github.com/kubernetes/cloud-provider-aws/pull/1214.The ROSA managed policy is asked to update in https://issues.redhat.com/browse/SREP-2895
Jira Bug card Jira https://issues.redhat.com/browse/OCPBUGS-65885
Which issue(s) this PR fixes:
Fixes https://issues.redhat.com/browse/OCPBUGS-65885
Special notes for your reviewer:
Checklist: