Skip to content

Conversation

@patrickdillon
Copy link
Contributor

@patrickdillon patrickdillon commented Sep 28, 2021

Adds CA for self-signed certs to the cloud provider config on Azure Stack Hub platform. Some environments, such as our internal dedicated Azure Stack environment, may use self-signed certs for the armEndpoint. This PR takes a bundle from installConfig.additionalTrustBundle and adds it to the cloud provider config with the key ca-bundle.pem.

$ head ash-ca-bundle/m/manifests/cloud-provider-config.yaml 
apiVersion: v1
data:
  ca-bundle.pem: |
    -----BEGIN CERTIFICATE-----
    MIIDgjCCAmqgAwIBAgIQdrn6bdq60qRPxujNuJEL0DANBgkqhkiG9w0BAQsFADBA
    MRUwEwYKCZImiZPyLGQBGRYFbG9jYWwxFjAUBgoJkiaJk/IsZAEZFgZ3d3RhdGMx
    DzANBgNVBAMTBkFUQy1DQTAeFw0xNTA5MDgxNTM2NThaFw0yNTA5MDgxNTQ2NTda
    MEAxFTATBgoJkiaJk/IsZAEZFgVsb2NhbDEWMBQGCgmSJomT8ixkARkWBnd3dGF0
    YzEPMA0GA1UEAxMGQVRDLUNBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC
    AQEAxyGyv2thsIXb5sn3FucF1NnCLMSMPGCpGr8i6QOoCi1Ct22ooFpofLgf05w0

I will create a BZ soon.

Adds CA for self-signed certs to the cloud provider
config on Azure Stack Hub platform.
@openshift-ci openshift-ci bot requested review from jstuever and rna-afk September 28, 2021 15:52
@staebler
Copy link
Contributor

@patrickdillon Since the e2e job for ASH is not working at the moment, can you show me with a local installation that the CA is making it into the configmap in the openshift-config and openshift-config-managed namespaces?

@patrickdillon
Copy link
Contributor Author

@patrickdillon Since the e2e job for ASH is not working at the moment, can you show me with a local installation that the CA is making it into the configmap in the openshift-config and openshift-config-managed namespaces?

Will do. I'm assuming the managed config is created after bootstrap, so I can't test it right now due to our main ASH environment being down. Will get on it ASAP

@patrickdillon
Copy link
Contributor Author

/test e2e-azurestack-upi

@patrickdillon
Copy link
Contributor Author

/test e2e-azurestack

@patrickdillon patrickdillon changed the title Azure Stack: add trust bundle to cloud config Bug 2010921: Azure Stack: add trust bundle to cloud config Oct 5, 2021
@openshift-ci openshift-ci bot added the bugzilla/severity-high Referenced Bugzilla bug's severity is high for the branch this PR is targeting. label Oct 5, 2021
@openshift-ci
Copy link
Contributor

openshift-ci bot commented Oct 5, 2021

@patrickdillon: This pull request references Bugzilla bug 2010921, which is valid. The bug has been moved to the POST state. The bug has been updated to refer to the pull request using the external bug tracker.

3 validation(s) were run on this bug
  • bug is open, matching expected state (open)
  • bug target release (4.10.0) matches configured target release for branch (4.10.0)
  • bug is in the state NEW, which is one of the valid states (NEW, ASSIGNED, ON_DEV, POST, POST)

No GitHub users were found matching the public email listed for the QA contact in Bugzilla (gpei@redhat.com), skipping review request.

Details

In response to this:

Bug 2010921: Azure Stack: add trust bundle to cloud config

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@openshift-ci openshift-ci bot added the bugzilla/valid-bug Indicates that a referenced Bugzilla bug is valid for the branch this PR is targeting. label Oct 5, 2021
@patrickdillon
Copy link
Contributor Author

/test e2e-azurestack-upi

1 similar comment
@patrickdillon
Copy link
Contributor Author

/test e2e-azurestack-upi

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Oct 12, 2021

@patrickdillon: The following tests failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
ci/prow/e2e-aws-workers-rhel7 22c02bb link false /test e2e-aws-workers-rhel7
ci/prow/e2e-aws-workers-rhel8 22c02bb link false /test e2e-aws-workers-rhel8
ci/prow/e2e-libvirt 22c02bb link false /test e2e-libvirt
ci/prow/e2e-aws-fips 22c02bb link false /test e2e-aws-fips
ci/prow/e2e-metal-ipi-ovn-ipv6 22c02bb link false /test e2e-metal-ipi-ovn-ipv6
ci/prow/e2e-crc 22c02bb link false /test e2e-crc
ci/prow/e2e-azurestack 22c02bb link false /test e2e-azurestack
ci/prow/e2e-azurestack-upi 22c02bb link false /test e2e-azurestack-upi

Full PR test history. Your PR dashboard.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here.

@patrickdillon
Copy link
Contributor Author

These changes are being carried through to the managed config:

$ oc describe cm kube-cloud-config -n openshift-config-managed | head
Name:         kube-cloud-config
Namespace:    openshift-config-managed
Labels:       <none>
Annotations:  <none>

Data
====
ca-bundle.pem:
----
-----BEGIN CERTIFICATE-----

and the installer-created config:

$ oc describe cm -n openshift-config cloud-provider-config | head
Name:         cloud-provider-config
Namespace:    openshift-config
Labels:       <none>
Annotations:  <none>

Data
====
ca-bundle.pem:
----
-----BEGIN CERTIFICATE-----

@staebler I think we are ready to merge this. I tested this in conjunction with openshift/cluster-cloud-controller-manager-operator#136 and was able to successfully run the CCMO

Copy link
Contributor

@staebler staebler left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/lgtm
/approve

@openshift-ci openshift-ci bot added the lgtm Indicates that a PR is ready to be merged. label Oct 20, 2021
@openshift-ci
Copy link
Contributor

openshift-ci bot commented Oct 20, 2021

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: staebler

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

1 similar comment
@openshift-ci
Copy link
Contributor

openshift-ci bot commented Oct 20, 2021

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: staebler

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci openshift-ci bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Oct 20, 2021
@openshift-bot
Copy link
Contributor

/retest-required

Please review the full test history for this PR and help us cut down flakes.

@openshift-merge-robot openshift-merge-robot merged commit 1a47710 into openshift:master Oct 20, 2021
@openshift-ci
Copy link
Contributor

openshift-ci bot commented Oct 20, 2021

@patrickdillon: All pull requests linked via external trackers have merged:

Bugzilla bug 2010921 has been moved to the MODIFIED state.

Details

In response to this:

Bug 2010921: Azure Stack: add trust bundle to cloud config

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@patrickdillon
Copy link
Contributor Author

/cherry-pick release-4.9

@openshift-cherrypick-robot

@patrickdillon: new pull request created: #5318

Details

In response to this:

/cherry-pick release-4.9

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@bottkars
Copy link
Contributor

bottkars commented Nov 4, 2021

@patrickdillon , for the initial bootstrap vm, you might consider changing the location information for the BOOTSTRAP_URL from https to http, e.g.
http://ocpcluster1sa.blob.local.azurestack.external/files/bootstrap.ign
that will work then for SelfSigned CA´s

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

approved Indicates a PR has been approved by an approver from all required OWNERS files. bugzilla/severity-high Referenced Bugzilla bug's severity is high for the branch this PR is targeting. bugzilla/valid-bug Indicates that a referenced Bugzilla bug is valid for the branch this PR is targeting. lgtm Indicates that a PR is ready to be merged.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

6 participants