-
Notifications
You must be signed in to change notification settings - Fork 462
operator: remove the generated ssh key machineconfig #356
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
operator: remove the generated ssh key machineconfig #356
Conversation
/test e2e-aws-op |
|
/hold |
|
needs to be rebased as per our conversation on slack - we'll get this in to avoid a migration post release |
|
/hold cancel we're waiting on #548 as well before this anyway |
|
alrighty, this is good to be rebased reviewed and merged |
|
i do think #541 should go in before this |
|
#541 went it, @abhinavdahiya can you rebase this so we can review and merge? |
bbf9836 to
dcfc5af
Compare
@runcom PTAL |
dcfc5af to
76d1450
Compare
|
so nice to see this (cc @kikisdeliveryservice ) /approve @kikisdeliveryservice @cgwalters ptal for merging |
|
LGTM |
kikisdeliveryservice
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The documentation section is out of date and needs to be updated to reflect current output.
Also, I dont fully understand the flow. If a user makes a new sshkeys config, the 99-worker-ssh will be updated and a new rendered-worker-XXXXX config will be created? or will the 99-worker-ssh NOT be updated and just a new rendered worker config is generated?
I'd like this to be clear in the docs
AIUI it's more like "99-worker-ssh is created by the installer if a SSH key was provided to it" - after that it's user editable (including deletion). There's no "internal controller" for it like there are for the The user could create separately named SSH MCs too - the keys would then be unioned. |
docs/Update-SSHKeys.md
Outdated
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
does this sentence make sense anymore?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
updated
76d1450 to
146149b
Compare
The original feature of syncing the ssh key for authorized users from `cluster-config-v1` config map was added in [1]. The original assumption was that as `cluster-config-v1` was being deprecated in favor of global configs [2] and we will be able to find new home for the source of authorized keys for `core` user. Based on several discussions like [3], The better UX for users is that machineconfig with authorized keys is not owned by the controller and is rather pushed by the installer at install time. This allows users to edit the machineconfig directly to remove, add and manage the list of authorized keys. [1]: openshift@a46fcad [2]: openshift/installer#680 [3]: https://projects.engineering.redhat.com/browse/COREOS-1059
146149b to
a7a3bb0
Compare
|
It's time! 👍 /lgtm |
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: abhinavdahiya, kikisdeliveryservice, runcom The full list of commands accepted by this bot can be found here. The pull request process is described here DetailsNeeds approval from an approver in each of these files:
Approvers can indicate their approval by writing |
|
/hold |
|
openshift/installer#1150 merged |
|
/retest |
|
Hmm... haven't seen that before :/ /retest |
|
looks like this may have broken upgrades (investigating with QE) - might have a clue related to the "generated by controller version" and the check the MCO does on that field. |
The original feature of syncing the ssh key for authorized users from
cluster-config-v1config map was added in [1]. The original assumption wasthat as
cluster-config-v1was being deprecated in favor of global configs [2] and we will be able to find new home for the source of authorized keys forcoreuser.Based on several discussions like [3], The better UX for users is that machineconfig with authorized keys is not owned by the controller and is rather pushed by the installer at install time.
This allows users to edit the machineconfig directly to remove, add and manage the list of authorized keys.
This requires openshift/installer#1150
/cc @kikisdeliveryservice @crawford @cgwalters