-
Notifications
You must be signed in to change notification settings - Fork 462
OCPBUGS-17811: add certificate input to bootstrap mcs #3876
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
|
@cdoern: This pull request references Jira Issue OCPBUGS-17811, which is invalid:
Comment The bug has been updated to refer to the pull request using the external bug tracker. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
Skipping CI for Draft Pull Request. |
|
/jira refresh |
|
@cdoern: This pull request references Jira Issue OCPBUGS-17811, which is valid. The bug has been moved to the POST state. 3 validation(s) were run on this bug
Requesting review from QA contact: DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
/test all |
|
/retest-required |
|
/test all |
|
Verified using IPI on AWS
"[sig-mco] MCO scale Author:sregidor-NonHyperShiftHOST-NonPreRelease-Longduration-LongDuration-High-63894-Scaleup using 4.1 cloud image[Disruptive] [Serial]" We can add the qe-approved label. /label qe-approved |
245e877 to
889f068
Compare
|
@cdoern: This pull request references Jira Issue OCPBUGS-17811, which is valid. 3 validation(s) were run on this bug
Requesting review from QA contact: DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
/test unit |
yuqi-zhang
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Functionally seems fine, will let Hypershift team take a look
if someone needs image registry (or any) certificates, they can provide it via --bootstrap-certs key=value,key=value and they will be added as files in /etc/docker/certs.d to the ignition spec Signed-off-by: Charlie Doern <[email protected]>
fc646cf to
e6167b2
Compare
|
/lgtm This should be not doing anything outside of explicit usage so it should be safe to merge |
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: cdoern, yuqi-zhang The full list of commands accepted by this bot can be found here. The pull request process is described here DetailsNeeds approval from an approver in each of these files:
Approvers can indicate their approval by writing |
|
@cdoern: all tests passed! Full PR test history. Your PR dashboard. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here. |
|
@cdoern: Jira Issue OCPBUGS-17811: All pull requests linked via external trackers have merged: Jira Issue OCPBUGS-17811 has been moved to the MODIFIED state. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
Fix included in accepted release 4.15.0-0.nightly-2023-09-27-073353 |
if someone needs image registry (or any) certificates, they can provide it via --bootstrap-certs key=value,key=value and they will be added as files in /etc/docker/certs.d to the ignition spec.
This flag is not used in the bootstrap pod yaml as it is mainly intended for manual usage by components like hypershift. Components aiming to use this will need to wire up the key providing on their end.
The MCS will check for a cert (ex: image-registry=registry.crt) by checking the server's base dir for registry.crt. If the MCS finds registry.crt, we will read the cert, and place it into ignition at /etc/docker/certs.d/image-registry/ca.crt