OCPBUGS-17811: add certificate input to bootstrap mcs#3876
OCPBUGS-17811: add certificate input to bootstrap mcs#3876openshift-merge-robot merged 1 commit intoopenshift:masterfrom
Conversation
|
@cdoern: This pull request references Jira Issue OCPBUGS-17811, which is invalid:
Comment The bug has been updated to refer to the pull request using the external bug tracker. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
Skipping CI for Draft Pull Request. |
|
/jira refresh |
|
@cdoern: This pull request references Jira Issue OCPBUGS-17811, which is valid. The bug has been moved to the POST state. 3 validation(s) were run on this bug
Requesting review from QA contact: DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
/test all |
|
/retest-required |
|
/test all |
|
Verified using IPI on AWS
"[sig-mco] MCO scale Author:sregidor-NonHyperShiftHOST-NonPreRelease-Longduration-LongDuration-High-63894-Scaleup using 4.1 cloud image[Disruptive] [Serial]" We can add the qe-approved label. /label qe-approved |
245e877 to
889f068
Compare
|
@cdoern: This pull request references Jira Issue OCPBUGS-17811, which is valid. 3 validation(s) were run on this bug
Requesting review from QA contact: DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
/test unit |
yuqi-zhang
left a comment
There was a problem hiding this comment.
Functionally seems fine, will let Hypershift team take a look
if someone needs image registry (or any) certificates, they can provide it via --bootstrap-certs key=value,key=value and they will be added as files in /etc/docker/certs.d to the ignition spec Signed-off-by: Charlie Doern <cdoern@redhat.com>
fc646cf to
e6167b2
Compare
|
/lgtm This should be not doing anything outside of explicit usage so it should be safe to merge |
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: cdoern, yuqi-zhang The full list of commands accepted by this bot can be found here. The pull request process is described here DetailsNeeds approval from an approver in each of these files:
Approvers can indicate their approval by writing |
|
@cdoern: all tests passed! Full PR test history. Your PR dashboard. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here. |
|
@cdoern: Jira Issue OCPBUGS-17811: All pull requests linked via external trackers have merged: Jira Issue OCPBUGS-17811 has been moved to the MODIFIED state. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
Fix included in accepted release 4.15.0-0.nightly-2023-09-27-073353 |
if someone needs image registry (or any) certificates, they can provide it via --bootstrap-certs key=value,key=value and they will be added as files in /etc/docker/certs.d to the ignition spec.
This flag is not used in the bootstrap pod yaml as it is mainly intended for manual usage by components like hypershift. Components aiming to use this will need to wire up the key providing on their end.
The MCS will check for a cert (ex: image-registry=registry.crt) by checking the server's base dir for registry.crt. If the MCS finds registry.crt, we will read the cert, and place it into ignition at /etc/docker/certs.d/image-registry/ca.crt