-
Notifications
You must be signed in to change notification settings - Fork 1.5k
Bug 1769879: add AdditionalTrustBundles to master and worker shims #2639
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
|
@iamemilio: This pull request references Bugzilla bug 1769879, which is invalid:
Comment DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: iamemilio The full list of commands accepted by this bot can be found here. DetailsNeeds approval from an approver in each of these files:Approvers can indicate their approval by writing |
|
/test e2e-azure |
|
/test e2e-gcp |
|
/test e2e-metal |
1 similar comment
|
/test e2e-metal |
|
/test e2e-azure |
|
/test e2e-metal |
|
@iamemilio: The following test failed, say
Full PR test history. Your PR dashboard. Please help us cut down on flakes by linking to an open issue when you hit one in your PR. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here. |
|
Who manages this in-cluster as the configured CAs evolve and we continue to launch machines? |
|
Can we have the machine-config operator generate these instead? |
|
@wking I think the PR description is misleading here. According to the BZ the issue is with the Internally-deployed OpenStack clusters often run their API under an effectively self-signed cert (trusted inside the organisation but not publicly). In such cases, the CA needs to be added to the OpenStack VMs via Ignition or any OpenStack API request fails. These certificates are managed by the OpenStack administrators and they're outside of the OpenShift cert management. @iamemilio assuming what I wrote above is correct, will you please the PR description? Masters and workers should get their Ignition from the OpenShift cluster -- there should be no certificate issues there. It's about contacting the OpenStack APIs with cluster-api-provider-openstack. |
|
/bugzilla refresh |
|
@tomassedovic: This pull request references Bugzilla bug 1769879, which is valid. The bug has been moved to the POST state. The bug has been updated to refer to the pull request using the external bug tracker. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
The worker and master pointer configs fetch their configs from the ignition-server running in the cluster, and they don't need the additional trust bundle. |
|
/test e2e-azure |
The current change doesn't fix that. The additional trust bundle is already delivered to all the machines. The machine-controller is the one doesn't have the trust. Because the machine's trusted bundle is not used by pods unless they mount in that from host. |
|
/hold I might have misunderstood what the root problem David was reporting was. Hold until I dig into it further. |
|
Facing same error message. I tried to use internal endpoint (insecure) in clouds.yaml. However, the machine controller still tries the public endpoint:
This is lab in Newton with some modification to make the installer compatible so far. So you might ignore my case. |
|
Closing, this does not solve the root problem. Pod based services that interact with Open |
If a cluster uses self signed certificates, the master and worker nodes created by cluster-api will be unable to retrieve their ignition configs without trusting the CA. This fix adds user added CAs found in the AdditionalTrustBundle field to the master and worker ignition pointer configs (shims).