-
Notifications
You must be signed in to change notification settings - Fork 47
[release-4.17] OCPBUGS-62974: Add withCABundleDaemonSetHook() to AWS EFS operator #449
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[release-4.17] OCPBUGS-62974: Add withCABundleDaemonSetHook() to AWS EFS operator #449
Conversation
The hook adds the custom CA bundle mount (non-standard-root-system-trust-ca-bundle). This CA bundle is critical for clusters running in the secure AWS regions (C2S/SC2S) because EFS requires these custom certificates to establish trust
@Phaow: This pull request references Jira Issue OCPBUGS-62974, which is invalid:
Comment The bug has been updated to refer to the pull request using the external bug tracker. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
/retest-required |
@Phaow: all tests passed! Full PR test history. Your PR dashboard. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
// withCABundleDaemonSetHook projects custom CA bundle ConfigMap into the CSI driver container | ||
func withCABundleDaemonSetHook(c *clients.Clients) (csidrivernodeservicecontroller.DaemonSetHookFunc, []factory.Informer) { | ||
hook := csidrivernodeservicecontroller.WithCABundleDaemonSetHook( | ||
c.ControlPlaneNamespace, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think it must be clients.CSIDriverNamespace
(similarly to what we have in aws-ebs withCABundleDaemonSetHook
).
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I also investigate to use clients.CSIDriverNamespace
, but for efs is a bit different, ebs csi driver operator is level2 operator managed by CSO, so it has no chance to install to another namespace(not the openshift-cluster-csi-dirvers), while efs csi driver operator is a 3rd operator, it could be installed in other namespaces(non openshift-
), so I think using the c.ControlPlaneNamespace
(the operator installed namespace) will be better than clients.CSIDriverNamespace
(const as openshift-cluster-csi-dirvers
), wdyt?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The replcaer replaces all ${NAMESPACE}
with controlPlaneNamespace
.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
OK, I agree, thank you for insights!
hook := csidrivernodeservicecontroller.WithCABundleDaemonSetHook( | ||
c.ControlPlaneNamespace, | ||
trustedCAConfigMap, | ||
c.GetConfigMapInformer(c.ControlPlaneNamespace), |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
same as above
c.GetConfigMapInformer(c.ControlPlaneNamespace), | ||
) | ||
informers := []factory.Informer{ | ||
c.GetConfigMapInformer(c.ControlPlaneNamespace).Informer(), |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
same as above
Thanks for a quick fix, @Phaow ! See please my inline comments about namespace. |
/jira refresh |
/lgtm |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: mpatlasov, Phaow The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
The CI looks good and the patch works as expected. I tried to launch a aws C2S cluster reproduce the origin issue to double checking but the cluster failed to mirror the images, will try again tomorrow. If it still failed, we could go ahead merge it trust the CI and RCA. |
/jira refresh |
@mpatlasov: This pull request references Jira Issue OCPBUGS-62974, which is valid. 7 validation(s) were run on this bug
Requesting review from QA contact: In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
@openshift-ci-robot: GitHub didn't allow me to request PR reviews from the following users: Phaow. Note that only openshift members and repo collaborators can review this PR, and authors cannot review their own PRs. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
/verified by CI. |
@Phaow: This PR has been marked as verified by In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
ffa8db8
into
openshift:release-4.17
@Phaow: Jira Issue Verification Checks: Jira Issue OCPBUGS-62974 Jira Issue OCPBUGS-62974 has been moved to the MODIFIED state and will move to the VERIFIED state when the change is available in an accepted nightly payload. 🕓 In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
This is an manual cherry-pick of #444 the automatic compile failed issue).
c.ControlPlaneNamespace
instead./assign @mpatlasov