Skip to content

Conversation

Phaow
Copy link
Contributor

@Phaow Phaow commented Oct 13, 2025

This is an manual cherry-pick of #444 the automatic compile failed issue).

/assign @mpatlasov

The hook adds the custom CA bundle mount (non-standard-root-system-trust-ca-bundle). This CA bundle is critical for clusters running in the secure AWS regions (C2S/SC2S) because EFS requires these custom certificates to establish trust
@openshift-ci-robot openshift-ci-robot added jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. jira/invalid-bug Indicates that a referenced Jira bug is invalid for the branch this PR is targeting. labels Oct 13, 2025
@openshift-ci-robot
Copy link

@Phaow: This pull request references Jira Issue OCPBUGS-62974, which is invalid:

  • expected dependent Jira Issue OCPBUGS-62926 to be in one of the following states: VERIFIED, RELEASE PENDING, CLOSED (ERRATA), CLOSED (CURRENT RELEASE), CLOSED (DONE), CLOSED (DONE-ERRATA), but it is ON_QA instead
  • expected dependent Jira Issue OCPBUGS-62926 to target a version in 4.18.0, 4.18.z, but it targets "4.19.z" instead

Comment /jira refresh to re-evaluate validity if changes to the Jira bug are made, or edit the title of this pull request to link to a different bug.

The bug has been updated to refer to the pull request using the external bug tracker.

In response to this:

This is an manual cherry-pick of #444 the automatic compile failed issue).

/assign @mpatlasov

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@Phaow
Copy link
Contributor Author

Phaow commented Oct 13, 2025

/retest-required

Copy link
Contributor

openshift-ci bot commented Oct 13, 2025

@Phaow: all tests passed!

Full PR test history. Your PR dashboard.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

// withCABundleDaemonSetHook projects custom CA bundle ConfigMap into the CSI driver container
func withCABundleDaemonSetHook(c *clients.Clients) (csidrivernodeservicecontroller.DaemonSetHookFunc, []factory.Informer) {
hook := csidrivernodeservicecontroller.WithCABundleDaemonSetHook(
c.ControlPlaneNamespace,
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think it must be clients.CSIDriverNamespace (similarly to what we have in aws-ebs withCABundleDaemonSetHook).

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I also investigate to use clients.CSIDriverNamespace, but for efs is a bit different, ebs csi driver operator is level2 operator managed by CSO, so it has no chance to install to another namespace(not the openshift-cluster-csi-dirvers), while efs csi driver operator is a 3rd operator, it could be installed in other namespaces(non openshift-), so I think using the c.ControlPlaneNamespace (the operator installed namespace) will be better than clients.CSIDriverNamespace (const as openshift-cluster-csi-dirvers), wdyt?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

OK, I agree, thank you for insights!

hook := csidrivernodeservicecontroller.WithCABundleDaemonSetHook(
c.ControlPlaneNamespace,
trustedCAConfigMap,
c.GetConfigMapInformer(c.ControlPlaneNamespace),
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

same as above

c.GetConfigMapInformer(c.ControlPlaneNamespace),
)
informers := []factory.Informer{
c.GetConfigMapInformer(c.ControlPlaneNamespace).Informer(),
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

same as above

@mpatlasov
Copy link
Contributor

Thanks for a quick fix, @Phaow ! See please my inline comments about namespace.

@mpatlasov
Copy link
Contributor

/jira refresh

@mpatlasov
Copy link
Contributor

/lgtm
/approve
/label backport-risk-assessed

@openshift-ci openshift-ci bot added the backport-risk-assessed Indicates a PR to a release branch has been evaluated and considered safe to accept. label Oct 15, 2025
@openshift-ci openshift-ci bot added the lgtm Indicates that a PR is ready to be merged. label Oct 15, 2025
Copy link
Contributor

openshift-ci bot commented Oct 15, 2025

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: mpatlasov, Phaow

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci openshift-ci bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Oct 15, 2025
@Phaow
Copy link
Contributor Author

Phaow commented Oct 15, 2025

The CI looks good and the patch works as expected. I tried to launch a aws C2S cluster reproduce the origin issue to double checking but the cluster failed to mirror the images, will try again tomorrow. If it still failed, we could go ahead merge it trust the CI and RCA.

@mpatlasov
Copy link
Contributor

/jira refresh

@openshift-ci-robot openshift-ci-robot added jira/valid-bug Indicates that a referenced Jira bug is valid for the branch this PR is targeting. and removed jira/invalid-bug Indicates that a referenced Jira bug is invalid for the branch this PR is targeting. labels Oct 15, 2025
@openshift-ci-robot
Copy link

@mpatlasov: This pull request references Jira Issue OCPBUGS-62974, which is valid.

7 validation(s) were run on this bug
  • bug is open, matching expected state (open)
  • bug target version (4.17.z) matches configured target version for branch (4.17.z)
  • bug is in the state POST, which is one of the valid states (NEW, ASSIGNED, POST)
  • release note text is set and does not match the template
  • dependent bug Jira Issue OCPBUGS-62973 is in the state Verified, which is one of the valid states (VERIFIED, RELEASE PENDING, CLOSED (ERRATA), CLOSED (CURRENT RELEASE), CLOSED (DONE), CLOSED (DONE-ERRATA))
  • dependent Jira Issue OCPBUGS-62973 targets the "4.18.z" version, which is one of the valid target versions: 4.18.0, 4.18.z
  • bug has dependents

Requesting review from QA contact:
/cc @Phaow

In response to this:

/jira refresh

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

Copy link
Contributor

openshift-ci bot commented Oct 15, 2025

@openshift-ci-robot: GitHub didn't allow me to request PR reviews from the following users: Phaow.

Note that only openshift members and repo collaborators can review this PR, and authors cannot review their own PRs.

In response to this:

@mpatlasov: This pull request references Jira Issue OCPBUGS-62974, which is valid.

7 validation(s) were run on this bug
  • bug is open, matching expected state (open)
  • bug target version (4.17.z) matches configured target version for branch (4.17.z)
  • bug is in the state POST, which is one of the valid states (NEW, ASSIGNED, POST)
  • release note text is set and does not match the template
  • dependent bug Jira Issue OCPBUGS-62973 is in the state Verified, which is one of the valid states (VERIFIED, RELEASE PENDING, CLOSED (ERRATA), CLOSED (CURRENT RELEASE), CLOSED (DONE), CLOSED (DONE-ERRATA))
  • dependent Jira Issue OCPBUGS-62973 targets the "4.18.z" version, which is one of the valid target versions: 4.18.0, 4.18.z
  • bug has dependents

Requesting review from QA contact:
/cc @Phaow

In response to this:

/jira refresh

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@Phaow
Copy link
Contributor Author

Phaow commented Oct 16, 2025

/verified by CI.
I could see the withCABundleDaemonSetHook hook works that the driver node daemonset pods mount the ca bundle comfigmap as expected. Without the patch the driver node missed the ca-bundle cm -> https://gcsweb-qe-private-deck-ci.apps.ci.l2s4.p1.openshiftapps.com/gcs/qe-private-deck/logs/periodic-ci-openshift-openshift-tests-private-release-4.17-multi-nightly-aws-ipi-byo-iam-role-efs-arm-f14-custom-cert/1977578340537602048/artifacts/aws-ipi-byo-iam-role-efs-arm-f14-custom-cert/gather-extra/artifacts/inspect/namespaces/openshift-cluster-csi-drivers/pods/aws-efs-csi-driver-node-4ctws/aws-efs-csi-driver-node-4ctws.yaml . Though install the C2S cluster still failed at mirror operator images, we could go ahead merge it trust the CI and RCA.

@openshift-ci-robot openshift-ci-robot added the verified Signifies that the PR passed pre-merge verification criteria label Oct 16, 2025
@openshift-ci-robot
Copy link

@Phaow: This PR has been marked as verified by CI..

In response to this:

/verified by CI.
I could see the withCABundleDaemonSetHook hook works that the driver node daemonset pods mount the ca bundle comfigmap as expected. Without the patch the driver node missed the ca-bundle cm -> https://gcsweb-qe-private-deck-ci.apps.ci.l2s4.p1.openshiftapps.com/gcs/qe-private-deck/logs/periodic-ci-openshift-openshift-tests-private-release-4.17-multi-nightly-aws-ipi-byo-iam-role-efs-arm-f14-custom-cert/1977578340537602048/artifacts/aws-ipi-byo-iam-role-efs-arm-f14-custom-cert/gather-extra/artifacts/inspect/namespaces/openshift-cluster-csi-drivers/pods/aws-efs-csi-driver-node-4ctws/aws-efs-csi-driver-node-4ctws.yaml . Though install the C2S cluster still failed at mirror operator images, we could go ahead merge it trust the CI and RCA.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@openshift-merge-bot openshift-merge-bot bot merged commit ffa8db8 into openshift:release-4.17 Oct 16, 2025
18 checks passed
@openshift-ci-robot
Copy link

@Phaow: Jira Issue Verification Checks: Jira Issue OCPBUGS-62974
✔️ This pull request was pre-merge verified.
✔️ All associated pull requests have merged.
✔️ All associated, merged pull requests were pre-merge verified.

Jira Issue OCPBUGS-62974 has been moved to the MODIFIED state and will move to the VERIFIED state when the change is available in an accepted nightly payload. 🕓

In response to this:

This is an manual cherry-pick of #444 the automatic compile failed issue).

/assign @mpatlasov

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

approved Indicates a PR has been approved by an approver from all required OWNERS files. backport-risk-assessed Indicates a PR to a release branch has been evaluated and considered safe to accept. jira/valid-bug Indicates that a referenced Jira bug is valid for the branch this PR is targeting. jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. lgtm Indicates that a PR is ready to be merged. verified Signifies that the PR passed pre-merge verification criteria

Projects

None yet

Development

Successfully merging this pull request may close these issues.

6 participants