-
Notifications
You must be signed in to change notification settings - Fork 1.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add an automatically generated Ignition provisioning token #4372
Conversation
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
f084994
to
9ce9e2b
Compare
a5e1247
to
a73c780
Compare
Implements: openshift/enhancements#443 Requires: openshift/installer#4372 Basically we need to protect the Ignition config since it contains secrets (pull secret, kubeconfig) and we can't rely solely on network firewalling in all cases. The installer will generate a secret into both the pointer config and as a secret in our namespace, the MCS checks it.
Hmm...not sure what's up with that e2e-aws run. I can't find a must-gather or extracted cluster logs in the artifacts? |
fe01475
to
03782ab
Compare
Nevermind, should be fixed. |
Part of implementing: openshift/enhancements#443 The installer generates a random token (~password) and injects it into the Ignition pointer configuration and as a secret into the cluster. The MCO will check it.
03782ab
to
6ab9032
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm
/hold
on approval of the enhancement
/retest |
@cgwalters: The following tests failed, say
Full PR test history. Your PR dashboard. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here. |
@cgwalters: The following test failed, say
Full PR test history. Your PR dashboard. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here. |
Issues go stale after 90d of inactivity. Mark the issue as fresh by commenting If this issue is safe to close now please do so with /lifecycle stale |
/uncc |
Stale issues rot after 30d of inactivity. Mark the issue as fresh by commenting If this issue is safe to close now please do so with /lifecycle rotten |
Rotten issues close after 30d of inactivity. Reopen the issue by commenting /close |
@openshift-bot: Closed this PR. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Part of implementing: openshift/enhancements#443
The installer generates a random token (~password) and injects
it into the Ignition pointer configuration and as a secret into the
cluster.
The MCO will check it.