Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[release/v2.15] fix CA's not being properly mounted on CentOS #6680

Merged
merged 2 commits into from
Mar 10, 2021

Conversation

xrstf
Copy link
Contributor

@xrstf xrstf commented Mar 10, 2021

What this PR does / why we need it:
This is a temporary fix for 2.15 to allow customers to upgrade, as 2.16+ ships with the new CA handling (#6538).
The root cause is Fedora/CentOS storing their trust anchors as

[root@xrstf-ssl-mount-test certs]# pwd && ls -lah
/etc/ssl/certs
total 8.0K
drwxr-xr-x. 2 root root 4.0K Feb 14 05:41 .
drwxr-xr-x. 5 root root 4.0K Feb 14 05:41 ..
lrwxrwxrwx. 1 root root   49 Aug 12  2020 ca-bundle.crt -> /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem
lrwxrwxrwx. 1 root root   55 Aug 12  2020 ca-bundle.trust.crt -> /etc/pki/ca-trust/extracted/openssl/ca-bundle.trust.crt

Which issue(s) this PR fixes:
Fixes #6469

Does this PR introduce a user-facing change?:

Fix CA certificates not being mounted on Seed clusters using CentOS/Fedora.

@kubermatic-bot kubermatic-bot added release-note Denotes a PR that will be considered when it comes time to generate release notes. dco-signoff: yes Denotes that all commits in the pull request have the valid DCO signoff message. labels Mar 10, 2021
@xrstf xrstf changed the title fix CA's not being properly mounted on CentOS [release/v2.15] fix CA's not being properly mounted on CentOS Mar 10, 2021
@kubermatic-bot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: xrstf

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@kubermatic-bot kubermatic-bot added approved Indicates a PR has been approved by an approver from all required OWNERS files. size/S Denotes a PR that changes 10-29 lines, ignoring generated files. labels Mar 10, 2021
@kubermatic-bot kubermatic-bot added size/XL Denotes a PR that changes 500-999 lines, ignoring generated files. and removed size/S Denotes a PR that changes 10-29 lines, ignoring generated files. labels Mar 10, 2021
@kubermatic-bot kubermatic-bot added the lgtm Indicates that a PR is ready to be merged. label Mar 10, 2021
@kubermatic-bot
Copy link
Contributor

LGTM label has been added.

Git tree hash: 02074c3f7981e6cf0f4a82eda73644979e6f8f0d

@xrstf
Copy link
Contributor Author

xrstf commented Mar 10, 2021

/retest

1 similar comment
@xrstf
Copy link
Contributor Author

xrstf commented Mar 10, 2021

/retest

@kubermatic-bot kubermatic-bot merged commit 36a4072 into kubermatic:release/v2.15 Mar 10, 2021
@xrstf xrstf deleted the fix-ca-mounting branch April 11, 2021 09:50
@xmudrii
Copy link
Member

xmudrii commented May 18, 2021

/cherrypick release/v2.16

@kubermatic-bot
Copy link
Contributor

@xmudrii: new pull request created: #7056

In response to this:

/cherrypick release/v2.16

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. dco-signoff: yes Denotes that all commits in the pull request have the valid DCO signoff message. lgtm Indicates that a PR is ready to be merged. release-note Denotes a PR that will be considered when it comes time to generate release notes. size/XL Denotes a PR that changes 500-999 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

4 participants