Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bug 1963730: moves the cert directory under the target directory #1098

Conversation

p0lyn0mial
Copy link
Contributor

The target directory holds all files for the current static pod manifest.

As of today, kube-apiserver-certs is accessed by at least two processes, namely the installer pod and the cert-syncer.
Up until now, there was no coordination between these processes that might have lead to many unexpected errors, like https://bugzilla.redhat.com/show_bug.cgi?id=1963730

Moving the cert directory to the target directory (revisioned) ensures that these processes won't step each other's toes.

After this PR /etc/kubernetes/static-pod-resources/kube-apiserver-pod-REVISION/kube-apiserver-certs
Previously it was /etc/kubernetes/static-pod-resources/kube-apiserver-certs

@p0lyn0mial
Copy link
Contributor Author

/assign @sttts

The target directory holds all files for the current static pod manifest.

As of today, kube-apiserver-certs is accessed by at least two processes, namely the installer pod and the cert-syncer.
Up until now, there was no coordination between these processes that might have lead to many unexpected errors, like https://bugzilla.redhat.com/show_bug.cgi?id=1963730

Moving the cert directory to the target directory (revisioned) ensures that these processes won't step each other's toes.

After this PR /etc/kubernetes/static-pod-resources/kube-apiserver-pod-REVISION/kube-apiserver-certs
Previously it was /etc/kubernetes/static-pod-resources/kube-apiserver-certs
@p0lyn0mial p0lyn0mial force-pushed the with-revisioned-apiserver-certs-path branch from ed13947 to 3b048eb Compare June 7, 2021 13:24
p0lyn0mial added a commit to p0lyn0mial/origin that referenced this pull request Jun 7, 2021
…econfig to cover multiple paths

openshift/library-go#1098 moved the cert directory under a new path hence we need to cover both the old and the new paths
@p0lyn0mial p0lyn0mial changed the title moves the cert directory under the target directory Bug 1963730: moves the cert directory under the target directory Jun 7, 2021
@openshift-ci
Copy link
Contributor

openshift-ci bot commented Jun 7, 2021

@p0lyn0mial: This pull request references Bugzilla bug 1963730, which is valid. The bug has been updated to refer to the pull request using the external bug tracker.

3 validation(s) were run on this bug
  • bug is open, matching expected state (open)
  • bug target release (4.8.0) matches configured target release for branch (4.8.0)
  • bug is in the state POST, which is one of the valid states (NEW, ASSIGNED, ON_DEV, POST, POST)

Requesting review from QA contact:
/cc @wangke19

In response to this:

Bug 1963730: moves the cert directory under the target directory

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@openshift-ci openshift-ci bot added bugzilla/severity-low Referenced Bugzilla bug's severity is low for the branch this PR is targeting. bugzilla/valid-bug Indicates that a referenced Bugzilla bug is valid for the branch this PR is targeting. labels Jun 7, 2021
@openshift-ci openshift-ci bot requested a review from wangke19 June 7, 2021 13:48
@sttts
Copy link
Contributor

sttts commented Jun 8, 2021

/lgtm
/approve

@openshift-ci openshift-ci bot added the lgtm Indicates that a PR is ready to be merged. label Jun 8, 2021
@openshift-ci
Copy link
Contributor

openshift-ci bot commented Jun 8, 2021

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: p0lyn0mial, sttts

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci openshift-ci bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Jun 8, 2021
@openshift-merge-robot openshift-merge-robot merged commit 51ddcf3 into openshift:master Jun 8, 2021
@openshift-ci
Copy link
Contributor

openshift-ci bot commented Jun 8, 2021

@p0lyn0mial: Some pull requests linked via external trackers have merged:

The following pull requests linked via external trackers have not merged:

These pull request must merge or be unlinked from the Bugzilla bug in order for it to move to the next state. Once unlinked, request a bug refresh with /bugzilla refresh.

Bugzilla bug 1963730 has not been moved to the MODIFIED state.

In response to this:

Bug 1963730: moves the cert directory under the target directory

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

p0lyn0mial added a commit to p0lyn0mial/origin that referenced this pull request Jun 8, 2021
…econfig to cover multiple paths

openshift/library-go#1098 moved the cert directory under a new path hence we need to cover both the old and the new paths
p0lyn0mial added a commit to p0lyn0mial/library-go that referenced this pull request Jun 8, 2021
…oned-apiserver-certs-path"

This reverts commit 51ddcf3, reversing
changes made to abe9fea.
p0lyn0mial added a commit to p0lyn0mial/library-go that referenced this pull request Jun 8, 2021
…h-revisioned-apiserver-certs-path""

This reverts commit 71baae1.
openshift-merge-robot added a commit that referenced this pull request Jun 8, 2021
p0lyn0mial added a commit to p0lyn0mial/library-go that referenced this pull request Jun 9, 2021
…oned-apiserver-certs-path"

This reverts commit 51ddcf3, reversing
changes made to abe9fea.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. bugzilla/severity-low Referenced Bugzilla bug's severity is low for the branch this PR is targeting. bugzilla/valid-bug Indicates that a referenced Bugzilla bug is valid for the branch this PR is targeting. lgtm Indicates that a PR is ready to be merged.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants