Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bug 1741432: openshift-node to approve node CSRs #11847

Merged
merged 1 commit into from Aug 23, 2019

Conversation

jstuever
Copy link
Contributor

@jstuever jstuever commented Aug 21, 2019

This change approves the node's bootstrap CSR to enable it to join the cluster. This is required in cases where a node is being added to the cluster which was not deployed by the cluster. Otherwise such nodes will never become ready and the playbook will fail. It also approves the node's other CSR for convenience of the end user.

They are considered approved when at lease one associated CSR exists (based on the nodes name) and oc adm certificate approve <csr> has a return code of zero. This could lead to false positives if a CSR for this node already existed such as when a node name has been reused in the cluster. However, the bootstrap CSR was observed have always been pending in the cluster before Ansible recognises the node as having returned from reboot. Because of this, and the fact that all associated CSRs are approved with each attempt, this should have minimal impact.

@openshift-ci-robot openshift-ci-robot added the do-not-merge/work-in-progress Indicates that a PR should not merge because it is a work in progress. label Aug 21, 2019
@openshift-ci-robot openshift-ci-robot added size/M Denotes a PR that changes 30-99 lines, ignoring generated files. approved Indicates a PR has been approved by an approver from all required OWNERS files. labels Aug 21, 2019
@openshift-ci-robot
Copy link

@jstuever: An error was encountered searching for bug 1741432 on the Bugzilla server at https://bugzilla.redhat.com:

Get https://bugzilla.redhat.com/rest/bug/1741432?api_key=8I9KTBFPQoksOsA1QGWLJ1PjNwaPfnnQ6nRYZwbH: dial tcp 209.132.183.69:443: i/o timeout
Please contact an administrator to resolve this issue, then request a bug refresh with /bugzilla refresh.

In response to this:

[WIP] Bug 1741432: openshift-node to approve node CSRs

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

This change approves the node's bootstrap csr to enable it to
join the cluster. This is required in cases where a node is
being added to the cluster which was not deployed by the cluster.
@openshift-ci-robot
Copy link

@jstuever: This pull request references Bugzilla bug 1741432, which is valid. The bug has been moved to the POST state. The bug has been updated to refer to the pull request using the external bug tracker.

In response to this:

[WIP] Bug 1741432: openshift-node to approve node CSRs

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@openshift-ci-robot openshift-ci-robot added the bugzilla/valid-bug Indicates that a referenced Bugzilla bug is valid for the branch this PR is targeting. label Aug 21, 2019
@jstuever jstuever changed the title [WIP] Bug 1741432: openshift-node to approve node CSRs Bug 1741432: openshift-node to approve node CSRs Aug 21, 2019
@openshift-ci-robot openshift-ci-robot removed the do-not-merge/work-in-progress Indicates that a PR should not merge because it is a work in progress. label Aug 21, 2019
@openshift-ci-robot
Copy link

@jstuever: This pull request references Bugzilla bug 1741432, which is valid.

In response to this:

Bug 1741432: openshift-node to approve node CSRs

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

Copy link
Member

@mtnbikenc mtnbikenc left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/lgtm

@openshift-ci-robot openshift-ci-robot added the lgtm Indicates that a PR is ready to be merged. label Aug 23, 2019
@openshift-ci-robot
Copy link

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: jstuever, mtnbikenc

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-merge-robot openshift-merge-robot merged commit d1a5996 into openshift:master Aug 23, 2019
@openshift-ci-robot
Copy link

@jstuever: All pull requests linked via external trackers have merged. Bugzilla bug 1741432 has been moved to the MODIFIED state.

In response to this:

Bug 1741432: openshift-node to approve node CSRs

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@DanyC97
Copy link
Contributor

DanyC97 commented Aug 24, 2019

@jstuever @mtnbikenc are you planning to cherry pick to 3.11 too ? thank you ignore my silly request, 🤦‍♂

@jstuever jstuever deleted the bz1741432 branch January 5, 2023 17:18
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. bugzilla/valid-bug Indicates that a referenced Bugzilla bug is valid for the branch this PR is targeting. lgtm Indicates that a PR is ready to be merged. size/M Denotes a PR that changes 30-99 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

5 participants