-
Notifications
You must be signed in to change notification settings - Fork 1.8k
OCPBUGS-61221-63545# Ensure new keypairs are not generated and public-key-file flag is used where appropriate #101095
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -22,6 +22,23 @@ On AWS clusters, some `ccoctl` commands make AWS API calls to create or modify A | |
|
|
||
| .Procedure | ||
|
|
||
| . Create the output directory if it does not already exist by running the following command: | ||
| + | ||
| [source,terminal] | ||
| ---- | ||
| $ mkdir -p <path_to_ccoctl_output_dir> | ||
| ---- | ||
|
|
||
| . Extract the bound service account signing key from the cluster and save it to the output directory by running the following command: | ||
| + | ||
| [source,terminal] | ||
| ---- | ||
| $ oc get secret bound-service-account-signing-key \ | ||
| -n openshift-kube-apiserver \ | ||
| -ojsonpath='{ .data.service-account\.pub }' | base64 \ | ||
| -d > <path_to_ccoctl_output_dir>/serviceaccount-signer.public | ||
| ---- | ||
|
|
||
| . Use the `ccoctl` tool to process all `CredentialsRequest` objects by running the command for your cloud provider. The following commands process `CredentialsRequest` objects: | ||
| + | ||
| .Amazon Web Services (AWS) | ||
|
|
@@ -34,14 +51,16 @@ $ ccoctl aws create-all \// <1> | |
| --region=<aws_region> \// <3> | ||
| --credentials-requests-dir=<path_to_credentials_requests_directory> \// <4> | ||
| --output-dir=<path_to_ccoctl_output_dir> \// <5> | ||
| --create-private-s3-bucket <6> | ||
| --public-key-file=<path_to_ccoctl_output_dir>/serviceaccount-signer.public \// <6> | ||
| --create-private-s3-bucket <7> | ||
| ---- | ||
| <1> To create the AWS resources individually, use the "Creating AWS resources individually" procedure in the "Installing a cluster on AWS with customizations" content. This option might be useful if you need to review the JSON files that the `ccoctl` tool creates before modifying AWS resources, or if the process the `ccoctl` tool uses to create AWS resources automatically does not meet the requirements of your organization. | ||
| <2> Specify the name used to tag any cloud resources that are created for tracking. | ||
| <3> Specify the AWS region in which cloud resources will be created. | ||
| <4> Specify the directory containing the files for the component `CredentialsRequest` objects. | ||
| <5> Optional: Specify the directory in which you want the `ccoctl` utility to create objects. By default, the utility creates objects in the directory in which the commands are run. | ||
| <6> Optional: By default, the `ccoctl` utility stores the OpenID Connect (OIDC) configuration files in a public S3 bucket and uses the S3 URL as the public OIDC endpoint. To store the OIDC configuration in a private S3 bucket that is accessed by the IAM identity provider through a public CloudFront distribution URL instead, use the `--create-private-s3-bucket` parameter. | ||
| <5> Specify the path to the output directory. | ||
| <6> Specify the path to the `serviceaccount-signer.public` file that you extracted from the cluster. | ||
| <7> Optional: By default, the `ccoctl` utility stores the OpenID Connect (OIDC) configuration files in a public S3 bucket and uses the S3 URL as the public OIDC endpoint. To store the OIDC configuration in a private S3 bucket that is accessed by the IAM identity provider through a public CloudFront distribution URL instead, use the `--create-private-s3-bucket` parameter. | ||
| ==== | ||
|
Collaborator
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. 🤖 [error] AsciiDocDITA.TaskExample: Examples are allowed only once in DITA tasks.
Collaborator
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. 🤖 [error] AsciiDocDITA.ExampleBlock: Examples can not be inside of other blocks in DITA. |
||
| + | ||
| .{gcp-first} | ||
|
|
@@ -54,13 +73,15 @@ $ ccoctl gcp create-all \ | |
| --region=<gcp_region> \// <2> | ||
| --project=<gcp_project_id> \// <3> | ||
| --credentials-requests-dir=<path_to_credentials_requests_directory> \// <4> | ||
| --output-dir=<path_to_ccoctl_output_dir> <5> | ||
| --output-dir=<path_to_ccoctl_output_dir> \// <5> | ||
| --public-key-file=<path_to_ccoctl_output_dir>/serviceaccount-signer.public \// <6> | ||
| ---- | ||
| <1> Specify the user-defined name for all created {gcp-short} resources used for tracking. | ||
| <2> Specify the {gcp-short} region in which cloud resources will be created. | ||
| <3> Specify the {gcp-short} project ID in which cloud resources will be created. | ||
| <4> Specify the directory containing the files of `CredentialsRequest` manifests to create {gcp-short} service accounts. | ||
| <5> Optional: Specify the directory in which you want the `ccoctl` utility to create objects. By default, the utility creates objects in the directory in which the commands are run. | ||
| <5> Specify the path to the output directory. | ||
| <6> Specify the path to the `serviceaccount-signer.public` file that you extracted from the cluster. | ||
| ==== | ||
| + | ||
| .{ibm-cloud-title} | ||
|
|
@@ -87,19 +108,21 @@ $ ccoctl ibmcloud create-service-id \ | |
| ---- | ||
| $ ccoctl azure create-managed-identities \ | ||
| --name <azure_infra_name> \// <1> | ||
| --output-dir ./output_dir \ | ||
| --region <azure_region> \// <2> | ||
| --subscription-id <azure_subscription_id> \// <3> | ||
| --credentials-requests-dir <path_to_directory_for_credentials_requests> \ | ||
| --issuer-url "${OIDC_ISSUER_URL}" \// <4> | ||
| --dnszone-resource-group-name <azure_dns_zone_resourcegroup_name> \// <5> | ||
| --installation-resource-group-name "${AZURE_INSTALL_RG}" <6> | ||
| --output-dir=<path_to_ccoctl_output_dir> \// <2> | ||
| --region <azure_region> \// <3> | ||
| --subscription-id <azure_subscription_id> \// <4> | ||
| --credentials-requests-dir <path_to_directory_for_credentials_requests> \// <5> | ||
| --issuer-url "${OIDC_ISSUER_URL}" \// <6> | ||
| --dnszone-resource-group-name <azure_dns_zone_resourcegroup_name> \// <7> | ||
| --installation-resource-group-name "${AZURE_INSTALL_RG}" <8> | ||
| ---- | ||
| <1> The value of the `name` parameter is used to create an Azure resource group. | ||
| To use an existing Azure resource group instead of creating a new one, specify the `--oidc-resource-group-name` argument with the existing group name as its value. | ||
| <2> Specify the region of the existing cluster. | ||
| <3> Specify the subscription ID of the existing cluster. | ||
| <4> Specify the OIDC issuer URL from the existing cluster. | ||
| <2> Specify the path to the output directory. | ||
| <3> Specify the region of the existing cluster. | ||
| <4> Specify the subscription ID of the existing cluster. | ||
| <5> Specify the directory containing the files for the component `CredentialsRequest` objects. | ||
| <6> Specify the OIDC issuer URL from the existing cluster. | ||
| You can obtain this value by running the following command: | ||
| + | ||
| [source,terminal] | ||
|
|
@@ -108,8 +131,8 @@ $ oc get authentication cluster \ | |
| -o jsonpath \ | ||
| --template='{ .spec.serviceAccountIssuer }' | ||
| ---- | ||
| <5> Specify the name of the resource group that contains the DNS zone. | ||
| <6> Specify the {azure-short} resource group name. | ||
| <7> Specify the name of the resource group that contains the DNS zone. | ||
| <8> Specify the {azure-short} resource group name. | ||
| You can obtain this value by running the following command: | ||
| + | ||
| [source,terminal] | ||
|
|
||
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
the new command steps should end with "by running the following command:"