Closed sanchezl closed 6 months ago
@sanchezl: This pull request references Jira Issue OCPBUGS-33600, which is invalid:
Comment /jira refresh
to re-evaluate validity if changes to the Jira bug are made, or edit the title of this pull request to link to a different bug.
The bug has been updated to refer to the pull request using the external bug tracker.
/payload-job periodic-ci-openshift-hypershift-release-4.16-periodics-e2e-aws-ovn-conformance
@sanchezl: trigger 1 job(s) for the /payload-(with-prs|job|aggregate|job-with-prs|aggregate-with-prs) command
See details on https://pr-payload-tests.ci.openshift.org/runs/ci/8ad79e00-117f-11ef-8080-22dfebaceee0-0
/jira refresh
@sanchezl: This pull request references Jira Issue OCPBUGS-33600, which is valid. The bug has been moved to the POST state.
/retest-required
/retest-required
@sanchezl: This pull request references Jira Issue OCPBUGS-33600, which is valid.
The bug has been updated to refer to the pull request using the external bug tracker.
/label acknowledge-critical-fixes-only
/lgtm /hold
@sanchezl Do you want to re-run the hypershift payload job?
[APPROVALNOTIFIER] This PR is APPROVED
This pull-request has been approved by: benluddy, sanchezl, soltysh
The full list of commands accepted by this bot can be found here.
The pull request process is described here
@sanchezl: The following test failed, say /retest
to rerun all failed tests or /retest-required
to rerun all mandatory failed tests:
Test name | Commit | Details | Required | Rerun command |
---|---|---|---|---|
ci/prow/security | 5bcef3649d67a522ade7e668edebc83e177dbaaa | link | false | /test security |
Full PR test history. Your PR dashboard.
/payload-job periodic-ci-openshift-hypershift-release-4.16-periodics-e2e-aws-ovn-conformance
@benluddy: trigger 1 job(s) for the /payload-(with-prs|job|aggregate|job-with-prs|aggregate-with-prs) command
See details on https://pr-payload-tests.ci.openshift.org/runs/ci/058004d0-1234-11ef-9c79-b53ffec4c3e7-0
/payload 4.16 ci blocking
@sanchezl: trigger 5 job(s) of type blocking for the ci release of OCP 4.16
See details on https://pr-payload-tests.ci.openshift.org/runs/ci/39b901c0-1234-11ef-905a-e5452c9fb821-0
/hold cancel
@sanchezl: Jira Issue OCPBUGS-33600: All pull requests linked via external trackers have merged:
Jira Issue OCPBUGS-33600 has been moved to the MODIFIED state.
[ART PR BUILD NOTIFIER]
This PR has been included in build ose-openshift-controller-manager-container-v4.17.0-202405151441.p0.g7637f1a.assembly.stream.el9 for distgit ose-openshift-controller-manager. All builds following this will include this PR.
Fix included in accepted release 4.16.0-0.nightly-2024-05-16-092402
On Hypershift, the image pull secrets were created, but not properly initialized due to the
image_pull_secret_controller
getting stuck waiting for the existence of the bound-service-account-signing-key secret in the openshift-kube-apiserver namespace.Ideally, Hypershift would prefer to mount the service account signing key as as a volume on OCM pod. This would match what we already do this for the KCM pod. This PR provides an OCM-only fix to get us going until we make the changes to the way hypershift runs OCM.
Since what we need is the just the hash of the service account signing public key, if OCM does not find the bound-service-account-signing-key secret on startup, OCM will create a throwaway API token and extract the service account signing public key's hash from the token.
Currently, on hypershift, the service account signing public key is provided as a CLI option. OCM would need to be restarted if the service account signing public key changes,