--- apiVersion: v1 items: - apiVersion: v1 kind: Pod metadata: annotations: cluster-autoscaler.kubernetes.io/enable-ds-eviction: "false" creationTimestamp: "2026-03-18T10:10:02Z" generateName: cni-sysctl-allowlist-ds- labels: app: cni-sysctl-allowlist-ds controller-revision-hash: 8488b5b76 pod-template-generation: "1" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:cluster-autoscaler.kubernetes.io/enable-ds-eviction: {} f:target.workload.openshift.io/management: {} f:generateName: {} f:labels: .: {} f:app: {} f:controller-revision-hash: {} f:pod-template-generation: {} f:ownerReferences: .: {} k:{"uid":"88454725-c260-45c8-a3de-a80d81527811"}: {} f:spec: f:affinity: .: {} f:nodeAffinity: .: {} f:requiredDuringSchedulingIgnoredDuringExecution: {} f:containers: k:{"name":"kube-multus-additional-cni-plugins"}: .: {} f:command: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:readinessProbe: .: {} f:exec: .: {} f:command: {} f:failureThreshold: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:privileged: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/entrypoint"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/host/etc/cni/tuning/"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/ready"}: .: {} f:mountPath: {} f:name: {} f:dnsPolicy: {} f:enableServiceLinks: {} f:hostNetwork: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"cni-sysctl-allowlist"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"ready"}: .: {} f:emptyDir: {} f:name: {} k:{"name":"tuning-conf-dir"}: .: {} f:hostPath: .: {} f:path: {} f:type: {} f:name: {} manager: kube-controller-manager operation: Update time: "2026-03-18T10:10:02Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:status: f:conditions: k:{"type":"ContainersReady"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Initialized"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"PodReadyToStartContainers"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Ready"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} f:containerStatuses: {} f:hostIP: {} f:hostIPs: {} f:phase: {} f:podIP: {} f:podIPs: .: {} k:{"ip":"192.168.32.10"}: .: {} f:ip: {} f:startTime: {} manager: kubelet operation: Update subresource: status time: "2026-03-18T10:13:39Z" name: cni-sysctl-allowlist-ds-dqvx5 namespace: openshift-multus ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: DaemonSet name: cni-sysctl-allowlist-ds uid: 88454725-c260-45c8-a3de-a80d81527811 resourceVersion: "15585" uid: c72cb4f2-d0f2-4f20-a3b6-bf6ccd17e141 spec: affinity: nodeAffinity: requiredDuringSchedulingIgnoredDuringExecution: nodeSelectorTerms: - matchFields: - key: metadata.name operator: In values: - master-0 containers: - command: - /bin/bash - -c - cp /entrypoint/allowlist.conf /host/etc/cni/tuning/ && touch /ready/ready && sleep INF image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5a55ec7ec64efd0f595d8084377b7e463a1807829b7617e5d4a9092dcd924c36 imagePullPolicy: IfNotPresent name: kube-multus-additional-cni-plugins readinessProbe: exec: command: - /bin/bash - -c - test -f /ready/ready failureThreshold: 3 initialDelaySeconds: 1 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: requests: cpu: 10m memory: 10Mi securityContext: privileged: true terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /entrypoint name: cni-sysctl-allowlist - mountPath: /host/etc/cni/tuning/ name: tuning-conf-dir - mountPath: /ready name: ready - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-p8szd readOnly: true dnsPolicy: ClusterFirst enableServiceLinks: true hostNetwork: true imagePullSecrets: - name: default-dockercfg-rchwt nodeName: master-0 preemptionPolicy: PreemptLowerPriority priority: 1000000000 priorityClassName: openshift-user-critical restartPolicy: Always schedulerName: default-scheduler securityContext: {} serviceAccount: default serviceAccountName: default terminationGracePeriodSeconds: 30 tolerations: - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists - effect: NoSchedule key: node.kubernetes.io/disk-pressure operator: Exists - effect: NoSchedule key: node.kubernetes.io/memory-pressure operator: Exists - effect: NoSchedule key: node.kubernetes.io/pid-pressure operator: Exists - effect: NoSchedule key: node.kubernetes.io/unschedulable operator: Exists - effect: NoSchedule key: node.kubernetes.io/network-unavailable operator: Exists volumes: - configMap: defaultMode: 420 name: cni-sysctl-allowlist name: cni-sysctl-allowlist - hostPath: path: /etc/cni/tuning/ type: DirectoryOrCreate name: tuning-conf-dir - emptyDir: {} name: ready - name: kube-api-access-p8szd projected: defaultMode: 420 sources: - serviceAccountToken: expirationSeconds: 3607 path: token - configMap: items: - key: ca.crt path: ca.crt name: kube-root-ca.crt - downwardAPI: items: - fieldRef: apiVersion: v1 fieldPath: metadata.namespace path: namespace - configMap: items: - key: service-ca.crt path: service-ca.crt name: openshift-service-ca.crt status: conditions: - lastProbeTime: null lastTransitionTime: "2026-03-18T10:13:39Z" status: "True" type: PodReadyToStartContainers - lastProbeTime: null lastTransitionTime: "2026-03-18T10:13:38Z" status: "True" type: Initialized - lastProbeTime: null lastTransitionTime: "2026-03-18T10:13:39Z" status: "True" type: Ready - lastProbeTime: null lastTransitionTime: "2026-03-18T10:13:39Z" status: "True" type: ContainersReady - lastProbeTime: null lastTransitionTime: "2026-03-18T10:13:27Z" status: "True" type: PodScheduled containerStatuses: - containerID: cri-o://eae251a75b399419a54de069f41bb6f063d9b74461f5d4c6b9bd7b15a018c2ed image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5a55ec7ec64efd0f595d8084377b7e463a1807829b7617e5d4a9092dcd924c36 imageID: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5a55ec7ec64efd0f595d8084377b7e463a1807829b7617e5d4a9092dcd924c36 lastState: {} name: kube-multus-additional-cni-plugins ready: true restartCount: 0 started: true state: running: startedAt: "2026-03-18T10:13:38Z" volumeMounts: - mountPath: /entrypoint name: cni-sysctl-allowlist - mountPath: /host/etc/cni/tuning/ name: tuning-conf-dir - mountPath: /ready name: ready - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-p8szd readOnly: true recursiveReadOnly: Disabled hostIP: 192.168.32.10 hostIPs: - ip: 192.168.32.10 phase: Running podIP: 192.168.32.10 podIPs: - ip: 192.168.32.10 qosClass: Burstable startTime: "2026-03-18T10:13:38Z" - apiVersion: v1 kind: Pod metadata: annotations: cluster-autoscaler.kubernetes.io/enable-ds-eviction: "false" creationTimestamp: "2026-03-18T09:53:03Z" generateName: multus-additional-cni-plugins- labels: app: multus-additional-cni-plugins component: network controller-revision-hash: 84fc7f65b5 openshift.io/component: network pod-template-generation: "1" type: infra managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:cluster-autoscaler.kubernetes.io/enable-ds-eviction: {} f:target.workload.openshift.io/management: {} f:generateName: {} f:labels: .: {} f:app: {} f:component: {} f:controller-revision-hash: {} f:openshift.io/component: {} f:pod-template-generation: {} f:type: {} f:ownerReferences: .: {} k:{"uid":"75d144f6-7ced-4362-8d52-7ef284b4d2e0"}: {} f:spec: f:affinity: .: {} f:nodeAffinity: .: {} f:requiredDuringSchedulingIgnoredDuringExecution: {} f:containers: k:{"name":"kube-multus-additional-cni-plugins"}: .: {} f:args: {} f:command: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:privileged: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:dnsPolicy: {} f:enableServiceLinks: {} f:hostNetwork: {} f:initContainers: .: {} k:{"name":"bond-cni-plugin"}: .: {} f:command: {} f:env: .: {} k:{"name":"DEFAULT_SOURCE_DIRECTORY"}: .: {} f:name: {} f:value: {} k:{"name":"RHEL8_SOURCE_DIRECTORY"}: .: {} f:name: {} f:value: {} k:{"name":"RHEL9_SOURCE_DIRECTORY"}: .: {} f:name: {} f:value: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:resources: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/entrypoint"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/host/etc/os-release"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/host/opt/cni/bin"}: .: {} f:mountPath: {} f:name: {} k:{"name":"cni-plugins"}: .: {} f:command: {} f:env: .: {} k:{"name":"DEFAULT_SOURCE_DIRECTORY"}: .: {} f:name: {} f:value: {} k:{"name":"RHEL8_SOURCE_DIRECTORY"}: .: {} f:name: {} f:value: {} k:{"name":"RHEL9_SOURCE_DIRECTORY"}: .: {} f:name: {} f:value: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:resources: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/entrypoint"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/host/etc/cni/tuning/"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/host/etc/os-release"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/host/opt/cni/bin"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/sysctls"}: .: {} f:mountPath: {} f:name: {} k:{"name":"egress-router-binary-copy"}: .: {} f:command: {} f:env: .: {} k:{"name":"DEFAULT_SOURCE_DIRECTORY"}: .: {} f:name: {} f:value: {} k:{"name":"RHEL8_SOURCE_DIRECTORY"}: .: {} f:name: {} f:value: {} k:{"name":"RHEL9_SOURCE_DIRECTORY"}: .: {} f:name: {} f:value: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:resources: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/entrypoint"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/host/etc/os-release"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/host/opt/cni/bin"}: .: {} f:mountPath: {} f:name: {} k:{"name":"routeoverride-cni"}: .: {} f:command: {} f:env: .: {} k:{"name":"DEFAULT_SOURCE_DIRECTORY"}: .: {} f:name: {} f:value: {} k:{"name":"RHEL8_SOURCE_DIRECTORY"}: .: {} f:name: {} f:value: {} k:{"name":"RHEL9_SOURCE_DIRECTORY"}: .: {} f:name: {} f:value: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:resources: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/entrypoint"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/host/etc/os-release"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/host/opt/cni/bin"}: .: {} f:mountPath: {} f:name: {} k:{"name":"whereabouts-cni"}: .: {} f:command: {} f:env: .: {} k:{"name":"CNI_BIN_DIR"}: .: {} f:name: {} f:value: {} k:{"name":"CNI_CONF_DIR"}: .: {} f:name: {} f:value: {} k:{"name":"KUBERNETES_SERVICE_HOST"}: .: {} f:name: {} f:value: {} k:{"name":"KUBERNETES_SERVICE_PORT"}: .: {} f:name: {} f:value: {} k:{"name":"NODENAME"}: .: {} f:name: {} f:valueFrom: .: {} f:fieldRef: {} k:{"name":"SLEEP"}: .: {} f:name: {} f:value: {} k:{"name":"WHEREABOUTS_NAMESPACE"}: .: {} f:name: {} f:value: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/whereabouts/config"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/host/etc/cni/net.d"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/host/opt/cni/bin"}: .: {} f:mountPath: {} f:name: {} k:{"name":"whereabouts-cni-bincopy"}: .: {} f:command: {} f:env: .: {} k:{"name":"DEFAULT_SOURCE_DIRECTORY"}: .: {} f:name: {} f:value: {} k:{"name":"RHEL8_SOURCE_DIRECTORY"}: .: {} f:name: {} f:value: {} k:{"name":"RHEL9_SOURCE_DIRECTORY"}: .: {} f:name: {} f:value: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/entrypoint"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/host/etc/os-release"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/host/opt/cni/bin"}: .: {} f:mountPath: {} f:name: {} f:nodeSelector: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"cni-binary-copy"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"cni-sysctl-allowlist"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"cnibin"}: .: {} f:hostPath: .: {} f:path: {} f:type: {} f:name: {} k:{"name":"multus-cni-dir"}: .: {} f:hostPath: .: {} f:path: {} f:type: {} f:name: {} k:{"name":"os-release"}: .: {} f:hostPath: .: {} f:path: {} f:type: {} f:name: {} k:{"name":"system-cni-dir"}: .: {} f:hostPath: .: {} f:path: {} f:type: {} f:name: {} k:{"name":"tuning-conf-dir"}: .: {} f:hostPath: .: {} f:path: {} f:type: {} f:name: {} k:{"name":"whereabouts-flatfile-configmap"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} manager: kube-controller-manager operation: Update time: "2026-03-18T09:53:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:status: f:conditions: k:{"type":"ContainersReady"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Initialized"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"PodReadyToStartContainers"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Ready"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} f:containerStatuses: {} f:hostIP: {} f:hostIPs: {} f:initContainerStatuses: {} f:phase: {} f:podIP: {} f:podIPs: .: {} k:{"ip":"192.168.32.10"}: .: {} f:ip: {} f:startTime: {} manager: kubelet operation: Update subresource: status time: "2026-03-18T09:53:54Z" name: multus-additional-cni-plugins-dg6dw namespace: openshift-multus ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: DaemonSet name: multus-additional-cni-plugins uid: 75d144f6-7ced-4362-8d52-7ef284b4d2e0 resourceVersion: "3385" uid: 91331360-dc70-45bb-a815-e00664bae6c4 spec: affinity: nodeAffinity: requiredDuringSchedulingIgnoredDuringExecution: nodeSelectorTerms: - matchFields: - key: metadata.name operator: In values: - master-0 containers: - args: - | trap : TERM INT; sleep infinity & wait command: - /bin/bash - -ec - -- image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5a55ec7ec64efd0f595d8084377b7e463a1807829b7617e5d4a9092dcd924c36 imagePullPolicy: IfNotPresent name: kube-multus-additional-cni-plugins resources: requests: cpu: 10m memory: 10Mi securityContext: privileged: true terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-8w8sl readOnly: true dnsPolicy: ClusterFirst enableServiceLinks: true hostNetwork: true initContainers: - command: - /entrypoint/cnibincopy.sh env: - name: RHEL8_SOURCE_DIRECTORY value: /usr/src/egress-router-cni/rhel8/bin/ - name: RHEL9_SOURCE_DIRECTORY value: /usr/src/egress-router-cni/rhel9/bin/ - name: DEFAULT_SOURCE_DIRECTORY value: /usr/src/egress-router-cni/bin/ image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:21b4c9cf268bb7abef7af187cd775d3f74d0bd33626250095428d53b705ee946 imagePullPolicy: IfNotPresent name: egress-router-binary-copy resources: {} terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /entrypoint name: cni-binary-copy - mountPath: /host/opt/cni/bin name: cnibin - mountPath: /host/etc/os-release name: os-release readOnly: true - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-8w8sl readOnly: true - command: - /bin/bash - -c - /entrypoint/cnibincopy.sh && cp -n /sysctls/allowlist.conf /host/etc/cni/tuning/ env: - name: RHEL8_SOURCE_DIRECTORY value: /usr/src/plugins/rhel8/bin/ - name: RHEL9_SOURCE_DIRECTORY value: /usr/src/plugins/rhel9/bin/ - name: DEFAULT_SOURCE_DIRECTORY value: /usr/src/plugins/bin/ image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5e12e4dc52214d3ada5ba5106caebe079eac1d9292c2571a5fe83411ce8e900d imagePullPolicy: IfNotPresent name: cni-plugins resources: {} terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /entrypoint name: cni-binary-copy - mountPath: /host/opt/cni/bin name: cnibin - mountPath: /host/etc/os-release name: os-release readOnly: true - mountPath: /host/etc/cni/tuning/ name: tuning-conf-dir - mountPath: /sysctls name: cni-sysctl-allowlist - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-8w8sl readOnly: true - command: - /entrypoint/cnibincopy.sh env: - name: RHEL8_SOURCE_DIRECTORY value: /bondcni/rhel8/ - name: RHEL9_SOURCE_DIRECTORY value: /bondcni/rhel9/ - name: DEFAULT_SOURCE_DIRECTORY value: /bondcni/rhel9/ image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0e66fd50be6f83ce321a566dfb76f3725b597374077d5af13813b928f6b1267e imagePullPolicy: IfNotPresent name: bond-cni-plugin resources: {} terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /entrypoint name: cni-binary-copy - mountPath: /host/opt/cni/bin name: cnibin - mountPath: /host/etc/os-release name: os-release readOnly: true - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-8w8sl readOnly: true - command: - /entrypoint/cnibincopy.sh env: - name: RHEL8_SOURCE_DIRECTORY value: /usr/src/route-override/rhel8/bin/ - name: RHEL9_SOURCE_DIRECTORY value: /usr/src/route-override/rhel9/bin/ - name: DEFAULT_SOURCE_DIRECTORY value: /usr/src/route-override/bin/ image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e3a494212f1ba17f0f0980eef583218330eccb56eadf6b8cb0548c76d99b5014 imagePullPolicy: IfNotPresent name: routeoverride-cni resources: {} terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /entrypoint name: cni-binary-copy - mountPath: /host/opt/cni/bin name: cnibin - mountPath: /host/etc/os-release name: os-release readOnly: true - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-8w8sl readOnly: true - command: - /entrypoint/cnibincopy.sh env: - name: RHEL8_SOURCE_DIRECTORY value: /usr/src/whereabouts/rhel8/bin/ - name: RHEL9_SOURCE_DIRECTORY value: /usr/src/whereabouts/rhel9/bin/ - name: DEFAULT_SOURCE_DIRECTORY value: /usr/src/whereabouts/bin/ image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0a09f5a3ba4f60cce0145769509bab92553c8075d210af4ac058965d2ae11efa imagePullPolicy: IfNotPresent name: whereabouts-cni-bincopy resources: requests: cpu: 10m memory: 10Mi terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /entrypoint name: cni-binary-copy - mountPath: /host/opt/cni/bin name: cnibin - mountPath: /host/etc/os-release name: os-release readOnly: true - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-8w8sl readOnly: true - command: - /bin/sh - -c - | #!/bin/sh set -u -e CNI_BIN_DIR=${CNI_BIN_DIR:-"/host/opt/cni/bin/"} WHEREABOUTS_KUBECONFIG_FILE_HOST=${WHEREABOUTS_KUBECONFIG_FILE_HOST:-"/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig"} CNI_CONF_DIR=${CNI_CONF_DIR:-"/host/etc/kubernetes/cni/net.d"} WHEREABOUTS_RECONCILER_CRON=${WHEREABOUTS_RECONCILER_CRON:-30 4 * * *} # Make a whereabouts.d directory (for our kubeconfig) mkdir -p $CNI_CONF_DIR/whereabouts.d WHEREABOUTS_KUBECONFIG=$CNI_CONF_DIR/whereabouts.d/whereabouts.kubeconfig WHEREABOUTS_CONF_FILE=$CNI_CONF_DIR/whereabouts.d/whereabouts.conf WHEREABOUTS_KUBECONFIG_LITERAL=$(echo "$WHEREABOUTS_KUBECONFIG" | sed -e s'|/host||') # Write the nodename to the whereabouts.d directory for standardized hostname reference across cloud providers echo $NODENAME > $CNI_CONF_DIR/whereabouts.d/nodename SERVICE_ACCOUNT_PATH=/var/run/secrets/kubernetes.io/serviceaccount KUBE_CA_FILE=${KUBE_CA_FILE:-$SERVICE_ACCOUNT_PATH/ca.crt} SERVICE_ACCOUNT_TOKEN=$(cat $SERVICE_ACCOUNT_PATH/token) SERVICE_ACCOUNT_TOKEN_PATH=$SERVICE_ACCOUNT_PATH/token SKIP_TLS_VERIFY=${SKIP_TLS_VERIFY:-false} function log() { echo "$(date -Iseconds) ${1}" } function error() { log "ERR: {$1}" } function warn() { log "WARN: {$1}" } function generateKubeConfig { # Check if we're running as a k8s pod. if [ -f "$SERVICE_ACCOUNT_PATH/token" ]; then # We're running as a k8d pod - expect some variables. if [ -z ${KUBERNETES_SERVICE_HOST} ]; then error "KUBERNETES_SERVICE_HOST not set"; exit 1; fi if [ -z ${KUBERNETES_SERVICE_PORT} ]; then error "KUBERNETES_SERVICE_PORT not set"; exit 1; fi if [ "$SKIP_TLS_VERIFY" == "true" ]; then TLS_CFG="insecure-skip-tls-verify: true" elif [ -f "$KUBE_CA_FILE" ]; then TLS_CFG="certificate-authority-data: $(cat $KUBE_CA_FILE | base64 | tr -d '\n')" fi # Kubernetes service address must be wrapped if it is IPv6 address KUBERNETES_SERVICE_HOST_WRAP=$KUBERNETES_SERVICE_HOST if [ "$KUBERNETES_SERVICE_HOST_WRAP" != "${KUBERNETES_SERVICE_HOST_WRAP#*:[0-9a-fA-F]}" ]; then KUBERNETES_SERVICE_HOST_WRAP=\[$KUBERNETES_SERVICE_HOST_WRAP\] fi # Write a kubeconfig file for the CNI plugin. Do this # to skip TLS verification for now. We should eventually support # writing more complete kubeconfig files. This is only used # if the provided CNI network config references it. touch $WHEREABOUTS_KUBECONFIG chmod ${KUBECONFIG_MODE:-600} $WHEREABOUTS_KUBECONFIG cat > $WHEREABOUTS_KUBECONFIG < $WHEREABOUTS_CONF_FILE <