--- apiVersion: v1 items: - apiVersion: v1 kind: Pod metadata: annotations: cluster-autoscaler.kubernetes.io/enable-ds-eviction: "false" creationTimestamp: "2026-03-07T21:28:16Z" generateName: cni-sysctl-allowlist-ds- labels: app: cni-sysctl-allowlist-ds controller-revision-hash: 5cd89fc6f7 pod-template-generation: "1" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:cluster-autoscaler.kubernetes.io/enable-ds-eviction: {} f:target.workload.openshift.io/management: {} f:generateName: {} f:labels: .: {} f:app: {} f:controller-revision-hash: {} f:pod-template-generation: {} f:ownerReferences: .: {} k:{"uid":"a3dd5e4e-465e-4e36-bdf4-9ea25889f9ea"}: {} f:spec: f:affinity: .: {} f:nodeAffinity: .: {} f:requiredDuringSchedulingIgnoredDuringExecution: {} f:containers: k:{"name":"kube-multus-additional-cni-plugins"}: .: {} f:command: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:readinessProbe: .: {} f:exec: .: {} f:command: {} f:failureThreshold: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:privileged: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/entrypoint"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/host/etc/cni/tuning/"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/ready"}: .: {} f:mountPath: {} f:name: {} f:dnsPolicy: {} f:enableServiceLinks: {} f:hostNetwork: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"cni-sysctl-allowlist"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"ready"}: .: {} f:emptyDir: {} f:name: {} k:{"name":"tuning-conf-dir"}: .: {} f:hostPath: .: {} f:path: {} f:type: {} f:name: {} manager: kube-controller-manager operation: Update time: "2026-03-07T21:28:16Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:status: f:conditions: k:{"type":"ContainersReady"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Initialized"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"PodReadyToStartContainers"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Ready"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} f:containerStatuses: {} f:hostIP: {} f:hostIPs: {} f:phase: {} f:podIP: {} f:podIPs: .: {} k:{"ip":"192.168.32.10"}: .: {} f:ip: {} f:startTime: {} manager: kubelet operation: Update subresource: status time: "2026-03-07T21:31:03Z" name: cni-sysctl-allowlist-ds-rhtr2 namespace: openshift-multus ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: DaemonSet name: cni-sysctl-allowlist-ds uid: a3dd5e4e-465e-4e36-bdf4-9ea25889f9ea resourceVersion: "16362" uid: e151beb8-fcc6-4d9b-a56d-a351f43d9df5 spec: affinity: nodeAffinity: requiredDuringSchedulingIgnoredDuringExecution: nodeSelectorTerms: - matchFields: - key: metadata.name operator: In values: - master-0 containers: - command: - /bin/bash - -c - cp /entrypoint/allowlist.conf /host/etc/cni/tuning/ && touch /ready/ready && sleep INF image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:381e96959e3c3b08a3e2715e6024697ae14af31bd0378b49f583e984b3b9a192 imagePullPolicy: IfNotPresent name: kube-multus-additional-cni-plugins readinessProbe: exec: command: - /bin/bash - -c - test -f /ready/ready failureThreshold: 3 initialDelaySeconds: 1 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: requests: cpu: 10m memory: 10Mi securityContext: privileged: true terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /entrypoint name: cni-sysctl-allowlist - mountPath: /host/etc/cni/tuning/ name: tuning-conf-dir - mountPath: /ready name: ready - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-rrfp5 readOnly: true dnsPolicy: ClusterFirst enableServiceLinks: true hostNetwork: true nodeName: master-0 preemptionPolicy: PreemptLowerPriority priority: 1000000000 priorityClassName: openshift-user-critical restartPolicy: Always schedulerName: default-scheduler securityContext: {} serviceAccount: default serviceAccountName: default terminationGracePeriodSeconds: 30 tolerations: - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists - effect: NoSchedule key: node.kubernetes.io/disk-pressure operator: Exists - effect: NoSchedule key: node.kubernetes.io/memory-pressure operator: Exists - effect: NoSchedule key: node.kubernetes.io/pid-pressure operator: Exists - effect: NoSchedule key: node.kubernetes.io/unschedulable operator: Exists - effect: NoSchedule key: node.kubernetes.io/network-unavailable operator: Exists volumes: - configMap: defaultMode: 420 name: cni-sysctl-allowlist name: cni-sysctl-allowlist - hostPath: path: /etc/cni/tuning/ type: DirectoryOrCreate name: tuning-conf-dir - emptyDir: {} name: ready - name: kube-api-access-rrfp5 projected: defaultMode: 420 sources: - serviceAccountToken: expirationSeconds: 3607 path: token - configMap: items: - key: ca.crt path: ca.crt name: kube-root-ca.crt - downwardAPI: items: - fieldRef: apiVersion: v1 fieldPath: metadata.namespace path: namespace - configMap: items: - key: service-ca.crt path: service-ca.crt name: openshift-service-ca.crt status: conditions: - lastProbeTime: null lastTransitionTime: "2026-03-07T21:31:02Z" status: "True" type: PodReadyToStartContainers - lastProbeTime: null lastTransitionTime: "2026-03-07T21:31:01Z" status: "True" type: Initialized - lastProbeTime: null lastTransitionTime: "2026-03-07T21:31:03Z" status: "True" type: Ready - lastProbeTime: null lastTransitionTime: "2026-03-07T21:31:03Z" status: "True" type: ContainersReady - lastProbeTime: null lastTransitionTime: "2026-03-07T21:31:01Z" status: "True" type: PodScheduled containerStatuses: - containerID: cri-o://82a2716f09984ce00ea563f405706c814a347a439f4b3562acc27fa0d3420533 image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:381e96959e3c3b08a3e2715e6024697ae14af31bd0378b49f583e984b3b9a192 imageID: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:381e96959e3c3b08a3e2715e6024697ae14af31bd0378b49f583e984b3b9a192 lastState: {} name: kube-multus-additional-cni-plugins ready: true restartCount: 0 started: true state: running: startedAt: "2026-03-07T21:31:02Z" volumeMounts: - mountPath: /entrypoint name: cni-sysctl-allowlist - mountPath: /host/etc/cni/tuning/ name: tuning-conf-dir - mountPath: /ready name: ready - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-rrfp5 readOnly: true recursiveReadOnly: Disabled hostIP: 192.168.32.10 hostIPs: - ip: 192.168.32.10 phase: Running podIP: 192.168.32.10 podIPs: - ip: 192.168.32.10 qosClass: Burstable startTime: "2026-03-07T21:31:01Z" - apiVersion: v1 kind: Pod metadata: annotations: cluster-autoscaler.kubernetes.io/enable-ds-eviction: "false" creationTimestamp: "2026-03-07T21:13:27Z" generateName: multus-additional-cni-plugins- labels: app: multus-additional-cni-plugins component: network controller-revision-hash: 865dcd876c openshift.io/component: network pod-template-generation: "1" type: infra managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:cluster-autoscaler.kubernetes.io/enable-ds-eviction: {} f:target.workload.openshift.io/management: {} f:generateName: {} f:labels: .: {} f:app: {} f:component: {} f:controller-revision-hash: {} f:openshift.io/component: {} f:pod-template-generation: {} f:type: {} f:ownerReferences: .: {} k:{"uid":"85e6b862-0f32-4ff4-b853-ca55d0eeaf68"}: {} f:spec: f:affinity: .: {} f:nodeAffinity: .: {} f:requiredDuringSchedulingIgnoredDuringExecution: {} f:containers: k:{"name":"kube-multus-additional-cni-plugins"}: .: {} f:args: {} f:command: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:privileged: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:dnsPolicy: {} f:enableServiceLinks: {} f:hostNetwork: {} f:initContainers: .: {} k:{"name":"bond-cni-plugin"}: .: {} f:command: {} f:env: .: {} k:{"name":"DEFAULT_SOURCE_DIRECTORY"}: .: {} f:name: {} f:value: {} k:{"name":"RHEL8_SOURCE_DIRECTORY"}: .: {} f:name: {} f:value: {} k:{"name":"RHEL9_SOURCE_DIRECTORY"}: .: {} f:name: {} f:value: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:resources: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/entrypoint"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/host/etc/os-release"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/host/opt/cni/bin"}: .: {} f:mountPath: {} f:name: {} k:{"name":"cni-plugins"}: .: {} f:command: {} f:env: .: {} k:{"name":"DEFAULT_SOURCE_DIRECTORY"}: .: {} f:name: {} f:value: {} k:{"name":"RHEL8_SOURCE_DIRECTORY"}: .: {} f:name: {} f:value: {} k:{"name":"RHEL9_SOURCE_DIRECTORY"}: .: {} f:name: {} f:value: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:resources: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/entrypoint"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/host/etc/cni/tuning/"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/host/etc/os-release"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/host/opt/cni/bin"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/sysctls"}: .: {} f:mountPath: {} f:name: {} k:{"name":"egress-router-binary-copy"}: .: {} f:command: {} f:env: .: {} k:{"name":"DEFAULT_SOURCE_DIRECTORY"}: .: {} f:name: {} f:value: {} k:{"name":"RHEL8_SOURCE_DIRECTORY"}: .: {} f:name: {} f:value: {} k:{"name":"RHEL9_SOURCE_DIRECTORY"}: .: {} f:name: {} f:value: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:resources: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/entrypoint"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/host/etc/os-release"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/host/opt/cni/bin"}: .: {} f:mountPath: {} f:name: {} k:{"name":"routeoverride-cni"}: .: {} f:command: {} f:env: .: {} k:{"name":"DEFAULT_SOURCE_DIRECTORY"}: .: {} f:name: {} f:value: {} k:{"name":"RHEL8_SOURCE_DIRECTORY"}: .: {} f:name: {} f:value: {} k:{"name":"RHEL9_SOURCE_DIRECTORY"}: .: {} f:name: {} f:value: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:resources: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/entrypoint"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/host/etc/os-release"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/host/opt/cni/bin"}: .: {} f:mountPath: {} f:name: {} k:{"name":"whereabouts-cni"}: .: {} f:command: {} f:env: .: {} k:{"name":"CNI_BIN_DIR"}: .: {} f:name: {} f:value: {} k:{"name":"CNI_CONF_DIR"}: .: {} f:name: {} f:value: {} k:{"name":"KUBERNETES_SERVICE_HOST"}: .: {} f:name: {} f:value: {} k:{"name":"KUBERNETES_SERVICE_PORT"}: .: {} f:name: {} f:value: {} k:{"name":"NODENAME"}: .: {} f:name: {} f:valueFrom: .: {} f:fieldRef: {} k:{"name":"SLEEP"}: .: {} f:name: {} f:value: {} k:{"name":"WHEREABOUTS_NAMESPACE"}: .: {} f:name: {} f:value: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/whereabouts/config"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/host/etc/cni/net.d"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/host/opt/cni/bin"}: .: {} f:mountPath: {} f:name: {} k:{"name":"whereabouts-cni-bincopy"}: .: {} f:command: {} f:env: .: {} k:{"name":"DEFAULT_SOURCE_DIRECTORY"}: .: {} f:name: {} f:value: {} k:{"name":"RHEL8_SOURCE_DIRECTORY"}: .: {} f:name: {} f:value: {} k:{"name":"RHEL9_SOURCE_DIRECTORY"}: .: {} f:name: {} f:value: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/entrypoint"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/host/etc/os-release"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/host/opt/cni/bin"}: .: {} f:mountPath: {} f:name: {} f:nodeSelector: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"cni-binary-copy"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"cni-sysctl-allowlist"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"cnibin"}: .: {} f:hostPath: .: {} f:path: {} f:type: {} f:name: {} k:{"name":"multus-cni-dir"}: .: {} f:hostPath: .: {} f:path: {} f:type: {} f:name: {} k:{"name":"os-release"}: .: {} f:hostPath: .: {} f:path: {} f:type: {} f:name: {} k:{"name":"system-cni-dir"}: .: {} f:hostPath: .: {} f:path: {} f:type: {} f:name: {} k:{"name":"tuning-conf-dir"}: .: {} f:hostPath: .: {} f:path: {} f:type: {} f:name: {} k:{"name":"whereabouts-configmap"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} manager: kube-controller-manager operation: Update time: "2026-03-07T21:13:27Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:status: f:conditions: k:{"type":"ContainersReady"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Initialized"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"PodReadyToStartContainers"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Ready"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} f:containerStatuses: {} f:hostIP: {} f:hostIPs: {} f:initContainerStatuses: {} f:phase: {} f:podIP: {} f:podIPs: .: {} k:{"ip":"192.168.32.10"}: .: {} f:ip: {} f:startTime: {} manager: kubelet operation: Update subresource: status time: "2026-03-07T21:14:00Z" name: multus-additional-cni-plugins-xf7kg namespace: openshift-multus ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: DaemonSet name: multus-additional-cni-plugins uid: 85e6b862-0f32-4ff4-b853-ca55d0eeaf68 resourceVersion: "3364" uid: 3caff2c1-f178-4e16-916d-27ccf178ff37 spec: affinity: nodeAffinity: requiredDuringSchedulingIgnoredDuringExecution: nodeSelectorTerms: - matchFields: - key: metadata.name operator: In values: - master-0 containers: - args: - | trap : TERM INT; sleep infinity & wait command: - /bin/bash - -ec - -- image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:381e96959e3c3b08a3e2715e6024697ae14af31bd0378b49f583e984b3b9a192 imagePullPolicy: IfNotPresent name: kube-multus-additional-cni-plugins resources: requests: cpu: 10m memory: 10Mi securityContext: privileged: true terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-2j2bf readOnly: true dnsPolicy: ClusterFirst enableServiceLinks: true hostNetwork: true initContainers: - command: - /entrypoint/cnibincopy.sh env: - name: RHEL8_SOURCE_DIRECTORY value: /usr/src/egress-router-cni/rhel8/bin/ - name: RHEL9_SOURCE_DIRECTORY value: /usr/src/egress-router-cni/rhel9/bin/ - name: DEFAULT_SOURCE_DIRECTORY value: /usr/src/egress-router-cni/bin/ image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ac6f0695d3386e6d601f4ae507940981352fa3ad884b0fed6fb25698c5e6f916 imagePullPolicy: IfNotPresent name: egress-router-binary-copy resources: {} terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /entrypoint name: cni-binary-copy - mountPath: /host/opt/cni/bin name: cnibin - mountPath: /host/etc/os-release name: os-release readOnly: true - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-2j2bf readOnly: true - command: - /bin/bash - -c - /entrypoint/cnibincopy.sh && cp -n /sysctls/allowlist.conf /host/etc/cni/tuning/ env: - name: RHEL8_SOURCE_DIRECTORY value: /usr/src/plugins/rhel8/bin/ - name: RHEL9_SOURCE_DIRECTORY value: /usr/src/plugins/rhel9/bin/ - name: DEFAULT_SOURCE_DIRECTORY value: /usr/src/plugins/bin/ image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0c03cb25dc6f6a865529ebc979e8d7d08492b28fd3fb93beddf30e1cb06f1245 imagePullPolicy: IfNotPresent name: cni-plugins resources: {} terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /entrypoint name: cni-binary-copy - mountPath: /host/opt/cni/bin name: cnibin - mountPath: /host/etc/os-release name: os-release readOnly: true - mountPath: /host/etc/cni/tuning/ name: tuning-conf-dir - mountPath: /sysctls name: cni-sysctl-allowlist - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-2j2bf readOnly: true - command: - /entrypoint/cnibincopy.sh env: - name: RHEL8_SOURCE_DIRECTORY value: /bondcni/rhel8/ - name: RHEL9_SOURCE_DIRECTORY value: /bondcni/rhel9/ - name: DEFAULT_SOURCE_DIRECTORY value: /bondcni/rhel9/ image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ace4dcd008420277d915fe983b07bbb50fb3ab0673f28d0166424a75bc2137e7 imagePullPolicy: IfNotPresent name: bond-cni-plugin resources: {} terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /entrypoint name: cni-binary-copy - mountPath: /host/opt/cni/bin name: cnibin - mountPath: /host/etc/os-release name: os-release readOnly: true - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-2j2bf readOnly: true - command: - /entrypoint/cnibincopy.sh env: - name: RHEL8_SOURCE_DIRECTORY value: /usr/src/route-override/rhel8/bin/ - name: RHEL9_SOURCE_DIRECTORY value: /usr/src/route-override/rhel9/bin/ - name: DEFAULT_SOURCE_DIRECTORY value: /usr/src/route-override/bin/ image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8f0fda36e9a2040dbe0537361dcd73658df4e669d846f8101a8f9f29f0be9a7 imagePullPolicy: IfNotPresent name: routeoverride-cni resources: {} terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /entrypoint name: cni-binary-copy - mountPath: /host/opt/cni/bin name: cnibin - mountPath: /host/etc/os-release name: os-release readOnly: true - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-2j2bf readOnly: true - command: - /entrypoint/cnibincopy.sh env: - name: RHEL8_SOURCE_DIRECTORY value: /usr/src/whereabouts/rhel8/bin/ - name: RHEL9_SOURCE_DIRECTORY value: /usr/src/whereabouts/rhel9/bin/ - name: DEFAULT_SOURCE_DIRECTORY value: /usr/src/whereabouts/bin/ image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e207c762b7802ee0e54507d21ed1f25b19eddc511a4b824934c16c163193be6a imagePullPolicy: IfNotPresent name: whereabouts-cni-bincopy resources: requests: cpu: 10m memory: 10Mi terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /entrypoint name: cni-binary-copy - mountPath: /host/opt/cni/bin name: cnibin - mountPath: /host/etc/os-release name: os-release readOnly: true - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-2j2bf readOnly: true - command: - /bin/sh - -c - | #!/bin/sh set -u -e CNI_BIN_DIR=${CNI_BIN_DIR:-"/host/opt/cni/bin/"} WHEREABOUTS_KUBECONFIG_FILE_HOST=${WHEREABOUTS_KUBECONFIG_FILE_HOST:-"/etc/cni/net.d/whereabouts.d/whereabouts.kubeconfig"} CNI_CONF_DIR=${CNI_CONF_DIR:-"/host/etc/kubernetes/cni/net.d"} WHEREABOUTS_RECONCILER_CRON=${WHEREABOUTS_RECONCILER_CRON:-30 4 * * *} # Make a whereabouts.d directory (for our kubeconfig) mkdir -p $CNI_CONF_DIR/whereabouts.d WHEREABOUTS_KUBECONFIG=$CNI_CONF_DIR/whereabouts.d/whereabouts.kubeconfig WHEREABOUTS_CONF_FILE=$CNI_CONF_DIR/whereabouts.d/whereabouts.conf WHEREABOUTS_KUBECONFIG_LITERAL=$(echo "$WHEREABOUTS_KUBECONFIG" | sed -e s'|/host||') # Write the nodename to the whereabouts.d directory for standardized hostname reference across cloud providers echo $NODENAME > $CNI_CONF_DIR/whereabouts.d/nodename SERVICE_ACCOUNT_PATH=/var/run/secrets/kubernetes.io/serviceaccount KUBE_CA_FILE=${KUBE_CA_FILE:-$SERVICE_ACCOUNT_PATH/ca.crt} SERVICE_ACCOUNT_TOKEN=$(cat $SERVICE_ACCOUNT_PATH/token) SERVICE_ACCOUNT_TOKEN_PATH=$SERVICE_ACCOUNT_PATH/token SKIP_TLS_VERIFY=${SKIP_TLS_VERIFY:-false} function log() { echo "$(date -Iseconds) ${1}" } function error() { log "ERR: {$1}" } function warn() { log "WARN: {$1}" } function generateKubeConfig { # Check if we're running as a k8s pod. if [ -f "$SERVICE_ACCOUNT_PATH/token" ]; then # We're running as a k8d pod - expect some variables. if [ -z ${KUBERNETES_SERVICE_HOST} ]; then error "KUBERNETES_SERVICE_HOST not set"; exit 1; fi if [ -z ${KUBERNETES_SERVICE_PORT} ]; then error "KUBERNETES_SERVICE_PORT not set"; exit 1; fi if [ "$SKIP_TLS_VERIFY" == "true" ]; then TLS_CFG="insecure-skip-tls-verify: true" elif [ -f "$KUBE_CA_FILE" ]; then TLS_CFG="certificate-authority-data: $(cat $KUBE_CA_FILE | base64 | tr -d '\n')" fi # Kubernetes service address must be wrapped if it is IPv6 address KUBERNETES_SERVICE_HOST_WRAP=$KUBERNETES_SERVICE_HOST if [ "$KUBERNETES_SERVICE_HOST_WRAP" != "${KUBERNETES_SERVICE_HOST_WRAP#*:[0-9a-fA-F]}" ]; then KUBERNETES_SERVICE_HOST_WRAP=\[$KUBERNETES_SERVICE_HOST_WRAP\] fi # Write a kubeconfig file for the CNI plugin. Do this # to skip TLS verification for now. We should eventually support # writing more complete kubeconfig files. This is only used # if the provided CNI network config references it. touch $WHEREABOUTS_KUBECONFIG chmod ${KUBECONFIG_MODE:-600} $WHEREABOUTS_KUBECONFIG cat > $WHEREABOUTS_KUBECONFIG < $WHEREABOUTS_CONF_FILE <