-
Bug
-
Resolution: Done
-
Major
-
4.14.z, 4.15.z, 4.16.z
-
Incidents & Support
-
False
-
-
None
-
None
-
None
-
None
-
None
-
Hypershift Sprint 260, Hypershift Sprint 261, Hypershift Sprint 262, Hypershift Sprint 263
-
4
-
None
-
None
-
None
-
None
-
None
-
None
-
None
Jira created from https://github.com/openshift/hypershift/issues/3985
I filled this Jira with the info I've grabbed from the cases and the GH issue, so I didn't verify all is true.
Description of problem:
When adding API server certificate to the HostedCluster the bootstrap-kubeconfig is no longer trusted. This seems to be a issue when adding new nodes (using kubevirt) to the cluster. They dont register/show up on the HostedCluster.When not adding certificate to the apiServer the nodes register fine. This issue initially was solved by setting servicePublishingStrategy.loadBalancer.hostname to the apiServer's internal service URL, the certificate-authority-data in bootstrap-kubeconfig is then trusted. (https://github.com/openshift/hypershift/issues/3985#issuecomment-2097859446) After some time the issue was reopened: "We are experiencing issues using the apiserver internal service url at a later stage in our deployment.Ideally we would like to use the external apiserver fqdn in servicePublishingStrategy.loadBalancer.hostname. But adding apiserver certificate the bootstrap-kubeconfig is no longer trusted.Is there any way to modify the bootstrap-kubeconfig?I also found this issue that seems to be the same issue I am experiencing https://issues.redhat.com/browse/OCPBUGS-19067"
Version-Release number of selected component (if applicable):
4.14, 4.15, 4.16 (at least)
How reproducible:
Looks like always (day-0 or day-2)
Steps to Reproduce:
1. Create a HostedCluster with different serving certificate apiVersion: hypershift.openshift.io/v1beta1 kind: HostedCluster metadata: name: test namespace: test spec: configuration: apiServer: servingCerts: namedCertificates: - servingCertificate: name: tls-secret 2. The Bootstrap-kubconfig will not contain the new cert 3. The node deployment will not happen
Actual results:
Nodes cannot join the HCP Cluster with the failure: Unable to connect to the server: tls: failed to verify certificate: x509: certificate signed by unknown authority (possibly because of "crypto/rsa: verification error" while trying to verify candidate authority certificate "root-ca")
Expected results:
Nodes join the cluster and trust the new TLS certificate
Additional info:
- is related to
-
OCPBUGS-53261 Add validation to check that NamedCertificates and the Internal Certificate SAN does not have conflicting domains
-
- Closed
-
- links to