Uploaded image for project: 'OpenShift Bugs'
  1. OpenShift Bugs
  2. OCPBUGS-41853

When adding API server certificate to the HostedCluster the bootstrap-kubeconfig is no longer trusted

XMLWordPrintable

    • Icon: Bug Bug
    • Resolution: Done
    • Icon: Major Major
    • 4.19.0
    • 4.14.z, 4.15.z, 4.16.z
    • HyperShift
    • Incidents & Support
    • False
    • Hide

      None

      Show
      None
    • None
    • None
    • None
    • None
    • None
    • Hypershift Sprint 260, Hypershift Sprint 261, Hypershift Sprint 262, Hypershift Sprint 263
    • 4
    • None
    • None
    • None
    • None
    • None
    • None
    • None

      Jira created from https://github.com/openshift/hypershift/issues/3985

      I filled this Jira with the info I've grabbed from the cases and the GH issue, so I didn't verify all is true.

      Description of problem:

      When adding API server certificate to the HostedCluster the bootstrap-kubeconfig is no longer trusted. This seems to be a issue when adding new nodes (using kubevirt) to the cluster. They dont register/show up on the HostedCluster.When not adding certificate to the apiServer the nodes register fine.
      
      This issue initially was solved by setting servicePublishingStrategy.loadBalancer.hostname to the apiServer's internal service URL, the certificate-authority-data in bootstrap-kubeconfig is then trusted. (https://github.com/openshift/hypershift/issues/3985#issuecomment-2097859446)
      
      After some time the issue was reopened:
      
      "We are experiencing issues using the apiserver internal service url at a later stage in our deployment.Ideally we would like to use the external apiserver fqdn in servicePublishingStrategy.loadBalancer.hostname. But adding apiserver certificate the bootstrap-kubeconfig is no longer trusted.Is there any way to modify the bootstrap-kubeconfig?I also found this issue that seems to be the same issue I am experiencing
      https://issues.redhat.com/browse/OCPBUGS-19067"

      Version-Release number of selected component (if applicable):

      4.14, 4.15, 4.16 (at least)

      How reproducible:

      Looks like always (day-0 or day-2)

      Steps to Reproduce:

      1. Create a HostedCluster with different serving certificate
      
      apiVersion: hypershift.openshift.io/v1beta1
      kind: HostedCluster
      metadata:
        name: test
        namespace: test
      spec:
        configuration:
          apiServer:
            servingCerts:
              namedCertificates:
              - servingCertificate:
                  name: tls-secret
      
      2. The Bootstrap-kubconfig will not contain the new cert
      3. The node deployment will not happen
          

      Actual results:

      Nodes cannot join the HCP Cluster with the failure:
      
      Unable to connect to the server: tls: failed to verify certificate: x509: certificate signed by unknown authority (possibly because of "crypto/rsa: verification error" while trying to verify candidate authority certificate "root-ca")
      

      Expected results:

      Nodes join the cluster and trust the new TLS certificate

      Additional info:

          

       

       

       

       

              jparrill@redhat.com Juan Manuel Parrilla Madrid
              jparrill@redhat.com Juan Manuel Parrilla Madrid
              Ayush Laxkar
              None
              Wen Wang Wen Wang
              None
              Votes:
              3 Vote for this issue
              Watchers:
              15 Start watching this issue

                Created:
                Updated:
                Resolved: