• Icon: Story Story
    • Resolution: Done
    • Icon: Normal Normal
    • WMCO 9.0.0
    • None
    • None
    • 3
    • False
    • None
    • False
    • WINC - Sprint 236

      Description

      This story covers creating and using a kubeconfig from the WICD SA to authenticate with the API server. This is preferred over the current method of passing in the CA cert and token as command line args to the WICD binary.

      Engineering Details

      Example kubeconfig object: WMCO bootstrap kubeconfig

      Acceptance Criteria

      • The CA cert and token credentials are no longer passed into the WICD binary when running any of its commands.
      • WICD maintains proper RBAC and existing functionality

            [WINC-948] WICD uses a kubeconfig to authenticate

            Since the problem described in this issue should be resolved in a recent advisory, it has been closed.

            For information on the advisory (Important: Red Hat OpenShift for Windows Containers 7.2.0 security update), and where to find the updated files, follow the link below.

            If the solution does not work for you, open a new bug report.
            https://access.redhat.com/errata/RHSA-2023:7710

            Errata Tool added a comment - Since the problem described in this issue should be resolved in a recent advisory, it has been closed. For information on the advisory (Important: Red Hat OpenShift for Windows Containers 7.2.0 security update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2023:7710

            Errata Tool added a comment -

            Since the problem described in this issue should be resolved in a recent advisory, it has been closed.

            For information on the advisory (Important: Red Hat OpenShift for Windows Containers 9.0.0 security update), and where to find the updated files, follow the link below.

            If the solution does not work for you, open a new bug report.
            https://access.redhat.com/errata/RHSA-2023:7515

            Errata Tool added a comment - Since the problem described in this issue should be resolved in a recent advisory, it has been closed. For information on the advisory (Important: Red Hat OpenShift for Windows Containers 9.0.0 security update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2023:7515

            CPaaS Service Account mentioned this issue in a merge request of openshift-winc-midstream / openshift-winc-midstream on branch rhaos-4.12-rhel-8_upstream_51197bb369ca61dcfcec3f9f78a275f1:

            Updated US source to: cc7d7b2 Merge pull request #1754 from openshift-cherrypick-robot/cherry-pick-1625-to-release-4.12

            GitLab CEE Bot added a comment - CPaaS Service Account mentioned this issue in a merge request of openshift-winc-midstream / openshift-winc-midstream on branch rhaos-4.12-rhel-8_ upstream _51197bb369ca61dcfcec3f9f78a275f1 : Updated US source to: cc7d7b2 Merge pull request #1754 from openshift-cherrypick-robot/cherry-pick-1625-to-release-4.12

            CPaaS Service Account mentioned this issue in a merge request of openshift-winc-midstream / openshift-winc-midstream on branch rhaos-4.12-rhel-8_upstream_582af25cb023967effd2c7ff9d3d33b3:

            Updated US source to: e41f98f Merge pull request #1759 from alinaryan/revert-ff94280

            GitLab CEE Bot added a comment - CPaaS Service Account mentioned this issue in a merge request of openshift-winc-midstream / openshift-winc-midstream on branch rhaos-4.12-rhel-8_ upstream _582af25cb023967effd2c7ff9d3d33b3 : Updated US source to: e41f98f Merge pull request #1759 from alinaryan/revert-ff94280

            CPaaS Service Account mentioned this issue in a merge request of openshift-winc-midstream / openshift-winc-midstream on branch rhaos-4.13-rhel-9_upstream_049fb4e6dd1906a911b753fcff8d7e4d:

            Updated US source to: ed551d0 Merge pull request #1609 from openshift-cherrypick-robot/cherry-pick-1602-to-release-4.13

            GitLab CEE Bot added a comment - CPaaS Service Account mentioned this issue in a merge request of openshift-winc-midstream / openshift-winc-midstream on branch rhaos-4.13-rhel-9_ upstream _049fb4e6dd1906a911b753fcff8d7e4d : Updated US source to: ed551d0 Merge pull request #1609 from openshift-cherrypick-robot/cherry-pick-1602-to-release-4.13

            CPaaS Service Account mentioned this issue in a merge request of openshift-winc-midstream / openshift-winc-midstream on branch rhaos-4.14-rhel-9_upstream_d8fbf7d6c4f418d9794868c521e32283:

            Updated US source to: 5159cb1 Merge pull request #1516 from sebsoto/wicdKubeconfig

            GitLab CEE Bot added a comment - CPaaS Service Account mentioned this issue in a merge request of openshift-winc-midstream / openshift-winc-midstream on branch rhaos-4.14-rhel-9_ upstream _d8fbf7d6c4f418d9794868c521e32283 : Updated US source to: 5159cb1 Merge pull request #1516 from sebsoto/wicdKubeconfig

            This story does not have either `qe` or `no-qe` labels. Please add the appropriate label to ensure QE Tracker tasks are created at the completion of this story.

            OpenShift Jira Bot added a comment - This story does not have either `qe` or `no-qe` labels. Please add the appropriate label to ensure QE Tracker tasks are created at the completion of this story.

            Still relevant

            Mohammad Shaikh (Inactive) added a comment - Still relevant

              rh-ee-ssoto Sebastian Soto
              mohashai Mohammad Shaikh (Inactive)
              Votes:
              0 Vote for this issue
              Watchers:
              4 Start watching this issue

                Created:
                Updated:
                Resolved: