OpenShiftControllerManagerConfig: add serviceAccountSigningPublicKeyFile
OCM needs access to the service account bound API token signing public key. On standalone, the crypto materials are available in a secret. On Hypershift, the secret is not made available to the hosted clusters. KCM has a similar requirement, which hypershift satisfies by projecting the secret into a volume on the KCM pod and then specifying the appropriate file name via a cli parameter. OCM is completey configured via a config file. This PR adds the serviceAccountSigningPublicKeyFile field to the OCM config file.
Hello @sanchezl! Some important instructions when contributing to openshift/api: API design plays an important part in the user experience of OpenShift and as such API PRs are subject to a high level of scrutiny to ensure they follow our best practices. If you haven't already done so, please review the OpenShift API Conventions and ensure that your proposed changes are compliant. Following these conventions will help expedite the api review process for your PR.
[APPROVALNOTIFIER] This PR is NOT APPROVED
This pull-request has been approved by: sanchezl Once this PR has been reviewed and has the lgtm label, please assign knobunc for approval. For more information see the Kubernetes Code Review Process.
The full list of commands accepted by this bot can be found here.
Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment
@sanchezl: The following tests failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:
| Test name | Commit | Details | Required | Rerun command |
|---|---|---|---|---|
| ci/prow/e2e-aws-ovn-techpreview | dbc13210e94687b4403f68a326214c9c7feefb9c | link | true | /test e2e-aws-ovn-techpreview |
| ci/prow/e2e-aws-serial | dbc13210e94687b4403f68a326214c9c7feefb9c | link | true | /test e2e-aws-serial |
| ci/prow/e2e-upgrade-minor | dbc13210e94687b4403f68a326214c9c7feefb9c | link | true | /test e2e-upgrade-minor |
| ci/prow/e2e-aws-serial-techpreview | dbc13210e94687b4403f68a326214c9c7feefb9c | link | true | /test e2e-aws-serial-techpreview |
| ci/prow/e2e-aws-ovn-hypershift | dbc13210e94687b4403f68a326214c9c7feefb9c | link | true | /test e2e-aws-ovn-hypershift |
| ci/prow/e2e-upgrade | dbc13210e94687b4403f68a326214c9c7feefb9c | link | true | /test e2e-upgrade |
| ci/prow/e2e-aws-ovn | dbc13210e94687b4403f68a326214c9c7feefb9c | link | true | /test e2e-aws-ovn |
Full PR test history. Your PR dashboard.
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.
Issues go stale after 90d of inactivity.
Mark the issue as fresh by commenting /remove-lifecycle stale.
Stale issues rot after an additional 30d of inactivity and eventually close.
Exclude this issue from closing by commenting /lifecycle frozen.
If this issue is safe to close now please do so with /close.
/lifecycle stale
Stale issues rot after 30d of inactivity.
Mark the issue as fresh by commenting /remove-lifecycle rotten.
Rotten issues close after an additional 30d of inactivity.
Exclude this issue from closing by commenting /lifecycle frozen.
If this issue is safe to close now please do so with /close.
/lifecycle rotten /remove-lifecycle stale
Rotten issues close after 30d of inactivity.
Reopen the issue by commenting /reopen.
Mark the issue as fresh by commenting /remove-lifecycle rotten.
Exclude this issue from closing again by commenting /lifecycle frozen.
/close
@openshift-bot: Closed this PR.
In response to this:
Rotten issues close after 30d of inactivity.
Reopen the issue by commenting
/reopen. Mark the issue as fresh by commenting/remove-lifecycle rotten. Exclude this issue from closing again by commenting/lifecycle frozen./close
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.