Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

✨ Add changes to clusteradm accept to disable csr update based on annotation on ManagedCluster #468

Conversation

jeffw17
Copy link
Contributor

@jeffw17 jeffw17 commented Jan 31, 2025

Summary

For AWSIRSA, we want to disable CSR update when running clusteradm accept command and we verify by checking the annotation on the managed cluster to see if it contains the ARN.

Related issue(s)

Fixes # 514

@openshift-ci openshift-ci bot requested review from itdove and qiujian16 January 31, 2025 17:13
@jeffw17 jeffw17 force-pushed the update-clusteradm-accept-aws-irsa branch 3 times, most recently from 59cddbf to dfbcabc Compare January 31, 2025 23:56
Copy link
Member

@mikeshng mikeshng left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I've added some nit comments, but my major concern is that it looks like anyone can just stamp the annotation on their managedcluster and bypass the CSR check. WDYT?

@jaswalkiranavtar Did we discuss this already and this is not a concern?

if err != nil {
return approved, fmt.Errorf("fail to approve the csr for cluster %s: %v", clusterName, err)
return false, fmt.Errorf("fail to get managed cluster")
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
return false, fmt.Errorf("fail to get managed cluster")
return false, fmt.Errorf("fail to get managedcluster %s: %v", clusterName, err")

more consistent with the previous error message.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yes, this is part of our design. This will work for only EKS based registration. If somebody is using default csr authentication, and they add these annotations, their registration won't complete. If they want to complete the registration with csr based authentication, they have to remove this annotation.

return approved, fmt.Errorf("fail to approve the csr for cluster %s: %v", clusterName, err)
}
} else {
approved = hasEksArn
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
approved = hasEksArn
approved = true

minor nit for readability.

@jaswalkiranavtar jaswalkiranavtar force-pushed the update-clusteradm-accept-aws-irsa branch from 66d424b to 7d04f3e Compare February 13, 2025 15:02
…ation on ManagedCluster

Signed-off-by: “Jeffrey <[email protected]>
Signed-off-by: Gaurav Jaswal <[email protected]>
@jaswalkiranavtar jaswalkiranavtar force-pushed the update-clusteradm-accept-aws-irsa branch from c69cd4f to 374da7c Compare February 13, 2025 15:04
return approved, fmt.Errorf("fail to approve the csr for cluster %s: %v", clusterName, err)
return false, fmt.Errorf("fail to get managedcluster %s: %v", clusterName, err)
}
_, hasEksArn := managedCluster.Annotations["agent.open-cluster-management.io/managed-cluster-arn"]
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

please add a comment here.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Done. Does it look ok? Will sign the commit tomorrow.

@qiujian16
Copy link
Member

/lgtm

@jaswalkiranavtar jaswalkiranavtar force-pushed the update-clusteradm-accept-aws-irsa branch from a79e25c to 3bd4b84 Compare February 20, 2025 19:15
@openshift-ci openshift-ci bot removed the lgtm label Feb 20, 2025
Copy link
Member

@mikeshng mikeshng left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/approve

@qiujian16
Copy link
Member

/approve

Copy link

openshift-ci bot commented Feb 21, 2025

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: jeffw17, mikeshng, qiujian16

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-merge-bot openshift-merge-bot bot merged commit 32f8ec8 into open-cluster-management-io:main Feb 21, 2025
9 checks passed
@jaswalkiranavtar jaswalkiranavtar deleted the update-clusteradm-accept-aws-irsa branch March 20, 2025 13:56
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants