Bug 1782900 - OpenShift Cluster Version Operator doesn't correctly mount SSL certificates from host preventing cluster version update in MITM scenario
Summary: OpenShift Cluster Version Operator doesn't correctly mount SSL certificates f...
Keywords:
Status: CLOSED CURRENTRELEASE
Alias: None
Product: OpenShift Container Platform
Classification: Red Hat
Component: Documentation
Version: 4.3.0
Hardware: Unspecified
OS: Unspecified
high
high
Target Milestone: ---
: 4.3.0
Assignee: Kathryn Alexander
QA Contact: liujia
Vikram Goyal
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2019-12-12 15:43 UTC by Scott Dodson
Modified: 2020-04-13 15:30 UTC (History)
2 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2020-04-13 15:30:03 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)

Description Scott Dodson 2019-12-12 15:43:32 UTC
This bug was initially created as a copy of Bug #1773419

I am copying this bug because: We'd like to have release notes added which point to this as a known issue with a workaround of specifying an empty installer proxy config. This will be addressed in a later release as an enhancement.



Description of problem:
The "OpenShift Cluster Version Operator (CVO)" doesn't mount the ssl certificates from the host (masters) correctly. This means if you are using an MITM proxy checking for new cluster versions fails with: "x509: certificate signed by unknown authority"

I looked into it deeper and I realized that the CVO only mounts /etc/ssl/certs from the host, however the certificates are a symlink on the host: /etc/ssl/certs/ca-bundle.crt -> /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem

So it just ends up using the certificates bundled with the CVO, instead of any customized certificates from the host (master).

I updated the cluster-version-operator and also mounted in /etc/pki as readonly and then it could download version updates correctly.

How reproducible:

Prerequisites:
MITM internet via a transparent proxy (explicit proxy probably has the same problem)

Steps to Reproduce:
1. Prepare an env
2. In the install-config.yaml configure your MITM CA cert in "additionalTrustBundle"
3. In the "Proxy" config (can be done in the manifest before the cluster is deployed) ensure spec.trustedCA.name = "user-ca-bundle"
4. Version updates in the "Cluster Settings" part of the console will say that "Update Status" is "Failing" or "Failed" or something to that effect.

Actual results:

"Update Status" says Failed and it won't let you upgrade your cluster.

Expected results:

"Update Status" says "Up to date" or offers an upgrade.

Comment 4 Kathryn Alexander 2020-03-09 18:29:25 UTC
PR's here: https://github.com/openshift/openshift-docs/pull/20354

Jia Liu, will you please take a look?

Comment 6 Kathryn Alexander 2020-04-07 15:36:25 UTC
Jia approved this change on the PR, and I've merged it.


Note You need to log in before you can comment on or make changes to this bug.