--- apiVersion: v1 items: - apiVersion: v1 data: cnibincopy.sh: |- #!/bin/bash set -e function log() { echo "$(date --iso-8601=seconds) [cnibincopy] ${1}" } DESTINATION_DIRECTORY=/host/opt/cni/bin/ # Perform validation of usage if [ -z "$RHEL8_SOURCE_DIRECTORY" ] || [ -z "$RHEL9_SOURCE_DIRECTORY" ] || [ -z "$DEFAULT_SOURCE_DIRECTORY" ]; then log "FATAL ERROR: You must set env variables: RHEL8_SOURCE_DIRECTORY, RHEL9_SOURCE_DIRECTORY, DEFAULT_SOURCE_DIRECTORY" exit 1 fi if [ ! -d "$DESTINATION_DIRECTORY" ]; then log "FATAL ERROR: Destination directory ($DESTINATION_DIRECTORY) does not exist" exit 1 fi # Collect host OS information . /host/etc/os-release rhelmajor= # detect which version we're using in order to copy the proper binaries case "${ID}" in rhcos|scos) RHEL_VERSION=$(echo "${CPE_NAME}" | cut -f 5 -d :) rhelmajor=$(echo $RHEL_VERSION | sed -E 's/([0-9]+)\.{1}[0-9]+(\.[0-9]+)?/\1/') ;; rhel|centos) rhelmajor=$(echo "${VERSION_ID}" | cut -f 1 -d .) ;; fedora) if [ "${VARIANT_ID}" == "coreos" ]; then rhelmajor=8 else log "FATAL ERROR: Unsupported Fedora variant=${VARIANT_ID}" exit 1 fi ;; *) log "FATAL ERROR: Unsupported OS ID=${ID}"; exit 1 ;; esac # Set which directory we'll copy from, detect if it exists sourcedir= founddir=false case "${rhelmajor}" in 8) if [ -d "${RHEL8_SOURCE_DIRECTORY}" ]; then sourcedir=${RHEL8_SOURCE_DIRECTORY} founddir=true fi ;; 9) if [ -d "${RHEL9_SOURCE_DIRECTORY}" ]; then sourcedir=${RHEL9_SOURCE_DIRECTORY} founddir=true fi ;; *) log "ERROR: RHEL Major Version Unsupported, rhelmajor=${rhelmajor}" ;; esac # When it doesn't exist, fall back to the original directory. if [ "$founddir" == false ]; then log "Source directory unavailable for OS version: ${rhelmajor}" sourcedir=$DEFAULT_SOURCE_DIRECTORY fi # Use a subdirectory called "upgrade" so we can atomically move fully copied files. # We now use --remove-destination after running into an issue with -f not working over symlinks UPGRADE_DIRECTORY=${DESTINATION_DIRECTORY}upgrade_$(uuidgen) rm -Rf $UPGRADE_DIRECTORY mkdir -p $UPGRADE_DIRECTORY cp -r --remove-destination ${sourcedir}* $UPGRADE_DIRECTORY if [ $? -eq 0 ]; then log "Successfully copied files in ${sourcedir} to $UPGRADE_DIRECTORY" else log "Failed to copy files in ${sourcedir} to $UPGRADE_DIRECTORY" rm -Rf $UPGRADE_DIRECTORY exit 1 fi mv -f $UPGRADE_DIRECTORY/* ${DESTINATION_DIRECTORY}/ if [ $? -eq 0 ]; then log "Successfully moved files in $UPGRADE_DIRECTORY to ${DESTINATION_DIRECTORY}" else log "Failed to move files in $UPGRADE_DIRECTORY to ${DESTINATION_DIRECTORY}" rm -Rf $UPGRADE_DIRECTORY exit 1 fi rm -Rf $UPGRADE_DIRECTORY kind: ConfigMap metadata: annotations: kubernetes.io/description: | This is a script used to copy CNI binaries based on host OS release.openshift.io/version: 4.20.19 creationTimestamp: "2026-04-21T07:47:43Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:cnibincopy.sh: {} f:metadata: f:annotations: f:kubernetes.io/description: {} f:release.openshift.io/version: {} f:ownerReferences: k:{"uid":"b84e835c-f60f-4a7e-b2a9-26e5f343d532"}: {} manager: cluster-network-operator/operconfig operation: Apply time: "2026-04-21T07:47:43Z" name: cni-copy-resources namespace: openshift-multus ownerReferences: - apiVersion: operator.openshift.io/v1 blockOwnerDeletion: true controller: true kind: Network name: cluster uid: b84e835c-f60f-4a7e-b2a9-26e5f343d532 resourceVersion: "2223" uid: e6dfbfca-d898-4ef4-bb18-1a8df5a1b050 - apiVersion: v1 data: allowlist.conf: |- ^net.ipv4.conf.IFNAME.accept_redirects$ ^net.ipv4.conf.IFNAME.accept_source_route$ ^net.ipv4.conf.IFNAME.arp_accept$ ^net.ipv4.conf.IFNAME.arp_notify$ ^net.ipv4.conf.IFNAME.disable_policy$ ^net.ipv4.conf.IFNAME.secure_redirects$ ^net.ipv4.conf.IFNAME.send_redirects$ ^net.ipv6.conf.IFNAME.accept_ra$ ^net.ipv6.conf.IFNAME.accept_redirects$ ^net.ipv6.conf.IFNAME.accept_source_route$ ^net.ipv6.conf.IFNAME.arp_accept$ ^net.ipv6.conf.IFNAME.arp_notify$ ^net.ipv6.neigh.IFNAME.base_reachable_time_ms$ ^net.ipv6.neigh.IFNAME.retrans_time_ms$ kind: ConfigMap metadata: annotations: kubernetes.io/description: | Sysctl allowlist for nodes. release.openshift.io/version: 4.20.19 creationTimestamp: "2026-04-21T07:47:43Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:allowlist.conf: {} f:metadata: f:annotations: .: {} f:kubernetes.io/description: {} f:release.openshift.io/version: {} manager: network-operator operation: Update time: "2026-04-21T07:47:43Z" name: cni-sysctl-allowlist namespace: openshift-multus resourceVersion: "2221" uid: d8efe4c4-7f67-4c5c-99b0-b915fbadde68 - apiVersion: v1 data: allowlist.conf: |- ^net.ipv4.conf.IFNAME.accept_redirects$ ^net.ipv4.conf.IFNAME.accept_source_route$ ^net.ipv4.conf.IFNAME.arp_accept$ ^net.ipv4.conf.IFNAME.arp_notify$ ^net.ipv4.conf.IFNAME.disable_policy$ ^net.ipv4.conf.IFNAME.secure_redirects$ ^net.ipv4.conf.IFNAME.send_redirects$ ^net.ipv6.conf.IFNAME.accept_ra$ ^net.ipv6.conf.IFNAME.accept_redirects$ ^net.ipv6.conf.IFNAME.accept_source_route$ ^net.ipv6.conf.IFNAME.arp_accept$ ^net.ipv6.conf.IFNAME.arp_notify$ ^net.ipv6.neigh.IFNAME.base_reachable_time_ms$ ^net.ipv6.neigh.IFNAME.retrans_time_ms$ kind: ConfigMap metadata: annotations: kubernetes.io/description: | Sysctl allowlist for nodes. release.openshift.io/version: 4.20.19 creationTimestamp: "2026-04-21T07:47:43Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:allowlist.conf: {} f:metadata: f:annotations: f:kubernetes.io/description: {} f:release.openshift.io/version: {} f:ownerReferences: k:{"uid":"b84e835c-f60f-4a7e-b2a9-26e5f343d532"}: {} manager: cluster-network-operator/operconfig operation: Apply time: "2026-04-21T07:47:43Z" name: default-cni-sysctl-allowlist namespace: openshift-multus ownerReferences: - apiVersion: operator.openshift.io/v1 blockOwnerDeletion: true controller: true kind: Network name: cluster uid: b84e835c-f60f-4a7e-b2a9-26e5f343d532 resourceVersion: "2220" uid: 0a8b3c4a-4b5c-41d3-854f-5ba2f7c1caf1 - apiVersion: v1 data: ca.crt: | -----BEGIN CERTIFICATE----- MIIDPDCCAiSgAwIBAgIIbaZBdKyW+QYwDQYJKoZIhvcNAQELBQAwJjESMBAGA1UE CxMJb3BlbnNoaWZ0MRAwDgYDVQQDEwdyb290LWNhMB4XDTI2MDQyMTA3NDUzNloX DTM2MDQxODA3NDUzNlowJjESMBAGA1UECxMJb3BlbnNoaWZ0MRAwDgYDVQQDEwdy b290LWNhMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvYmofX7CWvOp k/MIZ/XbtWmb0QwGYC0JepxR0M3Uh1+CEAQY+QG82We8RCbGfzywfEFUXnQo4QTr o69naVGXJCP7jfjsIaO95KRbVUDOTYcyx/VqYbDcYTWqXwm4rAKRnx0TaWhAVGl2 o+en4qfnzKskTmaZtu0AUf48j0awgbwqYDLTNez6yVWm67gAQTa6PgKcJSYYDvDu 7ONzquzaBA4T4vu9qgUt4xKv3x9ftEolytyCvRgysYgjnMGohQZ+kO/BD+DlhF/J Jg/nkwX5nvhP4J6RncMUQot3Pip1FRJATpiX0GXbzrs+jJhcZHbxwZ6LzqymqFn8 x/bwEj/q6wIDAQABo24wbDAOBgNVHQ8BAf8EBAMCAqQwDwYDVR0TAQH/BAUwAwEB /zBJBgNVHQ4EQgRAfF8Ge7i7v0gY6oI0zNWVutXPpbVFhJTNEPcf7Lj8Q/gEbhs9 XxB9vUJauICMsK29HBHBxaIg+TaD6iA+ADMAyTANBgkqhkiG9w0BAQsFAAOCAQEA hYYOyd56Ha6x508Qzh98jg52ic29StwXe6OMnb90vRSFRUGtFQ8BvFEEQ9CKfrko WT8VWhV9N304KluhFGGsoHM24kEeVdAubev808arfI8ZGGQtRBVwqS/6jLDjWBHW WxeITdTpL30npqeOoU33Dbgg3/GqyNP6bBbzNvjDuCsQXoOX86YONCIP7yExnwsr XvRZTAknR2nDz80eUzPsdP59zV9xrIL40jtEddGxNPOXw3Wvwlqq5Q1hhVKjC8MN FiAvhvgDdtBAu/A/hlNxNBVfwds6T73mczE1UZp2Z0D2e5gLIHWJlS6zjWAhPI1I 1J2lueuvYROGEUXubpHp/A== -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- MIIEADCCAuigAwIBAgIIC1bVnet9rFAwDQYJKoZIhvcNAQELBQAwJjESMBAGA1UE CxMJb3BlbnNoaWZ0MRAwDgYDVQQDEwdyb290LWNhMB4XDTI2MDQyMTA3NDYwM1oX DTI3MDQyMTA3NDYwM1owMDESMBAGA1UEChMJb3BlbnNoaWZ0MRowGAYDVQQDExFv cGVuc2hpZnQtaW5ncmVzczCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEB AMislCM6OLsFHPBy+C0G8Lq66Luok7vXAXEsjR+SEXsTNqjUBsuZk/vmrsboi59u i6WHGEpXd2bv+Le917EXnz+/Md+AKT6AVJF0ildyYYRKs4LQJLCV+WfW7Rb4fr1c TQ/bL7ZKkJkETJHQw0fWprLKiWUoOJSOoi4O+cL3XzlGBhRGe0sdYmdIneihk6qL du9nPnqNmGhDmjd5VoJrrqpF2YjLakXWfUEfFkpkNrpae8BmaAvGQh+i1UuznnPM LFccFNdAO4giHZs4GIQZlazSr0zCejqpkVD/TOuwDa0+sS6xQRwGq319O0R/+MqK kvmRu62ydOX+08KLXzNqepECAwEAAaOCASYwggEiMA4GA1UdDwEB/wQEAwIFoDAd BgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDAYDVR0TAQH/BAIwADBJBgNV HQ4EQgRA+mHF06Wg6oYFnHHFuLnh5+uOUlQZp78RWD3GeQEOeitxgxClGLzKnGVA 5c2r5XoSgzwEjPsuLqsgmEPMTJ6t9TBLBgNVHSMERDBCgEB8XwZ7uLu/SBjqgjTM 1ZW61c+ltUWElM0Q9x/suPxD+ARuGz1fEH29Qlq4gIywrb0cEcHFoiD5NoPqID4A MwDJMEsGA1UdEQREMEKCQCouYXBwcy43YjAxOGFkNy0zM2M4LTRjZTgtYThjMS0y MTU2Nzk1MjBhOGYucHJvZC5rb25mbHV4ZWFhcy5jb20wDQYJKoZIhvcNAQELBQAD ggEBAJ++EgfoQzohEtPNQ5UxwBpN4aKrfTb8nNi49A4eg0AVhglQu0TGcS2CCUan 2JEByKUDyc0qxHeAOJJ7hBC41BSNAAw96fnyynEbsu5sKwXgD+gg/1Igc9WHF6iN 6bQcXkRMTrzBi+AsGsEiPrTQf78fZF0BeoKuZVQQKHN77jbui4PqYEreqTWz8bG8 VQSlQRp4cPgbtFtWoUbTTLmVaUfihGhTDZreEc9z2+6PImCDvJH1skzflORnZAnS Jr+gwK/LgrsYPZ/e8/2ZN/Yt/8wh+CYLpuCdS8TUVSv7so6t2Fa/YHFdECys5FKK 811y8CLfAIOSkyX6g6ZfGaSo0SE= -----END CERTIFICATE----- kind: ConfigMap metadata: annotations: kubernetes.io/description: Contains a CA bundle that can be used to verify the kube-apiserver when using internal endpoints such as the internal service IP or kubernetes.default.svc. No other usage is guaranteed across distributions of Kubernetes clusters. creationTimestamp: "2026-04-21T07:47:55Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:ca.crt: {} f:metadata: f:annotations: .: {} f:kubernetes.io/description: {} manager: kube-controller-manager operation: Update time: "2026-04-21T07:47:55Z" name: kube-root-ca.crt namespace: openshift-multus resourceVersion: "2560" uid: 07e36a6b-5c6d-4916-97a1-3d805da214c5 - apiVersion: v1 data: daemon-config.json: | { "cniVersion": "0.3.1", "chrootDir": "/hostroot", "logToStderr": true, "logLevel": "verbose", "binDir": "/var/lib/cni/bin", "perNodeCertificate": { "enabled": true, "bootstrapKubeconfig": "/var/lib/kubelet/kubeconfig", "certDir": "/etc/cni/multus/certs", "certDuration": "24h" }, "cniConfigDir": "/host/etc/cni/net.d", "multusConfigFile": "auto", "multusAutoconfigDir": "/host/run/multus/cni/net.d", "namespaceIsolation": true, "globalNamespaces": "default,openshift-multus,openshift-sriov-network-operator,openshift-cnv", "readinessindicatorfile": "/host/run/multus/cni/net.d/10-ovn-kubernetes.conf", "daemonSocketDir": "/run/multus/socket", "socketDir": "/host/run/multus/socket", "auxiliaryCNIChainName": "vendor-cni-chain" } kind: ConfigMap metadata: creationTimestamp: "2026-04-21T07:47:44Z" labels: app: multus tier: node managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:daemon-config.json: {} f:metadata: f:labels: f:app: {} f:tier: {} f:ownerReferences: k:{"uid":"b84e835c-f60f-4a7e-b2a9-26e5f343d532"}: {} manager: cluster-network-operator/operconfig operation: Apply time: "2026-04-21T07:47:44Z" name: multus-daemon-config namespace: openshift-multus ownerReferences: - apiVersion: operator.openshift.io/v1 blockOwnerDeletion: true controller: true kind: Network name: cluster uid: b84e835c-f60f-4a7e-b2a9-26e5f343d532 resourceVersion: "2226" uid: fc798990-4070-4ea6-8ff8-eb3fb6aef012 - apiVersion: v1 data: service-ca.crt: | -----BEGIN CERTIFICATE----- MIIDUTCCAjmgAwIBAgIIexEVixcb5VgwDQYJKoZIhvcNAQELBQAwNjE0MDIGA1UE Awwrb3BlbnNoaWZ0LXNlcnZpY2Utc2VydmluZy1zaWduZXJAMTc3Njc1ODAxOTAe Fw0yNjA0MjEwNzUzMzhaFw0yODA2MTkwNzUzMzlaMDYxNDAyBgNVBAMMK29wZW5z aGlmdC1zZXJ2aWNlLXNlcnZpbmctc2lnbmVyQDE3NzY3NTgwMTkwggEiMA0GCSqG SIb3DQEBAQUAA4IBDwAwggEKAoIBAQDe3OPgzBcAflAgUOT5W2wtGExhpkj9hudd 4GPrKoh7h0/0WZmmPqZCv1PfiHr77UdIhD3YnINkHU4qsc31WXyO8ApyLeUV5AfY k0T8YjPsEkVgj12P/arD8sPLnUsTBY86+oLErvvnoDKsWsV3OH0CRk+3fs27dSGI dssS0wodQxVRDAfqrD7tzB0T/kj63lkSV9lPWA68HfJZhKbWRnxWqbGxoYdhFdnn u2KNvr1/yJp8gIi2x4LrRMEP2/QpoOe7MoNzSMOqom9SqS3RVWSTYGKmbd78KRZu 6rhMR4zycN77kM5DbwOLUhjFUO/1mjYrwIN59XgSlbmII1v5FylXAgMBAAGjYzBh MA4GA1UdDwEB/wQEAwICpDAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBQFPi0J cLT+o28W4DsmoCBiDSGj7zAfBgNVHSMEGDAWgBQFPi0JcLT+o28W4DsmoCBiDSGj 7zANBgkqhkiG9w0BAQsFAAOCAQEAcAKS/H15Q2C0LRQJHtBqQLLxxm6imJP//tnS RmkkZUyVI9UARWtlD1xjKfN7A2nrZDMNksXhMsFlg0TEJlkxLSGKJsHUz+FqPpcS ob43gf7eV+KfjNCtiauszCuI43OR3krjVMl3WhQnPo0hJQD5s/mOg/hdghjKOYkP GT9mgIXmDzA3SIV9g25dG5OFm/BKZUylkgV5qu1sOaultAwoJTGN3ol5n8VN+XKN CLIzuz8Pvu92G+Cm8Ji07NFk8LpIod3fhEVM4Ue8fNWiQp0O68c3qksuPR2TJdM7 4HCqQxpI0bdH0BvnxOtxsNEgYQawAAFkel8Fv1RsJ0uw70HqCQ== -----END CERTIFICATE----- kind: ConfigMap metadata: annotations: service.beta.openshift.io/inject-cabundle: "true" creationTimestamp: "2026-04-21T07:47:54Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: {} f:metadata: f:annotations: .: {} f:service.beta.openshift.io/inject-cabundle: {} manager: kube-controller-manager operation: Update time: "2026-04-21T07:47:54Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:service-ca.crt: {} manager: service-ca-operator operation: Update time: "2026-04-21T07:53:51Z" name: openshift-service-ca.crt namespace: openshift-multus resourceVersion: "8108" uid: 7bbaf190-3f58-49c9-a1ca-35e3b072fbe3 - apiVersion: v1 data: whereabouts.conf: | { "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/etc/kubernetes/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "reconciler_cron_expression": "30 4 * * *", "log_level": "verbose", "configuration_path": "/etc/kubernetes/cni/net.d/whereabouts.d" } kind: ConfigMap metadata: creationTimestamp: "2026-04-21T07:47:43Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:whereabouts.conf: {} f:metadata: f:ownerReferences: k:{"uid":"b84e835c-f60f-4a7e-b2a9-26e5f343d532"}: {} manager: cluster-network-operator/operconfig operation: Apply time: "2026-04-21T07:47:43Z" name: whereabouts-flatfile-config namespace: openshift-multus ownerReferences: - apiVersion: operator.openshift.io/v1 blockOwnerDeletion: true controller: true kind: Network name: cluster uid: b84e835c-f60f-4a7e-b2a9-26e5f343d532 resourceVersion: "2225" uid: 1c7b657e-7865-4aa4-aaa6-fe077fea1776 kind: ConfigMapList metadata: resourceVersion: "11164"