--- apiVersion: v1 items: - apiVersion: v1 data: cnibincopy.sh: |- #!/bin/bash set -e function log() { echo "$(date --iso-8601=seconds) [cnibincopy] ${1}" } DESTINATION_DIRECTORY=/host/opt/cni/bin/ # Perform validation of usage if [ -z "$RHEL8_SOURCE_DIRECTORY" ] || [ -z "$RHEL9_SOURCE_DIRECTORY" ] || [ -z "$DEFAULT_SOURCE_DIRECTORY" ]; then log "FATAL ERROR: You must set env variables: RHEL8_SOURCE_DIRECTORY, RHEL9_SOURCE_DIRECTORY, DEFAULT_SOURCE_DIRECTORY" exit 1 fi if [ ! -d "$DESTINATION_DIRECTORY" ]; then log "FATAL ERROR: Destination directory ($DESTINATION_DIRECTORY) does not exist" exit 1 fi # Collect host OS information . /host/etc/os-release rhelmajor= # detect which version we're using in order to copy the proper binaries case "${ID}" in rhcos|scos) RHEL_VERSION=$(echo "${CPE_NAME}" | cut -f 5 -d :) rhelmajor=$(echo $RHEL_VERSION | sed -E 's/([0-9]+)\.{1}[0-9]+(\.[0-9]+)?/\1/') ;; rhel|centos) rhelmajor=$(echo "${VERSION_ID}" | cut -f 1 -d .) ;; fedora) if [ "${VARIANT_ID}" == "coreos" ]; then rhelmajor=8 else log "FATAL ERROR: Unsupported Fedora variant=${VARIANT_ID}" exit 1 fi ;; *) log "FATAL ERROR: Unsupported OS ID=${ID}"; exit 1 ;; esac # Set which directory we'll copy from, detect if it exists sourcedir= founddir=false case "${rhelmajor}" in 8) if [ -d "${RHEL8_SOURCE_DIRECTORY}" ]; then sourcedir=${RHEL8_SOURCE_DIRECTORY} founddir=true fi ;; 9) if [ -d "${RHEL9_SOURCE_DIRECTORY}" ]; then sourcedir=${RHEL9_SOURCE_DIRECTORY} founddir=true fi ;; *) log "ERROR: RHEL Major Version Unsupported, rhelmajor=${rhelmajor}" ;; esac # When it doesn't exist, fall back to the original directory. if [ "$founddir" == false ]; then log "Source directory unavailable for OS version: ${rhelmajor}" sourcedir=$DEFAULT_SOURCE_DIRECTORY fi # Use a subdirectory called "upgrade" so we can atomically move fully copied files. # We now use --remove-destination after running into an issue with -f not working over symlinks UPGRADE_DIRECTORY=${DESTINATION_DIRECTORY}upgrade_$(uuidgen) rm -Rf $UPGRADE_DIRECTORY mkdir -p $UPGRADE_DIRECTORY cp -r --remove-destination ${sourcedir}* $UPGRADE_DIRECTORY if [ $? -eq 0 ]; then log "Successfully copied files in ${sourcedir} to $UPGRADE_DIRECTORY" else log "Failed to copy files in ${sourcedir} to $UPGRADE_DIRECTORY" rm -Rf $UPGRADE_DIRECTORY exit 1 fi mv -f $UPGRADE_DIRECTORY/* ${DESTINATION_DIRECTORY}/ if [ $? -eq 0 ]; then log "Successfully moved files in $UPGRADE_DIRECTORY to ${DESTINATION_DIRECTORY}" else log "Failed to move files in $UPGRADE_DIRECTORY to ${DESTINATION_DIRECTORY}" rm -Rf $UPGRADE_DIRECTORY exit 1 fi rm -Rf $UPGRADE_DIRECTORY kind: ConfigMap metadata: annotations: kubernetes.io/description: | This is a script used to copy CNI binaries based on host OS release.openshift.io/version: 4.20.19 creationTimestamp: "2026-04-20T09:58:21Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:cnibincopy.sh: {} f:metadata: f:annotations: f:kubernetes.io/description: {} f:release.openshift.io/version: {} f:ownerReferences: k:{"uid":"cea41e71-aad9-434c-9d35-5c7e485f2976"}: {} manager: cluster-network-operator/operconfig operation: Apply time: "2026-04-20T09:58:21Z" name: cni-copy-resources namespace: openshift-multus ownerReferences: - apiVersion: operator.openshift.io/v1 blockOwnerDeletion: true controller: true kind: Network name: cluster uid: cea41e71-aad9-434c-9d35-5c7e485f2976 resourceVersion: "2815" uid: 3fee7dd9-2712-49f9-951d-77137e9010ac - apiVersion: v1 data: allowlist.conf: |- ^net.ipv4.conf.IFNAME.accept_redirects$ ^net.ipv4.conf.IFNAME.accept_source_route$ ^net.ipv4.conf.IFNAME.arp_accept$ ^net.ipv4.conf.IFNAME.arp_notify$ ^net.ipv4.conf.IFNAME.disable_policy$ ^net.ipv4.conf.IFNAME.secure_redirects$ ^net.ipv4.conf.IFNAME.send_redirects$ ^net.ipv6.conf.IFNAME.accept_ra$ ^net.ipv6.conf.IFNAME.accept_redirects$ ^net.ipv6.conf.IFNAME.accept_source_route$ ^net.ipv6.conf.IFNAME.arp_accept$ ^net.ipv6.conf.IFNAME.arp_notify$ ^net.ipv6.neigh.IFNAME.base_reachable_time_ms$ ^net.ipv6.neigh.IFNAME.retrans_time_ms$ kind: ConfigMap metadata: annotations: kubernetes.io/description: | Sysctl allowlist for nodes. release.openshift.io/version: 4.20.19 creationTimestamp: "2026-04-20T09:58:21Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:allowlist.conf: {} f:metadata: f:annotations: .: {} f:kubernetes.io/description: {} f:release.openshift.io/version: {} manager: network-operator operation: Update time: "2026-04-20T09:58:21Z" name: cni-sysctl-allowlist namespace: openshift-multus resourceVersion: "2770" uid: d2f2875b-e993-44ee-9bbc-f67ff0023924 - apiVersion: v1 data: allowlist.conf: |- ^net.ipv4.conf.IFNAME.accept_redirects$ ^net.ipv4.conf.IFNAME.accept_source_route$ ^net.ipv4.conf.IFNAME.arp_accept$ ^net.ipv4.conf.IFNAME.arp_notify$ ^net.ipv4.conf.IFNAME.disable_policy$ ^net.ipv4.conf.IFNAME.secure_redirects$ ^net.ipv4.conf.IFNAME.send_redirects$ ^net.ipv6.conf.IFNAME.accept_ra$ ^net.ipv6.conf.IFNAME.accept_redirects$ ^net.ipv6.conf.IFNAME.accept_source_route$ ^net.ipv6.conf.IFNAME.arp_accept$ ^net.ipv6.conf.IFNAME.arp_notify$ ^net.ipv6.neigh.IFNAME.base_reachable_time_ms$ ^net.ipv6.neigh.IFNAME.retrans_time_ms$ kind: ConfigMap metadata: annotations: kubernetes.io/description: | Sysctl allowlist for nodes. release.openshift.io/version: 4.20.19 creationTimestamp: "2026-04-20T09:58:21Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:allowlist.conf: {} f:metadata: f:annotations: f:kubernetes.io/description: {} f:release.openshift.io/version: {} f:ownerReferences: k:{"uid":"cea41e71-aad9-434c-9d35-5c7e485f2976"}: {} manager: cluster-network-operator/operconfig operation: Apply time: "2026-04-20T09:58:21Z" name: default-cni-sysctl-allowlist namespace: openshift-multus ownerReferences: - apiVersion: operator.openshift.io/v1 blockOwnerDeletion: true controller: true kind: Network name: cluster uid: cea41e71-aad9-434c-9d35-5c7e485f2976 resourceVersion: "2769" uid: 42b526bd-723e-4948-9b44-f81060efd60b - apiVersion: v1 data: ca.crt: | -----BEGIN CERTIFICATE----- MIIDPDCCAiSgAwIBAgIIAMa0GbqKITUwDQYJKoZIhvcNAQELBQAwJjESMBAGA1UE CxMJb3BlbnNoaWZ0MRAwDgYDVQQDEwdyb290LWNhMB4XDTI2MDQyMDA5NTU1MloX DTM2MDQxNzA5NTU1MlowJjESMBAGA1UECxMJb3BlbnNoaWZ0MRAwDgYDVQQDEwdy b290LWNhMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAqaRo7AeYUcPz wRcv8QvUZK3pbuwFBP7BmN7ohjV6WCnseWmfAyj04Q6eWpE/3PmpuHidrpvye7A8 lD68Wf0ejVomgCg8oley2UwiPxKeAaFUh5ZxojNqev/4Hb0OoI2EhGlAk/83Qb/1 v1t0F47d5jTZY6tAhiMLjTfoU+dCRvSObv/EAeHYZPCBmxNzd24PIM2SwOGKl0AA L67CUXmqYgdaAUeVrggMSW1Yp65aJNFX5LMMXHz1F1v93aHlAQTpDeXz4NFnBvyI K4+dm1V2dsrPjVvwysirIbA7PlW1SJDplp2Yx4297IGCeTqLWo0iC/wcfat6EZCj 7zyRQKVOmwIDAQABo24wbDAOBgNVHQ8BAf8EBAMCAqQwDwYDVR0TAQH/BAUwAwEB /zBJBgNVHQ4EQgRALWvOj/7DBxgYCKmmuY2LRJjcbt0PWS2gUOrUGIBQU6h1XWxW uFjNc7I9gMbi2Ru7XumlYgFv8SQeaVNFvd++wzANBgkqhkiG9w0BAQsFAAOCAQEA RjvranzPICZeIXlYtXdepbWlgiaJiC/BkzuzwLpX1+0mGin58pHd3q1BhgWEBWAw w9BplS52ATR5QOGbDSixOxIv9spoKwzAl31UJLjbSZJ6T45Y2d3yGSWqeQduol7E KKR6p6C2rhDkhS2hFSQ43WZthc0X1wyNymtEZ5gIsOpBm8X9a0GwRTg1vtGgSQyY osg6jCqFK/HJZ4vEPDjrT0URDaeHs1ygzupGMnAkB5wmSg3u/4uRgzuUxKjzqcks mUT8KBJajXIboNoUVe45GpE/O/Z5Fcs1A2HYx/QyXW5QdXBJdxicp/7s5LCXRnkD BJlxWTO18q+ipC+4q6e4aQ== -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- MIIEADCCAuigAwIBAgIIVbSj9Ttoew4wDQYJKoZIhvcNAQELBQAwJjESMBAGA1UE CxMJb3BlbnNoaWZ0MRAwDgYDVQQDEwdyb290LWNhMB4XDTI2MDQyMDA5NTYzMFoX DTI3MDQyMDA5NTYzMFowMDESMBAGA1UEChMJb3BlbnNoaWZ0MRowGAYDVQQDExFv cGVuc2hpZnQtaW5ncmVzczCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEB ALmsPCs/ZbfwQKQSBOIf4mBpJeS6XnZSy1apjKqPI+iBmP5+QYLLFrNVICgdWasi CjnuaKR5yh+h0WN0N+kqE7HgDfrG1bTWCFHozsJQosnkf4+NzWDJXCY2Y+CZ/Co2 JkLo+VUzf22OUG57V/wPkYn0IlYpkXQf+rCphYYiqa8V2R5hgcp6odAbKCYdsF4f VePMl0RETqAfImjRhaWw8n9CIH6/1ZNR/CXQIawOpK7WXkLW0aHID0LlheiPIqid 37PYjVt5nRaVqjiMHZLYHiEmPubbojR8hOoEANkooGeaz4Xfft3bZeqwf3Bhi5VR HVOQfGRrrDMHhQnFUVz8q+UCAwEAAaOCASYwggEiMA4GA1UdDwEB/wQEAwIFoDAd BgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDAYDVR0TAQH/BAIwADBJBgNV HQ4EQgRAzdY7eErLNENoPSqUuBiVFIgBAy/HrGUen3pHR3ksfAHruNSfjUlIwVaO bnqqTYGen6XXaHwVpWoY7Z/x56FP9zBLBgNVHSMERDBCgEAta86P/sMHGBgIqaa5 jYtEmNxu3Q9ZLaBQ6tQYgFBTqHVdbFa4WM1zsj2AxuLZG7te6aViAW/xJB5pU0W9 377DMEsGA1UdEQREMEKCQCouYXBwcy5lNTYwOTliMi1lYjhjLTQxODAtODFjNi1h MWY0ZGQ1NzA0NTkucHJvZC5rb25mbHV4ZWFhcy5jb20wDQYJKoZIhvcNAQELBQAD ggEBABz+E/IExLNYQtCe2XurnBoNHJc8/ii+9a0l2GH0RUe2oNl8gGuPlQvl2YjW o0QGXsbrHisDOBDolxRqw+8Ln8nQKlRNVT41JehUhuyPtKFPTLyuXKG+j4qkq0C7 xkTKNIveHOusRMWjtzmqzscP0VhFJBGUmDrZVqdvo9xrO0JFc3i4/7hPTSxQfM2X K7yd13ZjJo2Mbe4DptlP1YSIxHLXYRCGK8A6IfGzAZnBQsa9USs99QnoibAoeHL4 Z3MtMhCfTOwK6nQcVOnd8bcSlVmZFqYmcUfawiobHsQRQQrHmIrx5jui81vZSFJ3 yARWE4ZEVlvZ/ZZbu+R1KTWKQ/E= -----END CERTIFICATE----- kind: ConfigMap metadata: annotations: kubernetes.io/description: Contains a CA bundle that can be used to verify the kube-apiserver when using internal endpoints such as the internal service IP or kubernetes.default.svc. No other usage is guaranteed across distributions of Kubernetes clusters. creationTimestamp: "2026-04-20T09:58:18Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:ca.crt: {} f:metadata: f:annotations: .: {} f:kubernetes.io/description: {} manager: kube-controller-manager operation: Update time: "2026-04-20T09:59:08Z" name: kube-root-ca.crt namespace: openshift-multus resourceVersion: "4540" uid: d6769e2a-04fa-466f-907c-d08b7502301f - apiVersion: v1 data: daemon-config.json: | { "cniVersion": "0.3.1", "chrootDir": "/hostroot", "logToStderr": true, "logLevel": "verbose", "binDir": "/var/lib/cni/bin", "perNodeCertificate": { "enabled": true, "bootstrapKubeconfig": "/var/lib/kubelet/kubeconfig", "certDir": "/etc/cni/multus/certs", "certDuration": "24h" }, "cniConfigDir": "/host/etc/cni/net.d", "multusConfigFile": "auto", "multusAutoconfigDir": "/host/run/multus/cni/net.d", "namespaceIsolation": true, "globalNamespaces": "default,openshift-multus,openshift-sriov-network-operator,openshift-cnv", "readinessindicatorfile": "/host/run/multus/cni/net.d/10-ovn-kubernetes.conf", "daemonSocketDir": "/run/multus/socket", "socketDir": "/host/run/multus/socket", "auxiliaryCNIChainName": "vendor-cni-chain" } kind: ConfigMap metadata: creationTimestamp: "2026-04-20T09:58:22Z" labels: app: multus tier: node managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:daemon-config.json: {} f:metadata: f:labels: f:app: {} f:tier: {} f:ownerReferences: k:{"uid":"cea41e71-aad9-434c-9d35-5c7e485f2976"}: {} manager: cluster-network-operator/operconfig operation: Apply time: "2026-04-20T09:58:22Z" name: multus-daemon-config namespace: openshift-multus ownerReferences: - apiVersion: operator.openshift.io/v1 blockOwnerDeletion: true controller: true kind: Network name: cluster uid: cea41e71-aad9-434c-9d35-5c7e485f2976 resourceVersion: "3008" uid: a25f7478-3b47-4e5e-96fb-efa5d938df8f - apiVersion: v1 data: service-ca.crt: | -----BEGIN CERTIFICATE----- MIIDUTCCAjmgAwIBAgIIVMRto7VB0DwwDQYJKoZIhvcNAQELBQAwNjE0MDIGA1UE Awwrb3BlbnNoaWZ0LXNlcnZpY2Utc2VydmluZy1zaWduZXJAMTc3NjY3OTMxOTAe Fw0yNjA0MjAxMDAxNTlaFw0yODA2MTgxMDAyMDBaMDYxNDAyBgNVBAMMK29wZW5z aGlmdC1zZXJ2aWNlLXNlcnZpbmctc2lnbmVyQDE3NzY2NzkzMTkwggEiMA0GCSqG SIb3DQEBAQUAA4IBDwAwggEKAoIBAQDNfh5W46Rkt/YVQ2PSxX7kUKbtngMBTY2z YZAtf4x5lX3fR7H+bW6R7dU+LzM2WLg8I6QgJBoMARWO7daACC7YSqMGiIpli4+e k8mMM4v2DhU66EIRIZVFqA3Mvo1R5s3DronysQGgI4xKYkg+cXIE+oKiYAbulcAQ BR19ujGCN0fd6I3RKdm1mPfUcmK3itf02/gM6PQLBMY4GJ8agCywzEKMVQBQel3x 5SmOYoE+x4CyQzq/ytkmVwaWZI5Ic2hKjwD9PnVTrMa1amNeeZw7Xtb5Z6vXECTL sxAAbcKo2TBwpRY3DXsMxS4tKNd9t7A5QE2Ow99eznSjY4+7h5snAgMBAAGjYzBh MA4GA1UdDwEB/wQEAwICpDAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBSzA2bN t1ZT4vN3kqe7xwmX8kbinjAfBgNVHSMEGDAWgBSzA2bNt1ZT4vN3kqe7xwmX8kbi njANBgkqhkiG9w0BAQsFAAOCAQEAGVPDmLAqDUWRZn1uBV9enEXdhmvE71zEXH64 AwsmijuICNppLzJu2NGJsG9mugmzciTVysh+nsXCwoySEnEAX7oJExI6GwdQzlRO stdrljlXNrgTaIuMezOnZgpcwP6hvJ8n0+eIc9UaoumaG9igrs1nxLYdmBmoAMiN 6bY/b89/cmkHGf7YFcNs88+FqZPIUsigxnz1NitQcyDLzxTWS2AGrNq4xheLD0J/ 3tH1bUq8RjdVdzSN+lpj0G/Ux6AMXyQnEYBb8XvD63f5g2PB5ASIzPZdV2smiz8I iEzH000FAk1d6e2GNsK/XVyQL9RgsV+SZkUCXHF1zgrGtGc4Og== -----END CERTIFICATE----- kind: ConfigMap metadata: annotations: service.beta.openshift.io/inject-cabundle: "true" creationTimestamp: "2026-04-20T09:58:18Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: {} f:metadata: f:annotations: .: {} f:service.beta.openshift.io/inject-cabundle: {} manager: kube-controller-manager operation: Update time: "2026-04-20T09:58:18Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:service-ca.crt: {} manager: service-ca-operator operation: Update time: "2026-04-20T10:02:13Z" name: openshift-service-ca.crt namespace: openshift-multus resourceVersion: "7695" uid: 311dec20-aa78-4a17-990f-895d2ee7ee98 - apiVersion: v1 data: whereabouts.conf: | { "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/etc/kubernetes/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "reconciler_cron_expression": "30 4 * * *", "log_level": "verbose", "configuration_path": "/etc/kubernetes/cni/net.d/whereabouts.d" } kind: ConfigMap metadata: creationTimestamp: "2026-04-20T09:58:21Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:whereabouts.conf: {} f:metadata: f:ownerReferences: k:{"uid":"cea41e71-aad9-434c-9d35-5c7e485f2976"}: {} manager: cluster-network-operator/operconfig operation: Apply time: "2026-04-20T09:58:21Z" name: whereabouts-flatfile-config namespace: openshift-multus ownerReferences: - apiVersion: operator.openshift.io/v1 blockOwnerDeletion: true controller: true kind: Network name: cluster uid: cea41e71-aad9-434c-9d35-5c7e485f2976 resourceVersion: "2918" uid: 000f44b8-b71e-441b-a5c3-69d665d4235c kind: ConfigMapList metadata: resourceVersion: "23727"