--- apiVersion: v1 items: - apiVersion: v1 data: cnibincopy.sh: |- #!/bin/bash set -e function log() { echo "$(date --iso-8601=seconds) [cnibincopy] ${1}" } DESTINATION_DIRECTORY=/host/opt/cni/bin/ # Perform validation of usage if [ -z "$RHEL8_SOURCE_DIRECTORY" ] || [ -z "$RHEL9_SOURCE_DIRECTORY" ] || [ -z "$DEFAULT_SOURCE_DIRECTORY" ]; then log "FATAL ERROR: You must set env variables: RHEL8_SOURCE_DIRECTORY, RHEL9_SOURCE_DIRECTORY, DEFAULT_SOURCE_DIRECTORY" exit 1 fi if [ ! -d "$DESTINATION_DIRECTORY" ]; then log "FATAL ERROR: Destination directory ($DESTINATION_DIRECTORY) does not exist" exit 1 fi # Collect host OS information . /host/etc/os-release rhelmajor= # detect which version we're using in order to copy the proper binaries case "${ID}" in rhcos|scos) RHEL_VERSION=$(echo "${CPE_NAME}" | cut -f 5 -d :) rhelmajor=$(echo $RHEL_VERSION | sed -E 's/([0-9]+)\.{1}[0-9]+(\.[0-9]+)?/\1/') ;; rhel|centos) rhelmajor=$(echo "${VERSION_ID}" | cut -f 1 -d .) ;; fedora) if [ "${VARIANT_ID}" == "coreos" ]; then rhelmajor=8 else log "FATAL ERROR: Unsupported Fedora variant=${VARIANT_ID}" exit 1 fi ;; *) log "FATAL ERROR: Unsupported OS ID=${ID}"; exit 1 ;; esac # Set which directory we'll copy from, detect if it exists sourcedir= founddir=false case "${rhelmajor}" in 8) if [ -d "${RHEL8_SOURCE_DIRECTORY}" ]; then sourcedir=${RHEL8_SOURCE_DIRECTORY} founddir=true fi ;; 9) if [ -d "${RHEL9_SOURCE_DIRECTORY}" ]; then sourcedir=${RHEL9_SOURCE_DIRECTORY} founddir=true fi ;; *) log "ERROR: RHEL Major Version Unsupported, rhelmajor=${rhelmajor}" ;; esac # When it doesn't exist, fall back to the original directory. if [ "$founddir" == false ]; then log "Source directory unavailable for OS version: ${rhelmajor}" sourcedir=$DEFAULT_SOURCE_DIRECTORY fi # Use a subdirectory called "upgrade" so we can atomically move fully copied files. # We now use --remove-destination after running into an issue with -f not working over symlinks UPGRADE_DIRECTORY=${DESTINATION_DIRECTORY}upgrade_$(uuidgen) rm -Rf $UPGRADE_DIRECTORY mkdir -p $UPGRADE_DIRECTORY cp -r --remove-destination ${sourcedir}* $UPGRADE_DIRECTORY if [ $? -eq 0 ]; then log "Successfully copied files in ${sourcedir} to $UPGRADE_DIRECTORY" else log "Failed to copy files in ${sourcedir} to $UPGRADE_DIRECTORY" rm -Rf $UPGRADE_DIRECTORY exit 1 fi mv -f $UPGRADE_DIRECTORY/* ${DESTINATION_DIRECTORY}/ if [ $? -eq 0 ]; then log "Successfully moved files in $UPGRADE_DIRECTORY to ${DESTINATION_DIRECTORY}" else log "Failed to move files in $UPGRADE_DIRECTORY to ${DESTINATION_DIRECTORY}" rm -Rf $UPGRADE_DIRECTORY exit 1 fi rm -Rf $UPGRADE_DIRECTORY kind: ConfigMap metadata: annotations: kubernetes.io/description: | This is a script used to copy CNI binaries based on host OS release.openshift.io/version: 4.20.19 creationTimestamp: "2026-04-20T12:10:49Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:cnibincopy.sh: {} f:metadata: f:annotations: f:kubernetes.io/description: {} f:release.openshift.io/version: {} f:ownerReferences: k:{"uid":"bb829e46-426b-4518-98ca-380434bb713d"}: {} manager: cluster-network-operator/operconfig operation: Apply time: "2026-04-20T12:10:49Z" name: cni-copy-resources namespace: openshift-multus ownerReferences: - apiVersion: operator.openshift.io/v1 blockOwnerDeletion: true controller: true kind: Network name: cluster uid: bb829e46-426b-4518-98ca-380434bb713d resourceVersion: "2542" uid: 4415c5c4-df8d-4f6e-ae0b-c12d6277aca4 - apiVersion: v1 data: allowlist.conf: |- ^net.ipv4.conf.IFNAME.accept_redirects$ ^net.ipv4.conf.IFNAME.accept_source_route$ ^net.ipv4.conf.IFNAME.arp_accept$ ^net.ipv4.conf.IFNAME.arp_notify$ ^net.ipv4.conf.IFNAME.disable_policy$ ^net.ipv4.conf.IFNAME.secure_redirects$ ^net.ipv4.conf.IFNAME.send_redirects$ ^net.ipv6.conf.IFNAME.accept_ra$ ^net.ipv6.conf.IFNAME.accept_redirects$ ^net.ipv6.conf.IFNAME.accept_source_route$ ^net.ipv6.conf.IFNAME.arp_accept$ ^net.ipv6.conf.IFNAME.arp_notify$ ^net.ipv6.neigh.IFNAME.base_reachable_time_ms$ ^net.ipv6.neigh.IFNAME.retrans_time_ms$ kind: ConfigMap metadata: annotations: kubernetes.io/description: | Sysctl allowlist for nodes. release.openshift.io/version: 4.20.19 creationTimestamp: "2026-04-20T12:10:49Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:allowlist.conf: {} f:metadata: f:annotations: .: {} f:kubernetes.io/description: {} f:release.openshift.io/version: {} manager: network-operator operation: Update time: "2026-04-20T12:10:49Z" name: cni-sysctl-allowlist namespace: openshift-multus resourceVersion: "2516" uid: 322c8b1e-863f-4763-8294-52368cb740f8 - apiVersion: v1 data: allowlist.conf: |- ^net.ipv4.conf.IFNAME.accept_redirects$ ^net.ipv4.conf.IFNAME.accept_source_route$ ^net.ipv4.conf.IFNAME.arp_accept$ ^net.ipv4.conf.IFNAME.arp_notify$ ^net.ipv4.conf.IFNAME.disable_policy$ ^net.ipv4.conf.IFNAME.secure_redirects$ ^net.ipv4.conf.IFNAME.send_redirects$ ^net.ipv6.conf.IFNAME.accept_ra$ ^net.ipv6.conf.IFNAME.accept_redirects$ ^net.ipv6.conf.IFNAME.accept_source_route$ ^net.ipv6.conf.IFNAME.arp_accept$ ^net.ipv6.conf.IFNAME.arp_notify$ ^net.ipv6.neigh.IFNAME.base_reachable_time_ms$ ^net.ipv6.neigh.IFNAME.retrans_time_ms$ kind: ConfigMap metadata: annotations: kubernetes.io/description: | Sysctl allowlist for nodes. release.openshift.io/version: 4.20.19 creationTimestamp: "2026-04-20T12:10:49Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:allowlist.conf: {} f:metadata: f:annotations: f:kubernetes.io/description: {} f:release.openshift.io/version: {} f:ownerReferences: k:{"uid":"bb829e46-426b-4518-98ca-380434bb713d"}: {} manager: cluster-network-operator/operconfig operation: Apply time: "2026-04-20T12:10:49Z" name: default-cni-sysctl-allowlist namespace: openshift-multus ownerReferences: - apiVersion: operator.openshift.io/v1 blockOwnerDeletion: true controller: true kind: Network name: cluster uid: bb829e46-426b-4518-98ca-380434bb713d resourceVersion: "2515" uid: fa1ff007-faa7-420c-a42b-03a8eb78c63e - apiVersion: v1 data: ca.crt: | -----BEGIN CERTIFICATE----- MIIDPDCCAiSgAwIBAgIIOLmvsniIli8wDQYJKoZIhvcNAQELBQAwJjESMBAGA1UE CxMJb3BlbnNoaWZ0MRAwDgYDVQQDEwdyb290LWNhMB4XDTI2MDQyMDEyMDgyNFoX DTM2MDQxNzEyMDgyNFowJjESMBAGA1UECxMJb3BlbnNoaWZ0MRAwDgYDVQQDEwdy b290LWNhMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA6waTiKc0TKM/ dTRHU4ctSpXZcbVO9IvcDIjq1y/3d7P7JRgSoEi+qKqgmeGKRB7Jt7iqoGhKeL/y HuhYKzJsgGjTBeaWF4BJ2gNcPTZIMpzc7XGrtVdpIKjJ/V3TgP+c/GSA8UcTmaK3 DCSgArjMW99KG+oTj6IUoHJbOaOxoftH0OKwzBgQ0cV084yAX5t8Tnu3E+g8uJRS /gNZj1DzuJE50+FqWYzCpZIq51ephTDQtjJslSCGaHUuLYJAynvfio1bMSO4HxEa ZwbQbYEFPR4shyxz0umAxkqSG6IeXjV100EgnhzlfL9txOXh0nEyDLGH3Da+o59M CioJHXcj2wIDAQABo24wbDAOBgNVHQ8BAf8EBAMCAqQwDwYDVR0TAQH/BAUwAwEB /zBJBgNVHQ4EQgRAkg/y0sXz5nrixSCX2p5cx6VYqjaY+fWSz1QKML2YgwxZCRE2 Z4ro/wlbT5Nzfu+sY1EcTDM04HWHyb9+PQ1ZWjANBgkqhkiG9w0BAQsFAAOCAQEA 2QdMiBGwszpGxHW5FywYbrrikTZSHbsTqwYoAsR5X7pBmkvci14QyuHA7OY2PfeZ RyvNGeoQE6gG1sGLO/u/USP0xscztk2F7iWtQNDf6jEZV2esAl1xas1zKG2KmZL8 qY6KLYKTbbn0m3QF1haDfElVjwbIhRXDhIVmRFVkON4+w2WNuTI+vXZzfYPDjmDI XLuze+B0HU6iYInlizS/IDcp4oPzdEqKMqft/pb6r7WSgC7HDl1uZ9EfZa97nNza 7I40MymBtIZCgz2Agsz1tFr/GDp5i/gCu/lwu9HxHldnHSi6J8YP8HBTqFLQhDHC CfE0pWFBWvFn6Pkua6PYaw== -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- MIIEADCCAuigAwIBAgIIYWmS9cEA8aEwDQYJKoZIhvcNAQELBQAwJjESMBAGA1UE CxMJb3BlbnNoaWZ0MRAwDgYDVQQDEwdyb290LWNhMB4XDTI2MDQyMDEyMDg1NVoX DTI3MDQyMDEyMDg1NVowMDESMBAGA1UEChMJb3BlbnNoaWZ0MRowGAYDVQQDExFv cGVuc2hpZnQtaW5ncmVzczCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEB AMVpliQbIVN/YILds90fHGX0/iVVkIx6epKTVBIlHwZKLuX+/M4864ydS4CIb5qb CXNyOyQ27n3Ci1vG11oN3+gZG4bTETqjDVZqWW/7qR176mExZ3+2DYo36zgFANVa uyqVo4TU1HyfMxhEgT/9ILOkVc/sov0KDoRn3CUYnIRQ9sfO+K/W5ea1oklz+TyY fAXaMsWIYTQbZKa2MJ8asyFLChLzvPp+L/rtD9aI3cmjy8uYLKrBClDo9HiN6JhV +zi195sQIOWnjLzO+phHjD2XfXT6A2R+JnROQx3t801QXwmiVLJxsUqxJc+fTI/o 3O+QatPY/IBCXnWmJwI8uFMCAwEAAaOCASYwggEiMA4GA1UdDwEB/wQEAwIFoDAd BgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDAYDVR0TAQH/BAIwADBJBgNV HQ4EQgRA9IqvBDDK4i4Lhi/Mh8SGgALdFZ+oh+I/fLviZ4ZHSkftY9uLWXZsfBOl MzuyVYKy6siCFjMR3jIoIGVi79u7RjBLBgNVHSMERDBCgECSD/LSxfPmeuLFIJfa nlzHpViqNpj59ZLPVAowvZiDDFkJETZniuj/CVtPk3N+76xjURxMMzTgdYfJv349 DVlaMEsGA1UdEQREMEKCQCouYXBwcy5kNTYyMmI5YS04YjQwLTRiZjktYmM0Ni1m YmI4NjMzMzM2MjIucHJvZC5rb25mbHV4ZWFhcy5jb20wDQYJKoZIhvcNAQELBQAD ggEBAKxBAwPXFnJN+W5RscvIJuoqpvZys9kbWtmEIUjMCyIQW+NKkXV+wEY5mfxz OaMCB5nNpfgje+9kg73+c29Nx0/ZyuVWHGmdHxre/rQUCJDzWm5gop9u3/CLyCmm zRFzjkxr9xhhdjcBVbBf1l8YWJ6DTH85ZO4abmXElty05xQbBK8HscfSvIdp+LgB qbUtwMCGkjZ5e/SFyhI1P9gJ0rnauZ0XoL+pd+I9R6J3esemD/6gBnHgy4TLWMOD e+SjlAVmXo6XvZnOZ4n9H29SiSLNih8540Z9fNExCuOOP45HimWQIgW/RGnYY9jC HO+0ylMwN5NAcIlxveMp4wXnXys= -----END CERTIFICATE----- kind: ConfigMap metadata: annotations: kubernetes.io/description: Contains a CA bundle that can be used to verify the kube-apiserver when using internal endpoints such as the internal service IP or kubernetes.default.svc. No other usage is guaranteed across distributions of Kubernetes clusters. creationTimestamp: "2026-04-20T12:10:46Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:ca.crt: {} f:metadata: f:annotations: .: {} f:kubernetes.io/description: {} manager: kube-controller-manager operation: Update time: "2026-04-20T12:11:49Z" name: kube-root-ca.crt namespace: openshift-multus resourceVersion: "4564" uid: 1e8313d9-f739-46c0-b2f9-dd0f5831ba93 - apiVersion: v1 data: daemon-config.json: | { "cniVersion": "0.3.1", "chrootDir": "/hostroot", "logToStderr": true, "logLevel": "verbose", "binDir": "/var/lib/cni/bin", "perNodeCertificate": { "enabled": true, "bootstrapKubeconfig": "/var/lib/kubelet/kubeconfig", "certDir": "/etc/cni/multus/certs", "certDuration": "24h" }, "cniConfigDir": "/host/etc/cni/net.d", "multusConfigFile": "auto", "multusAutoconfigDir": "/host/run/multus/cni/net.d", "namespaceIsolation": true, "globalNamespaces": "default,openshift-multus,openshift-sriov-network-operator,openshift-cnv", "readinessindicatorfile": "/host/run/multus/cni/net.d/10-ovn-kubernetes.conf", "daemonSocketDir": "/run/multus/socket", "socketDir": "/host/run/multus/socket", "auxiliaryCNIChainName": "vendor-cni-chain" } kind: ConfigMap metadata: creationTimestamp: "2026-04-20T12:10:50Z" labels: app: multus tier: node managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:daemon-config.json: {} f:metadata: f:labels: f:app: {} f:tier: {} f:ownerReferences: k:{"uid":"bb829e46-426b-4518-98ca-380434bb713d"}: {} manager: cluster-network-operator/operconfig operation: Apply time: "2026-04-20T12:10:50Z" name: multus-daemon-config namespace: openshift-multus ownerReferences: - apiVersion: operator.openshift.io/v1 blockOwnerDeletion: true controller: true kind: Network name: cluster uid: bb829e46-426b-4518-98ca-380434bb713d resourceVersion: "2582" uid: d7e7482c-6543-43a8-8348-6e7166d420e5 - apiVersion: v1 data: service-ca.crt: | -----BEGIN CERTIFICATE----- MIIDUTCCAjmgAwIBAgIIWofjdBgIVeQwDQYJKoZIhvcNAQELBQAwNjE0MDIGA1UE Awwrb3BlbnNoaWZ0LXNlcnZpY2Utc2VydmluZy1zaWduZXJAMTc3NjY4NzI4NzAe Fw0yNjA0MjAxMjE0NDdaFw0yODA2MTgxMjE0NDhaMDYxNDAyBgNVBAMMK29wZW5z aGlmdC1zZXJ2aWNlLXNlcnZpbmctc2lnbmVyQDE3NzY2ODcyODcwggEiMA0GCSqG SIb3DQEBAQUAA4IBDwAwggEKAoIBAQC3bCBR1z+f5IxZCY7FwQ3Wn1xmesYsmWm4 hvNHF3B8kmEQ4LJ0GY9gnbvd/JoZeIooaoVBeA2n49Q6bUdm8bBtGCY6G2n0cxqF 9nbz5hmjn97JNk1YIQDT/QpwH/1UBUmQ6Tv0r+UNR4JmkX9v/0OvIwdzasK3STY8 im95QF8b+1ulrLEK5cH6wx8kFmY8U75sNfrAvVqCpWq7CNPgeumqHX5fqrCJze+3 EH6Ztsq2JAjaZ7NIUdYhhCdP4tUqlFMfyLM9KQH5iyL8zpOF0RzHwGAE70BQYk9G wlu7of3KT5IxCgiG8A7scHVRuLTONiF7ZmThmzXx5J8UaX2HUgY7AgMBAAGjYzBh MA4GA1UdDwEB/wQEAwICpDAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBTIw5JX oBcTKk950BiwdJJOUiHIYDAfBgNVHSMEGDAWgBTIw5JXoBcTKk950BiwdJJOUiHI YDANBgkqhkiG9w0BAQsFAAOCAQEALVo/nVNqv4OCxkPuf1yQtYdSo5KfO1th+cG2 TIArA6NfJXX9YUrwkovwgS0W1Wb8Dc4QmJDiXHoqKMeJ2JHg1YUj1kVYtOi05+sU w+fs/UlP1zCj/G99esx1XAESEhbZXCRNkvtCgBPYeYdd/T2fbai1IkH3czqb4Kev N3l9FgwSm5g1s7BKBvRYZ3UDo9+BejLeik9hU8YPEeeuKGj9UtKNfYqKwIPdna56 Ms1ODlEADxtRH/NdtwPB+V59R0Npp27p/qkVrCx/0cFV8OAAEYCKJ8KMY4SgaOCO O44WyJgviQbrMcshRvqfoKDwTM1kr/unWwCl8UmxwkETpg3McA== -----END CERTIFICATE----- kind: ConfigMap metadata: annotations: service.beta.openshift.io/inject-cabundle: "true" creationTimestamp: "2026-04-20T12:10:46Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: {} f:metadata: f:annotations: .: {} f:service.beta.openshift.io/inject-cabundle: {} manager: kube-controller-manager operation: Update time: "2026-04-20T12:10:46Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:service-ca.crt: {} manager: service-ca-operator operation: Update time: "2026-04-20T12:15:01Z" name: openshift-service-ca.crt namespace: openshift-multus resourceVersion: "7853" uid: 40f4c36e-e73e-4b68-928d-b7d18d322cf1 - apiVersion: v1 data: whereabouts.conf: | { "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/etc/kubernetes/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "reconciler_cron_expression": "30 4 * * *", "log_level": "verbose", "configuration_path": "/etc/kubernetes/cni/net.d/whereabouts.d" } kind: ConfigMap metadata: creationTimestamp: "2026-04-20T12:10:50Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:whereabouts.conf: {} f:metadata: f:ownerReferences: k:{"uid":"bb829e46-426b-4518-98ca-380434bb713d"}: {} manager: cluster-network-operator/operconfig operation: Apply time: "2026-04-20T12:10:50Z" name: whereabouts-flatfile-config namespace: openshift-multus ownerReferences: - apiVersion: operator.openshift.io/v1 blockOwnerDeletion: true controller: true kind: Network name: cluster uid: bb829e46-426b-4518-98ca-380434bb713d resourceVersion: "2568" uid: b5adb5e0-774b-4b76-af73-cd9a3d4f559d kind: ConfigMapList metadata: resourceVersion: "26754"