--- apiVersion: v1 items: - apiVersion: v1 data: cnibincopy.sh: |- #!/bin/bash set -e function log() { echo "$(date --iso-8601=seconds) [cnibincopy] ${1}" } DESTINATION_DIRECTORY=/host/opt/cni/bin/ # Perform validation of usage if [ -z "$RHEL8_SOURCE_DIRECTORY" ] || [ -z "$RHEL9_SOURCE_DIRECTORY" ] || [ -z "$DEFAULT_SOURCE_DIRECTORY" ]; then log "FATAL ERROR: You must set env variables: RHEL8_SOURCE_DIRECTORY, RHEL9_SOURCE_DIRECTORY, DEFAULT_SOURCE_DIRECTORY" exit 1 fi if [ ! -d "$DESTINATION_DIRECTORY" ]; then log "FATAL ERROR: Destination directory ($DESTINATION_DIRECTORY) does not exist" exit 1 fi # Collect host OS information . /host/etc/os-release rhelmajor= # detect which version we're using in order to copy the proper binaries case "${ID}" in rhcos|scos) RHEL_VERSION=$(echo "${CPE_NAME}" | cut -f 5 -d :) rhelmajor=$(echo $RHEL_VERSION | sed -E 's/([0-9]+)\.{1}[0-9]+(\.[0-9]+)?/\1/') ;; rhel|centos) rhelmajor=$(echo "${VERSION_ID}" | cut -f 1 -d .) ;; fedora) if [ "${VARIANT_ID}" == "coreos" ]; then rhelmajor=8 else log "FATAL ERROR: Unsupported Fedora variant=${VARIANT_ID}" exit 1 fi ;; *) log "FATAL ERROR: Unsupported OS ID=${ID}"; exit 1 ;; esac # Set which directory we'll copy from, detect if it exists sourcedir= founddir=false case "${rhelmajor}" in 8) if [ -d "${RHEL8_SOURCE_DIRECTORY}" ]; then sourcedir=${RHEL8_SOURCE_DIRECTORY} founddir=true fi ;; 9) if [ -d "${RHEL9_SOURCE_DIRECTORY}" ]; then sourcedir=${RHEL9_SOURCE_DIRECTORY} founddir=true fi ;; *) log "ERROR: RHEL Major Version Unsupported, rhelmajor=${rhelmajor}" ;; esac # When it doesn't exist, fall back to the original directory. if [ "$founddir" == false ]; then log "Source directory unavailable for OS version: ${rhelmajor}" sourcedir=$DEFAULT_SOURCE_DIRECTORY fi # Use a subdirectory called "upgrade" so we can atomically move fully copied files. # We now use --remove-destination after running into an issue with -f not working over symlinks UPGRADE_DIRECTORY=${DESTINATION_DIRECTORY}upgrade_$(uuidgen) rm -Rf $UPGRADE_DIRECTORY mkdir -p $UPGRADE_DIRECTORY cp -r --remove-destination ${sourcedir}* $UPGRADE_DIRECTORY if [ $? -eq 0 ]; then log "Successfully copied files in ${sourcedir} to $UPGRADE_DIRECTORY" else log "Failed to copy files in ${sourcedir} to $UPGRADE_DIRECTORY" rm -Rf $UPGRADE_DIRECTORY exit 1 fi mv -f $UPGRADE_DIRECTORY/* ${DESTINATION_DIRECTORY}/ if [ $? -eq 0 ]; then log "Successfully moved files in $UPGRADE_DIRECTORY to ${DESTINATION_DIRECTORY}" else log "Failed to move files in $UPGRADE_DIRECTORY to ${DESTINATION_DIRECTORY}" rm -Rf $UPGRADE_DIRECTORY exit 1 fi rm -Rf $UPGRADE_DIRECTORY kind: ConfigMap metadata: annotations: kubernetes.io/description: | This is a script used to copy CNI binaries based on host OS release.openshift.io/version: 4.20.19 creationTimestamp: "2026-04-17T14:03:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:cnibincopy.sh: {} f:metadata: f:annotations: f:kubernetes.io/description: {} f:release.openshift.io/version: {} f:ownerReferences: k:{"uid":"f3e11f04-91c8-422e-b0c7-9af48666c769"}: {} manager: cluster-network-operator/operconfig operation: Apply time: "2026-04-17T14:03:34Z" name: cni-copy-resources namespace: openshift-multus ownerReferences: - apiVersion: operator.openshift.io/v1 blockOwnerDeletion: true controller: true kind: Network name: cluster uid: f3e11f04-91c8-422e-b0c7-9af48666c769 resourceVersion: "2242" uid: fd2b502c-aa66-48c8-ac45-a3932cf23286 - apiVersion: v1 data: allowlist.conf: |- ^net.ipv4.conf.IFNAME.accept_redirects$ ^net.ipv4.conf.IFNAME.accept_source_route$ ^net.ipv4.conf.IFNAME.arp_accept$ ^net.ipv4.conf.IFNAME.arp_notify$ ^net.ipv4.conf.IFNAME.disable_policy$ ^net.ipv4.conf.IFNAME.secure_redirects$ ^net.ipv4.conf.IFNAME.send_redirects$ ^net.ipv6.conf.IFNAME.accept_ra$ ^net.ipv6.conf.IFNAME.accept_redirects$ ^net.ipv6.conf.IFNAME.accept_source_route$ ^net.ipv6.conf.IFNAME.arp_accept$ ^net.ipv6.conf.IFNAME.arp_notify$ ^net.ipv6.neigh.IFNAME.base_reachable_time_ms$ ^net.ipv6.neigh.IFNAME.retrans_time_ms$ kind: ConfigMap metadata: annotations: kubernetes.io/description: | Sysctl allowlist for nodes. release.openshift.io/version: 4.20.19 creationTimestamp: "2026-04-17T14:03:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:allowlist.conf: {} f:metadata: f:annotations: .: {} f:kubernetes.io/description: {} f:release.openshift.io/version: {} manager: network-operator operation: Update time: "2026-04-17T14:03:34Z" name: cni-sysctl-allowlist namespace: openshift-multus resourceVersion: "2239" uid: 2b6b12ef-2024-4256-a9ad-567eb89cbb2e - apiVersion: v1 data: allowlist.conf: |- ^net.ipv4.conf.IFNAME.accept_redirects$ ^net.ipv4.conf.IFNAME.accept_source_route$ ^net.ipv4.conf.IFNAME.arp_accept$ ^net.ipv4.conf.IFNAME.arp_notify$ ^net.ipv4.conf.IFNAME.disable_policy$ ^net.ipv4.conf.IFNAME.secure_redirects$ ^net.ipv4.conf.IFNAME.send_redirects$ ^net.ipv6.conf.IFNAME.accept_ra$ ^net.ipv6.conf.IFNAME.accept_redirects$ ^net.ipv6.conf.IFNAME.accept_source_route$ ^net.ipv6.conf.IFNAME.arp_accept$ ^net.ipv6.conf.IFNAME.arp_notify$ ^net.ipv6.neigh.IFNAME.base_reachable_time_ms$ ^net.ipv6.neigh.IFNAME.retrans_time_ms$ kind: ConfigMap metadata: annotations: kubernetes.io/description: | Sysctl allowlist for nodes. release.openshift.io/version: 4.20.19 creationTimestamp: "2026-04-17T14:03:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:allowlist.conf: {} f:metadata: f:annotations: f:kubernetes.io/description: {} f:release.openshift.io/version: {} f:ownerReferences: k:{"uid":"f3e11f04-91c8-422e-b0c7-9af48666c769"}: {} manager: cluster-network-operator/operconfig operation: Apply time: "2026-04-17T14:03:34Z" name: default-cni-sysctl-allowlist namespace: openshift-multus ownerReferences: - apiVersion: operator.openshift.io/v1 blockOwnerDeletion: true controller: true kind: Network name: cluster uid: f3e11f04-91c8-422e-b0c7-9af48666c769 resourceVersion: "2238" uid: 883f3547-82e9-4f3e-a8f0-e71e400cb8a1 - apiVersion: v1 data: ca.crt: | -----BEGIN CERTIFICATE----- MIIDPDCCAiSgAwIBAgIIPQu7WZ8NGYIwDQYJKoZIhvcNAQELBQAwJjESMBAGA1UE CxMJb3BlbnNoaWZ0MRAwDgYDVQQDEwdyb290LWNhMB4XDTI2MDQxNzE0MDEzNVoX DTM2MDQxNDE0MDEzNVowJjESMBAGA1UECxMJb3BlbnNoaWZ0MRAwDgYDVQQDEwdy b290LWNhMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAwykkdPTpwrs2 WHVNfLZYsSEp2hXjprjlhq+FQBmRUzKziwrK3MCH0Gx84ICj6VCe7A+JuTsK5Syy 8qXZzSunUn0iNK1gsFjC5YnkHjTvWfgiBobdVeqYtv+cW4Se+Q+s0FJ66oDbGTus X8ib/SWEPa0+q94bX6mxTbU08O7ee7wZIrxKNonxq+5tsSRK3vDoCCuYp4TO5Das TOy7pDmmW+dH9KLiBwhPQ3EC9nbhbSuvk+DjTZ56642FF7sTj+CvKj9BPoKjxKKn 7FDOM2PWRYAcnSRd0Q0UxWqY7nUo2ggBcLqw27jdsVmei469p9KM3xUD86ehtkH6 2SliFQStTwIDAQABo24wbDAOBgNVHQ8BAf8EBAMCAqQwDwYDVR0TAQH/BAUwAwEB /zBJBgNVHQ4EQgRA57XWhSQYDZ7RJT//t2QKO4aW4sgE0/XZoj8ysnYowX/YqMuI OCdyjHdXIEN3U2QUgJ5D2yV/65GzZMyAAilAJTANBgkqhkiG9w0BAQsFAAOCAQEA tIEPx3xctqxrYlALV3BEsMYKyyd8HQxNfv2/tRKjulC7TH9xkqWdHwt3oSa6wKlt MWXXc0GhfEQtGofLb9owa+VnBJsz+KPf0+nuXZrIcjJSpJNpRhmjYBIvxE1+js4a uZ6nQusLaPZMvc+xdovvdIzSaqwyQZ9LIxH/dAquaHcGpVHe5p4zihb2p78mskcP uJdW6JosULptUyVqH8BshHkEWm85Iev6llY74P8WDiTnaijAs9fLKPxZJhR/9UhM dD1gIEM78mP+Sg5v3BrintI8FLHx8WS9x2uA7HRY82fdKP/qBehlfwP6SrS1wTYR xn/VtnRT6DDjiS34LeAjXA== -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- MIIEADCCAuigAwIBAgIIUpQCELdzBxQwDQYJKoZIhvcNAQELBQAwJjESMBAGA1UE CxMJb3BlbnNoaWZ0MRAwDgYDVQQDEwdyb290LWNhMB4XDTI2MDQxNzE0MDE1N1oX DTI3MDQxNzE0MDE1N1owMDESMBAGA1UEChMJb3BlbnNoaWZ0MRowGAYDVQQDExFv cGVuc2hpZnQtaW5ncmVzczCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEB ALlg2srOffUzvgI1yTU3+r2pG7VHdHZXTxdRPTKAc+THu30hIxRT7skn/Hz3VYY5 sG8Gl8be4pUh6FfTIB21r6pj+V+8yeZkvguPAVroSiuSVlDoar7RBgpHAJ/5lYsW m6/BUiHZokMzBkmxXqu+eMYLJkKK7sxDbkN9kIthcYjvOLFSFNfBJZi9y+DNceeH iTEgsSnFpZDU7fLMZ8Fp8wP20pHlARcKvHokJFsKJvNrkGZKoxq5qbEW1oyC4BtG txqdeHHb6lYJmnO8+QE3mLM047g0UjYCYdz4uk1LIhqoE90RhZRWCOggPhHWwMy6 /ATocdCrZRrx4QnH7ykRriMCAwEAAaOCASYwggEiMA4GA1UdDwEB/wQEAwIFoDAd BgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDAYDVR0TAQH/BAIwADBJBgNV HQ4EQgRAIcasEkGd9ayQTTO4nq+PBovCwPPoZB6p8WqIB8v88OKuFbb9rAvQOmmi UQNTSobn18ixmZbMDUs73T7BcYQWNTBLBgNVHSMERDBCgEDntdaFJBgNntElP/+3 ZAo7hpbiyATT9dmiPzKydijBf9ioy4g4J3KMd1cgQ3dTZBSAnkPbJX/rkbNkzIAC KUAlMEsGA1UdEQREMEKCQCouYXBwcy41YzljNzNiYy05ZjkyLTRjMzctYjFmNS03 MmNjNWFiNWFmY2MucHJvZC5rb25mbHV4ZWFhcy5jb20wDQYJKoZIhvcNAQELBQAD ggEBADTaHOfIlIjFTb8Nl2/uEMp1KQj1HevkdmCzny80xkz1lrOjcE/9VjT4emnz UUEI9S++IYDgoBJDO2XZN7RQz8xnZLZ+il/XADTGxXZ2EMMWR8XUWcslszn6dZHX /1SyFkcqfUU+4Ev84atvwr1uAy4TSfu62XZCYBJFvZnjm43aThGdQhhamyjWor4i 5bflWrDyjMUQ3ps/w4B9b0j1r7gm+XE4GmtLItdobG9S25OKQ7yz0dLYnXmSA2Ta kbI2dkPniOOIRgiNR5/jXW93R2DZexoMR6aq7LLPLJKb2t9cuxxmz3wzDkihSaJ3 6xX8+TZs+rnPwJFJcBdRbRPqWbU= -----END CERTIFICATE----- kind: ConfigMap metadata: annotations: kubernetes.io/description: Contains a CA bundle that can be used to verify the kube-apiserver when using internal endpoints such as the internal service IP or kubernetes.default.svc. No other usage is guaranteed across distributions of Kubernetes clusters. creationTimestamp: "2026-04-17T14:03:44Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:ca.crt: {} f:metadata: f:annotations: .: {} f:kubernetes.io/description: {} manager: kube-controller-manager operation: Update time: "2026-04-17T14:03:44Z" name: kube-root-ca.crt namespace: openshift-multus resourceVersion: "2544" uid: 4811e613-c4a8-4e4a-bc2a-38365ed33ed2 - apiVersion: v1 data: daemon-config.json: | { "cniVersion": "0.3.1", "chrootDir": "/hostroot", "logToStderr": true, "logLevel": "verbose", "binDir": "/var/lib/cni/bin", "perNodeCertificate": { "enabled": true, "bootstrapKubeconfig": "/var/lib/kubelet/kubeconfig", "certDir": "/etc/cni/multus/certs", "certDuration": "24h" }, "cniConfigDir": "/host/etc/cni/net.d", "multusConfigFile": "auto", "multusAutoconfigDir": "/host/run/multus/cni/net.d", "namespaceIsolation": true, "globalNamespaces": "default,openshift-multus,openshift-sriov-network-operator,openshift-cnv", "readinessindicatorfile": "/host/run/multus/cni/net.d/10-ovn-kubernetes.conf", "daemonSocketDir": "/run/multus/socket", "socketDir": "/host/run/multus/socket", "auxiliaryCNIChainName": "vendor-cni-chain" } kind: ConfigMap metadata: creationTimestamp: "2026-04-17T14:03:35Z" labels: app: multus tier: node managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:daemon-config.json: {} f:metadata: f:labels: f:app: {} f:tier: {} f:ownerReferences: k:{"uid":"f3e11f04-91c8-422e-b0c7-9af48666c769"}: {} manager: cluster-network-operator/operconfig operation: Apply time: "2026-04-17T14:03:35Z" name: multus-daemon-config namespace: openshift-multus ownerReferences: - apiVersion: operator.openshift.io/v1 blockOwnerDeletion: true controller: true kind: Network name: cluster uid: f3e11f04-91c8-422e-b0c7-9af48666c769 resourceVersion: "2245" uid: 41f424f5-8527-4d3d-b1c4-95d7a081617a - apiVersion: v1 data: service-ca.crt: | -----BEGIN CERTIFICATE----- MIIDUTCCAjmgAwIBAgIICscs8H2damkwDQYJKoZIhvcNAQELBQAwNjE0MDIGA1UE Awwrb3BlbnNoaWZ0LXNlcnZpY2Utc2VydmluZy1zaWduZXJAMTc3NjQzNDk2NjAe Fw0yNjA0MTcxNDA5MjZaFw0yODA2MTUxNDA5MjdaMDYxNDAyBgNVBAMMK29wZW5z aGlmdC1zZXJ2aWNlLXNlcnZpbmctc2lnbmVyQDE3NzY0MzQ5NjYwggEiMA0GCSqG SIb3DQEBAQUAA4IBDwAwggEKAoIBAQCfybXgENJJRDCIXAzO76QGV6SLLqxjb2ju mRyXiz7vb7oqyaEt72pP2VnMcWWwOPW2biCWfPZPJNGwRBOuPHl+dCDlBP6loy+G 49g5xKHtzLfBR4e8jxNemAveV4xzAZfTi5Vbot3nRhvpY3iVaqYQjtLfUrKnFpYU fwzqwrO5Hv+sNrI+/v/luyFxFdD2yNg5yvGIeZsXc7Pn/onIqIM+ge9swjQGXRPZ PbWWSoiNiPNpEKxP7k78UGYE9HmpUznJ0fQHJQ/S3lTkJOjTtKjsKssWLhdFBBeZ JXdhFqYEtu3qJjo+uuRfGjidHhMn3C4gLmYHu6y/jKSRdkQAOHb3AgMBAAGjYzBh MA4GA1UdDwEB/wQEAwICpDAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBS1X1oI q5gE4wuLMVg9zcWT4WyhozAfBgNVHSMEGDAWgBS1X1oIq5gE4wuLMVg9zcWT4Wyh ozANBgkqhkiG9w0BAQsFAAOCAQEAfktjDnx/i2MTlfEFnvETBINPShcSZA2Q9uKJ 4djHaV1/ImBwVjT+UMVhUknxe4hpkp7xM1dhCcWEDcwBY1eMT0d6pAvH81Yq02bZ fXLC6xuJAzx+TuAPhCbiGo0J8znZ6XqQ2xUm3iDS4uy7HlE6ZxpQPIzyEFRpj4u4 M7kDPmhYhNxckcq6w14BowD5rNo6JFZIaZYLvl4U63aJIraBIvVvJ6PsnJrSvZKq TJeOGul32efnSWG8GsAuj1i1yHu5Qy5o8B8sHwwnoPsJLZzvBYy533dudvy31UWx 2+MIos9nvtiqrYkXeoFkgj87GjAMnlL5VyHQ1vxGqQDO0qrsrw== -----END CERTIFICATE----- kind: ConfigMap metadata: annotations: service.beta.openshift.io/inject-cabundle: "true" creationTimestamp: "2026-04-17T14:03:44Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: {} f:metadata: f:annotations: .: {} f:service.beta.openshift.io/inject-cabundle: {} manager: kube-controller-manager operation: Update time: "2026-04-17T14:03:44Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:service-ca.crt: {} manager: service-ca-operator operation: Update time: "2026-04-17T14:09:40Z" name: openshift-service-ca.crt namespace: openshift-multus resourceVersion: "8205" uid: 50775436-febc-4c1a-919b-b57abd89d72f - apiVersion: v1 data: whereabouts.conf: | { "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/etc/kubernetes/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "reconciler_cron_expression": "30 4 * * *", "log_level": "verbose", "configuration_path": "/etc/kubernetes/cni/net.d/whereabouts.d" } kind: ConfigMap metadata: creationTimestamp: "2026-04-17T14:03:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:whereabouts.conf: {} f:metadata: f:ownerReferences: k:{"uid":"f3e11f04-91c8-422e-b0c7-9af48666c769"}: {} manager: cluster-network-operator/operconfig operation: Apply time: "2026-04-17T14:03:34Z" name: whereabouts-flatfile-config namespace: openshift-multus ownerReferences: - apiVersion: operator.openshift.io/v1 blockOwnerDeletion: true controller: true kind: Network name: cluster uid: f3e11f04-91c8-422e-b0c7-9af48666c769 resourceVersion: "2243" uid: 70da389f-c659-4ca0-b64f-3fcf8e72d814 kind: ConfigMapList metadata: resourceVersion: "28216"