--- apiVersion: v1 items: - apiVersion: v1 data: cnibincopy.sh: |- #!/bin/bash set -e function log() { echo "$(date --iso-8601=seconds) [cnibincopy] ${1}" } DESTINATION_DIRECTORY=/host/opt/cni/bin/ # Perform validation of usage if [ -z "$RHEL8_SOURCE_DIRECTORY" ] || [ -z "$RHEL9_SOURCE_DIRECTORY" ] || [ -z "$DEFAULT_SOURCE_DIRECTORY" ]; then log "FATAL ERROR: You must set env variables: RHEL8_SOURCE_DIRECTORY, RHEL9_SOURCE_DIRECTORY, DEFAULT_SOURCE_DIRECTORY" exit 1 fi if [ ! -d "$DESTINATION_DIRECTORY" ]; then log "FATAL ERROR: Destination directory ($DESTINATION_DIRECTORY) does not exist" exit 1 fi # Collect host OS information . /host/etc/os-release rhelmajor= # detect which version we're using in order to copy the proper binaries case "${ID}" in rhcos|scos) RHEL_VERSION=$(echo "${CPE_NAME}" | cut -f 5 -d :) rhelmajor=$(echo $RHEL_VERSION | sed -E 's/([0-9]+)\.{1}[0-9]+(\.[0-9]+)?/\1/') ;; rhel|centos) rhelmajor=$(echo "${VERSION_ID}" | cut -f 1 -d .) ;; fedora) if [ "${VARIANT_ID}" == "coreos" ]; then rhelmajor=8 else log "FATAL ERROR: Unsupported Fedora variant=${VARIANT_ID}" exit 1 fi ;; *) log "FATAL ERROR: Unsupported OS ID=${ID}"; exit 1 ;; esac # Set which directory we'll copy from, detect if it exists sourcedir= founddir=false case "${rhelmajor}" in 8) if [ -d "${RHEL8_SOURCE_DIRECTORY}" ]; then sourcedir=${RHEL8_SOURCE_DIRECTORY} founddir=true fi ;; 9) if [ -d "${RHEL9_SOURCE_DIRECTORY}" ]; then sourcedir=${RHEL9_SOURCE_DIRECTORY} founddir=true fi ;; *) log "ERROR: RHEL Major Version Unsupported, rhelmajor=${rhelmajor}" ;; esac # When it doesn't exist, fall back to the original directory. if [ "$founddir" == false ]; then log "Source directory unavailable for OS version: ${rhelmajor}" sourcedir=$DEFAULT_SOURCE_DIRECTORY fi # Use a subdirectory called "upgrade" so we can atomically move fully copied files. # We now use --remove-destination after running into an issue with -f not working over symlinks UPGRADE_DIRECTORY=${DESTINATION_DIRECTORY}upgrade_$(uuidgen) rm -Rf $UPGRADE_DIRECTORY mkdir -p $UPGRADE_DIRECTORY cp -r --remove-destination ${sourcedir}* $UPGRADE_DIRECTORY if [ $? -eq 0 ]; then log "Successfully copied files in ${sourcedir} to $UPGRADE_DIRECTORY" else log "Failed to copy files in ${sourcedir} to $UPGRADE_DIRECTORY" rm -Rf $UPGRADE_DIRECTORY exit 1 fi mv -f $UPGRADE_DIRECTORY/* ${DESTINATION_DIRECTORY}/ if [ $? -eq 0 ]; then log "Successfully moved files in $UPGRADE_DIRECTORY to ${DESTINATION_DIRECTORY}" else log "Failed to move files in $UPGRADE_DIRECTORY to ${DESTINATION_DIRECTORY}" rm -Rf $UPGRADE_DIRECTORY exit 1 fi rm -Rf $UPGRADE_DIRECTORY kind: ConfigMap metadata: annotations: kubernetes.io/description: | This is a script used to copy CNI binaries based on host OS release.openshift.io/version: 4.20.19 creationTimestamp: "2026-04-22T13:20:05Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:cnibincopy.sh: {} f:metadata: f:annotations: f:kubernetes.io/description: {} f:release.openshift.io/version: {} f:ownerReferences: k:{"uid":"fa6bbada-0721-4801-918e-c55e4d4f91f6"}: {} manager: cluster-network-operator/operconfig operation: Apply time: "2026-04-22T13:20:05Z" name: cni-copy-resources namespace: openshift-multus ownerReferences: - apiVersion: operator.openshift.io/v1 blockOwnerDeletion: true controller: true kind: Network name: cluster uid: fa6bbada-0721-4801-918e-c55e4d4f91f6 resourceVersion: "3602" uid: e6ff827b-8dc7-4508-8c98-98a771088c98 - apiVersion: v1 data: allowlist.conf: |- ^net.ipv4.conf.IFNAME.accept_redirects$ ^net.ipv4.conf.IFNAME.accept_source_route$ ^net.ipv4.conf.IFNAME.arp_accept$ ^net.ipv4.conf.IFNAME.arp_notify$ ^net.ipv4.conf.IFNAME.disable_policy$ ^net.ipv4.conf.IFNAME.secure_redirects$ ^net.ipv4.conf.IFNAME.send_redirects$ ^net.ipv6.conf.IFNAME.accept_ra$ ^net.ipv6.conf.IFNAME.accept_redirects$ ^net.ipv6.conf.IFNAME.accept_source_route$ ^net.ipv6.conf.IFNAME.arp_accept$ ^net.ipv6.conf.IFNAME.arp_notify$ ^net.ipv6.neigh.IFNAME.base_reachable_time_ms$ ^net.ipv6.neigh.IFNAME.retrans_time_ms$ kind: ConfigMap metadata: annotations: kubernetes.io/description: | Sysctl allowlist for nodes. release.openshift.io/version: 4.20.19 creationTimestamp: "2026-04-22T13:20:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:allowlist.conf: {} f:metadata: f:annotations: .: {} f:kubernetes.io/description: {} f:release.openshift.io/version: {} manager: network-operator operation: Update time: "2026-04-22T13:20:04Z" name: cni-sysctl-allowlist namespace: openshift-multus resourceVersion: "3599" uid: bed4b1e7-e15d-4238-a5be-147f426b57c4 - apiVersion: v1 data: allowlist.conf: |- ^net.ipv4.conf.IFNAME.accept_redirects$ ^net.ipv4.conf.IFNAME.accept_source_route$ ^net.ipv4.conf.IFNAME.arp_accept$ ^net.ipv4.conf.IFNAME.arp_notify$ ^net.ipv4.conf.IFNAME.disable_policy$ ^net.ipv4.conf.IFNAME.secure_redirects$ ^net.ipv4.conf.IFNAME.send_redirects$ ^net.ipv6.conf.IFNAME.accept_ra$ ^net.ipv6.conf.IFNAME.accept_redirects$ ^net.ipv6.conf.IFNAME.accept_source_route$ ^net.ipv6.conf.IFNAME.arp_accept$ ^net.ipv6.conf.IFNAME.arp_notify$ ^net.ipv6.neigh.IFNAME.base_reachable_time_ms$ ^net.ipv6.neigh.IFNAME.retrans_time_ms$ kind: ConfigMap metadata: annotations: kubernetes.io/description: | Sysctl allowlist for nodes. release.openshift.io/version: 4.20.19 creationTimestamp: "2026-04-22T13:20:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:allowlist.conf: {} f:metadata: f:annotations: f:kubernetes.io/description: {} f:release.openshift.io/version: {} f:ownerReferences: k:{"uid":"fa6bbada-0721-4801-918e-c55e4d4f91f6"}: {} manager: cluster-network-operator/operconfig operation: Apply time: "2026-04-22T13:20:04Z" name: default-cni-sysctl-allowlist namespace: openshift-multus ownerReferences: - apiVersion: operator.openshift.io/v1 blockOwnerDeletion: true controller: true kind: Network name: cluster uid: fa6bbada-0721-4801-918e-c55e4d4f91f6 resourceVersion: "3598" uid: 83c2c467-1fcb-4283-b0f4-4998fdf2559b - apiVersion: v1 data: ca.crt: | -----BEGIN CERTIFICATE----- MIIDPDCCAiSgAwIBAgIIbYC9rMANCCYwDQYJKoZIhvcNAQELBQAwJjESMBAGA1UE CxMJb3BlbnNoaWZ0MRAwDgYDVQQDEwdyb290LWNhMB4XDTI2MDQyMjEzMTQxNFoX DTM2MDQxOTEzMTQxNFowJjESMBAGA1UECxMJb3BlbnNoaWZ0MRAwDgYDVQQDEwdy b290LWNhMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAuAQiHD3JyYhJ Wozz+/lbGpGDiN4iweRoP1B89vz/Fgz0aWx5np8fexof2phiqhco3iY45bajaZOI fM6BQuE+pP+eIrokCEfvKQZ4Nz5V3Igk6OKrXq6TsSMlB34D3eLj7J9ANUbgwF3w UsdUegmTtGkif1b7ZrzfWmKZOa6sOETuE9oC39rzdW81qmkoI/CHdMZ3OiWSvEME kOCr8wtJzcpbnDK/tyfyStEb3vG7R5ZO+tNCGjrn0hxxx5XoY2oq9LDVnJxChvSp rnBXCJzZlxCPj6FOX7KVIFf6G/WRZelqoCRKpnE+Qu7YE9wQJrLEw8OoTcVVUNgj NMkCvioIewIDAQABo24wbDAOBgNVHQ8BAf8EBAMCAqQwDwYDVR0TAQH/BAUwAwEB /zBJBgNVHQ4EQgRAKDKKSc4ckvAmJwq3lbkiWNY4X/15AI+nF1GUbEUdYcYhSP5c Ybdwbs4gr+a8qmQ2s4W0LqXBWYhx4oW52sk23jANBgkqhkiG9w0BAQsFAAOCAQEA FGFApiiZJGruMR8hBQEVftybmXk464QTNBCAIlohWJQRgmNgRfzfP2cYul688nde VawsR5SStYcWQvfcUqI6h6OCUG6iIo5zvjLnrpNG0q4TH60FUIqyn4jUyEK6LzxH ROmicK0AGZNLlssdNHJw9FUlQxhFGI0W60Q2Pj4srf5mVXKduU5Ds5foWIcCRlip Cq5mB0VCYedjz7QmrftM70hI2SDJpStgpTEcU7UKRYZ4Emln9zpElsOdu5fPmZ7L oUP6GRG/9UoXSpAt1vQfjPyPYSCCjA/9vDQvdX14LHWAbA4n/qKDxdd5Gs4zxbVD 9khooI/BAsQKBzCj/J1Vcg== -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- MIIEADCCAuigAwIBAgIIXerc4eIiTbAwDQYJKoZIhvcNAQELBQAwJjESMBAGA1UE CxMJb3BlbnNoaWZ0MRAwDgYDVQQDEwdyb290LWNhMB4XDTI2MDQyMjEzMTQ1OFoX DTI3MDQyMjEzMTQ1OFowMDESMBAGA1UEChMJb3BlbnNoaWZ0MRowGAYDVQQDExFv cGVuc2hpZnQtaW5ncmVzczCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEB ANcWYpqrh1NCdsd2cNWWcn9AHIwwJDlqO8T6VLnDpHdvBowABz+5WErxgdMlc6wQ MZbNTiruGqcIEb7p8oIrhxXsDne4oAdVDIOjI9OY3mEuMc5hhSQEXaT08GqCSXPy 76tiYtxQIo1c9sJ8Y2Zk8Mne1e+Kl+zgbKV4PFDbmH3GMDIJQDqtfowuKLkObIgp 609Of0uJDVFuel3hJASiidPYmdeFFkD1JlJ0w6tZMJ/M6olW9KFI8I1RX+Y54x5W 3lMpQGL/wDgItCmVaxCxbJay78CmtDVjo02w/nBn/whm0ZJuY0q1zlw7rCn+edOo FKoYksUc4CQkNdk7TabcvwMCAwEAAaOCASYwggEiMA4GA1UdDwEB/wQEAwIFoDAd BgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDAYDVR0TAQH/BAIwADBJBgNV HQ4EQgRAdk9dbxN1OKSldQTxQxwq5GsW7uBIx1wOjRpsh8Jddm+yiJY5ARixqYuH IEn8fNzbfDnlIJuVQDHU9M0QND9XYDBLBgNVHSMERDBCgEAoMopJzhyS8CYnCreV uSJY1jhf/XkAj6cXUZRsRR1hxiFI/lxht3BuziCv5ryqZDazhbQupcFZiHHihbna yTbeMEsGA1UdEQREMEKCQCouYXBwcy5iNzNiNTIxZi03NDFiLTRmYWQtOGRkZC00 ZjlkZmNlYjU4ZTMucHJvZC5rb25mbHV4ZWFhcy5jb20wDQYJKoZIhvcNAQELBQAD ggEBAAQSuUI745nTN/trc9Sqi1Y3hTubVBd+FOegp00no+/m/YFaQU35f8ehybCh 3MjAodRImrizRQq2pANuES2Sj3Dg/ENCSh3vhJdB5zcU7KKplaoQEJBAq233VBoo p+NY9wajav+JnsQBhM2lqsVut1yQlOxkiTprnWjZTmztWAZwwOnYT3aGAOurW/rx gLyamk4VREisYlKlpIQ+fnOzeaHh1GQKsAdf2/QXeLVDr268NaF62v/0aKB7pggs 5LllyFR/Whci8qYdC7weBi2wBSGWDx/q+Hx2NHe+9LthtxkR7GcWO6sAParHQ/6y mVoFO4ZmdI8Xw9lhTb8UpH3qu1k= -----END CERTIFICATE----- kind: ConfigMap metadata: annotations: kubernetes.io/description: Contains a CA bundle that can be used to verify the kube-apiserver when using internal endpoints such as the internal service IP or kubernetes.default.svc. No other usage is guaranteed across distributions of Kubernetes clusters. creationTimestamp: "2026-04-22T13:20:16Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:ca.crt: {} f:metadata: f:annotations: .: {} f:kubernetes.io/description: {} manager: kube-controller-manager operation: Update time: "2026-04-22T13:20:16Z" name: kube-root-ca.crt namespace: openshift-multus resourceVersion: "4108" uid: c17aa477-4de8-4d95-ab2a-615408b6deb8 - apiVersion: v1 data: daemon-config.json: | { "cniVersion": "0.3.1", "chrootDir": "/hostroot", "logToStderr": true, "logLevel": "verbose", "binDir": "/var/lib/cni/bin", "perNodeCertificate": { "enabled": true, "bootstrapKubeconfig": "/var/lib/kubelet/kubeconfig", "certDir": "/etc/cni/multus/certs", "certDuration": "24h" }, "cniConfigDir": "/host/etc/cni/net.d", "multusConfigFile": "auto", "multusAutoconfigDir": "/host/run/multus/cni/net.d", "namespaceIsolation": true, "globalNamespaces": "default,openshift-multus,openshift-sriov-network-operator,openshift-cnv", "readinessindicatorfile": "/host/run/multus/cni/net.d/10-ovn-kubernetes.conf", "daemonSocketDir": "/run/multus/socket", "socketDir": "/host/run/multus/socket", "auxiliaryCNIChainName": "vendor-cni-chain" } kind: ConfigMap metadata: creationTimestamp: "2026-04-22T13:20:05Z" labels: app: multus tier: node managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:daemon-config.json: {} f:metadata: f:labels: f:app: {} f:tier: {} f:ownerReferences: k:{"uid":"fa6bbada-0721-4801-918e-c55e4d4f91f6"}: {} manager: cluster-network-operator/operconfig operation: Apply time: "2026-04-22T13:20:05Z" name: multus-daemon-config namespace: openshift-multus ownerReferences: - apiVersion: operator.openshift.io/v1 blockOwnerDeletion: true controller: true kind: Network name: cluster uid: fa6bbada-0721-4801-918e-c55e4d4f91f6 resourceVersion: "3605" uid: 157bd1d6-e20b-4f25-bece-69dac05c146e - apiVersion: v1 data: service-ca.crt: | -----BEGIN CERTIFICATE----- MIIDUTCCAjmgAwIBAgIIO/Fc9P1FpZAwDQYJKoZIhvcNAQELBQAwNjE0MDIGA1UE Awwrb3BlbnNoaWZ0LXNlcnZpY2Utc2VydmluZy1zaWduZXJAMTc3Njg2NDEwMzAe Fw0yNjA0MjIxMzIxNDJaFw0yODA2MjAxMzIxNDNaMDYxNDAyBgNVBAMMK29wZW5z aGlmdC1zZXJ2aWNlLXNlcnZpbmctc2lnbmVyQDE3NzY4NjQxMDMwggEiMA0GCSqG SIb3DQEBAQUAA4IBDwAwggEKAoIBAQDPx2UfylIHiFE/WXCem0FqTdzbGG3tOq6m V32FbU/VZVoWxwIRuQLsnYyS8cTcDitpsQ3qydPyA2VvImi483hc0o39E3AOukSA WLs1pB+OBYg2DeS2UTDUuQnH9AythxGU3OyqgYTBz3MOtGwLHC8f2BrdcjkfLsM+ XtJ53fYgj/Pnu+nRoBoIWg++FRUBHyrZeH1/vUFhokEvthsWnew2QkyhW9jOb1sH c/kGVnG2uFRXXt1gmV48+VaJGLwLNADhdhcRxjIqtXuxuod1ofwjOBxy3i0hsb0D Xa6TTlu+OGZdSr25A3iJjdGubTcya8aReGSCJp3yCxQJj5hhIKelAgMBAAGjYzBh MA4GA1UdDwEB/wQEAwICpDAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBTUECQv lRVYFFCwI8IyadoxrK2TnTAfBgNVHSMEGDAWgBTUECQvlRVYFFCwI8IyadoxrK2T nTANBgkqhkiG9w0BAQsFAAOCAQEAinCIR/TRfr/H72JatbfQTLh7mvwz5JyXSPQb x8F3a/ak6rekLnr2WUNN8FFwISUhShDD3XznIgx6r7MamSpf2GtYoZFNKsY5iOpz fDnoSdeh67S/meoqstoSoMMAktW1oNNoJ2pKOafZeyw+Hzvh29sg6Txt67+1xL3J +rFkKJfJ7I8/F88x2kLdBhjfKRCOiYK12itRiCwCnypABsS6U+0SN10PqQUBG6La 9cBJDvJBihdEpJxVZTPb1GYvccNZZH+HZVcPYc+G5KsyuM3vlDtz9m3XZLazNyky JQJeILCFqPrV6mkgkQBhFN/L3z4iG+hg2gbIJKIHAG3t+UCkkg== -----END CERTIFICATE----- kind: ConfigMap metadata: annotations: service.beta.openshift.io/inject-cabundle: "true" creationTimestamp: "2026-04-22T13:20:16Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: {} f:metadata: f:annotations: .: {} f:service.beta.openshift.io/inject-cabundle: {} manager: kube-controller-manager operation: Update time: "2026-04-22T13:20:16Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:service-ca.crt: {} manager: service-ca-operator operation: Update time: "2026-04-22T13:21:56Z" name: openshift-service-ca.crt namespace: openshift-multus resourceVersion: "6951" uid: 08f4cf6b-38ad-4f10-8410-0844563ff5bb - apiVersion: v1 data: whereabouts.conf: | { "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/etc/kubernetes/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "reconciler_cron_expression": "30 4 * * *", "log_level": "verbose", "configuration_path": "/etc/kubernetes/cni/net.d/whereabouts.d" } kind: ConfigMap metadata: creationTimestamp: "2026-04-22T13:20:05Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:whereabouts.conf: {} f:metadata: f:ownerReferences: k:{"uid":"fa6bbada-0721-4801-918e-c55e4d4f91f6"}: {} manager: cluster-network-operator/operconfig operation: Apply time: "2026-04-22T13:20:05Z" name: whereabouts-flatfile-config namespace: openshift-multus ownerReferences: - apiVersion: operator.openshift.io/v1 blockOwnerDeletion: true controller: true kind: Network name: cluster uid: fa6bbada-0721-4801-918e-c55e4d4f91f6 resourceVersion: "3603" uid: afb77e85-a29f-44a6-87c1-bf8d1f6d3e36 kind: ConfigMapList metadata: resourceVersion: "27181"