--- apiVersion: v1 items: - apiVersion: v1 data: cnibincopy.sh: |- #!/bin/bash set -e function log() { echo "$(date --iso-8601=seconds) [cnibincopy] ${1}" } DESTINATION_DIRECTORY=/host/opt/cni/bin/ # Perform validation of usage if [ -z "$RHEL8_SOURCE_DIRECTORY" ] || [ -z "$RHEL9_SOURCE_DIRECTORY" ] || [ -z "$DEFAULT_SOURCE_DIRECTORY" ]; then log "FATAL ERROR: You must set env variables: RHEL8_SOURCE_DIRECTORY, RHEL9_SOURCE_DIRECTORY, DEFAULT_SOURCE_DIRECTORY" exit 1 fi if [ ! -d "$DESTINATION_DIRECTORY" ]; then log "FATAL ERROR: Destination directory ($DESTINATION_DIRECTORY) does not exist" exit 1 fi # Collect host OS information . /host/etc/os-release rhelmajor= # detect which version we're using in order to copy the proper binaries case "${ID}" in rhcos|scos) RHEL_VERSION=$(echo "${CPE_NAME}" | cut -f 5 -d :) rhelmajor=$(echo $RHEL_VERSION | sed -E 's/([0-9]+)\.{1}[0-9]+(\.[0-9]+)?/\1/') ;; rhel|centos) rhelmajor=$(echo "${VERSION_ID}" | cut -f 1 -d .) ;; fedora) if [ "${VARIANT_ID}" == "coreos" ]; then rhelmajor=8 else log "FATAL ERROR: Unsupported Fedora variant=${VARIANT_ID}" exit 1 fi ;; *) log "FATAL ERROR: Unsupported OS ID=${ID}"; exit 1 ;; esac # Set which directory we'll copy from, detect if it exists sourcedir= founddir=false case "${rhelmajor}" in 8) if [ -d "${RHEL8_SOURCE_DIRECTORY}" ]; then sourcedir=${RHEL8_SOURCE_DIRECTORY} founddir=true fi ;; 9) if [ -d "${RHEL9_SOURCE_DIRECTORY}" ]; then sourcedir=${RHEL9_SOURCE_DIRECTORY} founddir=true fi ;; *) log "ERROR: RHEL Major Version Unsupported, rhelmajor=${rhelmajor}" ;; esac # When it doesn't exist, fall back to the original directory. if [ "$founddir" == false ]; then log "Source directory unavailable for OS version: ${rhelmajor}" sourcedir=$DEFAULT_SOURCE_DIRECTORY fi # Use a subdirectory called "upgrade" so we can atomically move fully copied files. # We now use --remove-destination after running into an issue with -f not working over symlinks UPGRADE_DIRECTORY=${DESTINATION_DIRECTORY}upgrade_$(uuidgen) rm -Rf $UPGRADE_DIRECTORY mkdir -p $UPGRADE_DIRECTORY cp -r --remove-destination ${sourcedir}* $UPGRADE_DIRECTORY if [ $? -eq 0 ]; then log "Successfully copied files in ${sourcedir} to $UPGRADE_DIRECTORY" else log "Failed to copy files in ${sourcedir} to $UPGRADE_DIRECTORY" rm -Rf $UPGRADE_DIRECTORY exit 1 fi mv -f $UPGRADE_DIRECTORY/* ${DESTINATION_DIRECTORY}/ if [ $? -eq 0 ]; then log "Successfully moved files in $UPGRADE_DIRECTORY to ${DESTINATION_DIRECTORY}" else log "Failed to move files in $UPGRADE_DIRECTORY to ${DESTINATION_DIRECTORY}" rm -Rf $UPGRADE_DIRECTORY exit 1 fi rm -Rf $UPGRADE_DIRECTORY kind: ConfigMap metadata: annotations: kubernetes.io/description: | This is a script used to copy CNI binaries based on host OS release.openshift.io/version: 4.20.19 creationTimestamp: "2026-04-22T15:04:39Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:cnibincopy.sh: {} f:metadata: f:annotations: f:kubernetes.io/description: {} f:release.openshift.io/version: {} f:ownerReferences: k:{"uid":"593d7ce4-b285-4d1e-8537-f855002642f6"}: {} manager: cluster-network-operator/operconfig operation: Apply time: "2026-04-22T15:04:39Z" name: cni-copy-resources namespace: openshift-multus ownerReferences: - apiVersion: operator.openshift.io/v1 blockOwnerDeletion: true controller: true kind: Network name: cluster uid: 593d7ce4-b285-4d1e-8537-f855002642f6 resourceVersion: "2429" uid: 8d92615b-06fb-46d1-81a6-985608ccf6da - apiVersion: v1 data: allowlist.conf: |- ^net.ipv4.conf.IFNAME.accept_redirects$ ^net.ipv4.conf.IFNAME.accept_source_route$ ^net.ipv4.conf.IFNAME.arp_accept$ ^net.ipv4.conf.IFNAME.arp_notify$ ^net.ipv4.conf.IFNAME.disable_policy$ ^net.ipv4.conf.IFNAME.secure_redirects$ ^net.ipv4.conf.IFNAME.send_redirects$ ^net.ipv6.conf.IFNAME.accept_ra$ ^net.ipv6.conf.IFNAME.accept_redirects$ ^net.ipv6.conf.IFNAME.accept_source_route$ ^net.ipv6.conf.IFNAME.arp_accept$ ^net.ipv6.conf.IFNAME.arp_notify$ ^net.ipv6.neigh.IFNAME.base_reachable_time_ms$ ^net.ipv6.neigh.IFNAME.retrans_time_ms$ kind: ConfigMap metadata: annotations: kubernetes.io/description: | Sysctl allowlist for nodes. release.openshift.io/version: 4.20.19 creationTimestamp: "2026-04-22T15:04:39Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:allowlist.conf: {} f:metadata: f:annotations: .: {} f:kubernetes.io/description: {} f:release.openshift.io/version: {} manager: network-operator operation: Update time: "2026-04-22T15:04:39Z" name: cni-sysctl-allowlist namespace: openshift-multus resourceVersion: "2423" uid: d0d5a920-f89a-462a-a6e6-57fb8b46973b - apiVersion: v1 data: allowlist.conf: |- ^net.ipv4.conf.IFNAME.accept_redirects$ ^net.ipv4.conf.IFNAME.accept_source_route$ ^net.ipv4.conf.IFNAME.arp_accept$ ^net.ipv4.conf.IFNAME.arp_notify$ ^net.ipv4.conf.IFNAME.disable_policy$ ^net.ipv4.conf.IFNAME.secure_redirects$ ^net.ipv4.conf.IFNAME.send_redirects$ ^net.ipv6.conf.IFNAME.accept_ra$ ^net.ipv6.conf.IFNAME.accept_redirects$ ^net.ipv6.conf.IFNAME.accept_source_route$ ^net.ipv6.conf.IFNAME.arp_accept$ ^net.ipv6.conf.IFNAME.arp_notify$ ^net.ipv6.neigh.IFNAME.base_reachable_time_ms$ ^net.ipv6.neigh.IFNAME.retrans_time_ms$ kind: ConfigMap metadata: annotations: kubernetes.io/description: | Sysctl allowlist for nodes. release.openshift.io/version: 4.20.19 creationTimestamp: "2026-04-22T15:04:39Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:allowlist.conf: {} f:metadata: f:annotations: f:kubernetes.io/description: {} f:release.openshift.io/version: {} f:ownerReferences: k:{"uid":"593d7ce4-b285-4d1e-8537-f855002642f6"}: {} manager: cluster-network-operator/operconfig operation: Apply time: "2026-04-22T15:04:39Z" name: default-cni-sysctl-allowlist namespace: openshift-multus ownerReferences: - apiVersion: operator.openshift.io/v1 blockOwnerDeletion: true controller: true kind: Network name: cluster uid: 593d7ce4-b285-4d1e-8537-f855002642f6 resourceVersion: "2422" uid: 581dc484-e14d-4546-943f-82da2c38f426 - apiVersion: v1 data: ca.crt: | -----BEGIN CERTIFICATE----- MIIDPDCCAiSgAwIBAgIIEScnLlyn6+kwDQYJKoZIhvcNAQELBQAwJjESMBAGA1UE CxMJb3BlbnNoaWZ0MRAwDgYDVQQDEwdyb290LWNhMB4XDTI2MDQyMjE1MDIxNVoX DTM2MDQxOTE1MDIxNVowJjESMBAGA1UECxMJb3BlbnNoaWZ0MRAwDgYDVQQDEwdy b290LWNhMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAxfyMmuLe2oOt M1VMEuFv18H6iBFoGUWEeEvhgBUzVqsau8irJJgchI586NUo3yoNLRGJlv+3lgFR p/uxlYeiSmljWCCtLIU7lDWxJ8QipQUrLIJAB6vXDNXWBmnoQ1Galn8jiocNY9u6 UuFOf8JFGBbusqa3epipk3sS1nK1cwjHWSdZkrrcuApNt4XRYDbxnxQeco3IXcxr JFDoOvT6rmMs+dICm/PmX7ybC52mE4Nkk15po8PQZNuxUWnwCIuO5CQV7xqw/MPz SJOu28DZV6NjuDxW4VLDTwMG51SJP3tioGZt0QRkk2tKM7gKqWOxIpqnO6UJXb5U QiTncHEguQIDAQABo24wbDAOBgNVHQ8BAf8EBAMCAqQwDwYDVR0TAQH/BAUwAwEB /zBJBgNVHQ4EQgRAEBAaMUPr6iHGHlxHtIux7rRnGAQyx5vfIx6kguRztsnh27Tz nW8SAg++SNtcANZg/yJpz97wbr63BUTfUoP5PDANBgkqhkiG9w0BAQsFAAOCAQEA L4rgebQphQ93c/QXEHBgzHFreiNugxIO3x0Oyc2Cps+V76fHYjyaD9uJ+m2OfpoL wASJqqrIgmj8iqfJNTB04KeYC9IQ+InbcvP3YH9HHx+l4uyuN6fzY37PVcQZAALl hLOs73RlFtmaSe0xadxzYpX9wUCnxBJGuyP6fmzdYwG+nFQrfavExsqU5gh7I4iX +XOY4cSHV3D3n/x0EqQMrM8biL/Rzh8ink7vCCgFUx4ELoHwCLVaLlXFkqV1mKTn C9q4miQ7stB6jPWEt8D5bPoKg9yKHrynew8AgGH+IfBdHnL8rrBvcBPWagrQPPiS l9fjEtCWKk5zjhQF6oA/ow== -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- MIIEADCCAuigAwIBAgIIEuNfotNFW2cwDQYJKoZIhvcNAQELBQAwJjESMBAGA1UE CxMJb3BlbnNoaWZ0MRAwDgYDVQQDEwdyb290LWNhMB4XDTI2MDQyMjE1MDI1MFoX DTI3MDQyMjE1MDI1MFowMDESMBAGA1UEChMJb3BlbnNoaWZ0MRowGAYDVQQDExFv cGVuc2hpZnQtaW5ncmVzczCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEB AOh4fIxEX7hKBGmhC638PH5edSlN1+WYooKYOmJfjmQ1a6iUOgBKS94PrwyNdyd/ wqQQBTnVPrhYaDmCHIDlHuwILgRz8tBAdRFutDnwajQ0A/x/g4kUnosSu4ql/pC5 il6hpNqRLLKv/akPhpNCy2u0GXF6w5b/uD2jR6pMLeviowjk6Hq+EA8x4hKGvcPM X/+pUiR1VL/32AJC/2TW1Lric5gwSMJVuDQsMKCGlbxoyqV9rLPZqNj9XZr0SslR I2u9tdAnDFFsgA/3Y46K2pZb7ec8CSuKT2/Fr5xmmtFI2tZoXXjMF6SrFttAOcd5 piqpVnWK16U0yTmF4ysrd4sCAwEAAaOCASYwggEiMA4GA1UdDwEB/wQEAwIFoDAd BgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDAYDVR0TAQH/BAIwADBJBgNV HQ4EQgRAS4lkCGwyAE+A4/S6rdA5FDP3CECEV/VeNOz+SmaUrLodMwn6jR+X8nM+ 9nmzhQ1ATqmHBboMxcfpBWzGRO95ZDBLBgNVHSMERDBCgEAQEBoxQ+vqIcYeXEe0 i7HutGcYBDLHm98jHqSC5HO2yeHbtPOdbxICD75I21wA1mD/ImnP3vBuvrcFRN9S g/k8MEsGA1UdEQREMEKCQCouYXBwcy43YjYwN2JmMi01M2VmLTQ2ODMtODYyOS0w MDllNDY5ODdjZjMucHJvZC5rb25mbHV4ZWFhcy5jb20wDQYJKoZIhvcNAQELBQAD ggEBACQFtQ1k+9B9/8X527EZ5CAbFf1q334t14TNfs0VM92ACAp+PUH3nfNKn3e4 b7tpzETjlfdSivQLRp2H5jgWzd5GQiF5BWeWVc6pEkntitr6BuT2C/R/vtp+Ic9m QdEiRmZs+lBcgXF4pcUkQ/KCSrrbj25P7KS+WCbu/NY7oO1FWqLneOoxRDUZWzlM cHR/JxY1AGQ+8ANJqaFu4XKbBgsaALnoYd7PnSmAnp4VI8uloQOXM+SrRR91NYgA KZuvva32f7UR0oAPV0ubG37F+9GLNXfy8AZKWdkNou9EOrkrbhJZd9PcpgalDwDw PllbgWt3XFcFwmsBP54MdEFBDAY= -----END CERTIFICATE----- kind: ConfigMap metadata: annotations: kubernetes.io/description: Contains a CA bundle that can be used to verify the kube-apiserver when using internal endpoints such as the internal service IP or kubernetes.default.svc. No other usage is guaranteed across distributions of Kubernetes clusters. creationTimestamp: "2026-04-22T15:04:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:ca.crt: {} f:metadata: f:annotations: .: {} f:kubernetes.io/description: {} manager: kube-controller-manager operation: Update time: "2026-04-22T15:05:15Z" name: kube-root-ca.crt namespace: openshift-multus resourceVersion: "3188" uid: 2e1f4245-f2ce-41f5-a751-c493556cc412 - apiVersion: v1 data: daemon-config.json: | { "cniVersion": "0.3.1", "chrootDir": "/hostroot", "logToStderr": true, "logLevel": "verbose", "binDir": "/var/lib/cni/bin", "perNodeCertificate": { "enabled": true, "bootstrapKubeconfig": "/var/lib/kubelet/kubeconfig", "certDir": "/etc/cni/multus/certs", "certDuration": "24h" }, "cniConfigDir": "/host/etc/cni/net.d", "multusConfigFile": "auto", "multusAutoconfigDir": "/host/run/multus/cni/net.d", "namespaceIsolation": true, "globalNamespaces": "default,openshift-multus,openshift-sriov-network-operator,openshift-cnv", "readinessindicatorfile": "/host/run/multus/cni/net.d/10-ovn-kubernetes.conf", "daemonSocketDir": "/run/multus/socket", "socketDir": "/host/run/multus/socket", "auxiliaryCNIChainName": "vendor-cni-chain" } kind: ConfigMap metadata: creationTimestamp: "2026-04-22T15:04:39Z" labels: app: multus tier: node managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:daemon-config.json: {} f:metadata: f:labels: f:app: {} f:tier: {} f:ownerReferences: k:{"uid":"593d7ce4-b285-4d1e-8537-f855002642f6"}: {} manager: cluster-network-operator/operconfig operation: Apply time: "2026-04-22T15:04:39Z" name: multus-daemon-config namespace: openshift-multus ownerReferences: - apiVersion: operator.openshift.io/v1 blockOwnerDeletion: true controller: true kind: Network name: cluster uid: 593d7ce4-b285-4d1e-8537-f855002642f6 resourceVersion: "2436" uid: 0c463745-c98c-442f-87fb-950425b490b8 - apiVersion: v1 data: service-ca.crt: | -----BEGIN CERTIFICATE----- MIIDUTCCAjmgAwIBAgIIeu7lphB1aigwDQYJKoZIhvcNAQELBQAwNjE0MDIGA1UE Awwrb3BlbnNoaWZ0LXNlcnZpY2Utc2VydmluZy1zaWduZXJAMTc3Njg3MDUwNzAe Fw0yNjA0MjIxNTA4MjZaFw0yODA2MjAxNTA4MjdaMDYxNDAyBgNVBAMMK29wZW5z aGlmdC1zZXJ2aWNlLXNlcnZpbmctc2lnbmVyQDE3NzY4NzA1MDcwggEiMA0GCSqG SIb3DQEBAQUAA4IBDwAwggEKAoIBAQDd6ocrIVLXxb4Zfr0zQQ6mLRi3IDHHr1Xy Bq23E67eX62+eb91szSRUV01EIndbPzqpCVh8d23ofob89VcvPbHTkqeVE9gyj97 3mUb6zcMn/8sKu48wYlWgPYLh7EKQ3P/MZtecShqt+cM8nHuL7hBmuSr/YkPaA1r sUFM3lEj5tWVP2omyKkU0GIhmWCX4uKtVSUXaCTY0GnszFiSDmyvL9N6AuFioKmK TDYiuE3tDd7RrVm3ek81orlpRkiRRCjGonmMGXHSxgjuSHxk1gdyDLnJRrTG9/tl foeEqeYzQqrnNJwahNA8RaV9D+XixuWagd4oy6+Z9bsxodVJlRQTAgMBAAGjYzBh MA4GA1UdDwEB/wQEAwICpDAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBR62YzD 1UJx0lmU3xvJ71XdUmMFrjAfBgNVHSMEGDAWgBR62YzD1UJx0lmU3xvJ71XdUmMF rjANBgkqhkiG9w0BAQsFAAOCAQEAimbxhU2d+ztILNFVyZuf/4GInyWnzS6UibK/ FQzv2CmOgvl3pPYJdZnrRCkmhMoDlp5y/tXUUgFWrd3Q2lfYaTct2STl0S2qDxic Xb6ugPL4DgB6yFdIqbBn26HopdudAz3dk7hbMOZlfpD6+wHKbwdD+GK6MxB+Og/p LnyxNejSpT9rd7GLzRozBgzpdG76iQDRFKe5mF82w429U/7exPYGiU2IkjEoj+DV w8Z2WQV5pZr/feO2aQQnXjLodFS77J2AxFHaE1Oe1+eGgflYq4pqQrHU0cAM3PmN 3tU4uSWDe0hp08la4WEgOM7wA+W+19co7L6sFFXqjK46aX83Cg== -----END CERTIFICATE----- kind: ConfigMap metadata: annotations: service.beta.openshift.io/inject-cabundle: "true" creationTimestamp: "2026-04-22T15:04:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: {} f:metadata: f:annotations: .: {} f:service.beta.openshift.io/inject-cabundle: {} manager: kube-controller-manager operation: Update time: "2026-04-22T15:04:36Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:service-ca.crt: {} manager: service-ca-operator operation: Update time: "2026-04-22T15:08:40Z" name: openshift-service-ca.crt namespace: openshift-multus resourceVersion: "7279" uid: de60ce9f-aaa6-44b6-abd0-1376865086f1 - apiVersion: v1 data: whereabouts.conf: | { "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/etc/kubernetes/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "reconciler_cron_expression": "30 4 * * *", "log_level": "verbose", "configuration_path": "/etc/kubernetes/cni/net.d/whereabouts.d" } kind: ConfigMap metadata: creationTimestamp: "2026-04-22T15:04:39Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:whereabouts.conf: {} f:metadata: f:ownerReferences: k:{"uid":"593d7ce4-b285-4d1e-8537-f855002642f6"}: {} manager: cluster-network-operator/operconfig operation: Apply time: "2026-04-22T15:04:39Z" name: whereabouts-flatfile-config namespace: openshift-multus ownerReferences: - apiVersion: operator.openshift.io/v1 blockOwnerDeletion: true controller: true kind: Network name: cluster uid: 593d7ce4-b285-4d1e-8537-f855002642f6 resourceVersion: "2432" uid: 359365fc-6e7b-4ec3-ab75-f15f2688d3ee kind: ConfigMapList metadata: resourceVersion: "27691"