--- apiVersion: v1 items: - apiVersion: v1 data: cnibincopy.sh: |- #!/bin/bash set -e function log() { echo "$(date --iso-8601=seconds) [cnibincopy] ${1}" } DESTINATION_DIRECTORY=/host/opt/cni/bin/ # Perform validation of usage if [ -z "$RHEL8_SOURCE_DIRECTORY" ] || [ -z "$RHEL9_SOURCE_DIRECTORY" ] || [ -z "$DEFAULT_SOURCE_DIRECTORY" ]; then log "FATAL ERROR: You must set env variables: RHEL8_SOURCE_DIRECTORY, RHEL9_SOURCE_DIRECTORY, DEFAULT_SOURCE_DIRECTORY" exit 1 fi if [ ! -d "$DESTINATION_DIRECTORY" ]; then log "FATAL ERROR: Destination directory ($DESTINATION_DIRECTORY) does not exist" exit 1 fi # Collect host OS information . /host/etc/os-release rhelmajor= # detect which version we're using in order to copy the proper binaries case "${ID}" in rhcos|scos) RHEL_VERSION=$(echo "${CPE_NAME}" | cut -f 5 -d :) rhelmajor=$(echo $RHEL_VERSION | sed -E 's/([0-9]+)\.{1}[0-9]+(\.[0-9]+)?/\1/') ;; rhel|centos) rhelmajor=$(echo "${VERSION_ID}" | cut -f 1 -d .) ;; fedora) if [ "${VARIANT_ID}" == "coreos" ]; then rhelmajor=8 else log "FATAL ERROR: Unsupported Fedora variant=${VARIANT_ID}" exit 1 fi ;; *) log "FATAL ERROR: Unsupported OS ID=${ID}"; exit 1 ;; esac # Set which directory we'll copy from, detect if it exists sourcedir= founddir=false case "${rhelmajor}" in 8) if [ -d "${RHEL8_SOURCE_DIRECTORY}" ]; then sourcedir=${RHEL8_SOURCE_DIRECTORY} founddir=true fi ;; 9) if [ -d "${RHEL9_SOURCE_DIRECTORY}" ]; then sourcedir=${RHEL9_SOURCE_DIRECTORY} founddir=true fi ;; *) log "ERROR: RHEL Major Version Unsupported, rhelmajor=${rhelmajor}" ;; esac # When it doesn't exist, fall back to the original directory. if [ "$founddir" == false ]; then log "Source directory unavailable for OS version: ${rhelmajor}" sourcedir=$DEFAULT_SOURCE_DIRECTORY fi # Use a subdirectory called "upgrade" so we can atomically move fully copied files. # We now use --remove-destination after running into an issue with -f not working over symlinks UPGRADE_DIRECTORY=${DESTINATION_DIRECTORY}upgrade_$(uuidgen) rm -Rf $UPGRADE_DIRECTORY mkdir -p $UPGRADE_DIRECTORY cp -r --remove-destination ${sourcedir}* $UPGRADE_DIRECTORY if [ $? -eq 0 ]; then log "Successfully copied files in ${sourcedir} to $UPGRADE_DIRECTORY" else log "Failed to copy files in ${sourcedir} to $UPGRADE_DIRECTORY" rm -Rf $UPGRADE_DIRECTORY exit 1 fi mv -f $UPGRADE_DIRECTORY/* ${DESTINATION_DIRECTORY}/ if [ $? -eq 0 ]; then log "Successfully moved files in $UPGRADE_DIRECTORY to ${DESTINATION_DIRECTORY}" else log "Failed to move files in $UPGRADE_DIRECTORY to ${DESTINATION_DIRECTORY}" rm -Rf $UPGRADE_DIRECTORY exit 1 fi rm -Rf $UPGRADE_DIRECTORY kind: ConfigMap metadata: annotations: kubernetes.io/description: | This is a script used to copy CNI binaries based on host OS release.openshift.io/version: 4.20.19 creationTimestamp: "2026-04-22T15:04:39Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:cnibincopy.sh: {} f:metadata: f:annotations: f:kubernetes.io/description: {} f:release.openshift.io/version: {} f:ownerReferences: k:{"uid":"6ba009e8-496c-4354-9e9b-c5a5177f6f01"}: {} manager: cluster-network-operator/operconfig operation: Apply time: "2026-04-22T15:04:39Z" name: cni-copy-resources namespace: openshift-multus ownerReferences: - apiVersion: operator.openshift.io/v1 blockOwnerDeletion: true controller: true kind: Network name: cluster uid: 6ba009e8-496c-4354-9e9b-c5a5177f6f01 resourceVersion: "2424" uid: c1d12e82-a637-4f23-8a28-bc9e7da3724c - apiVersion: v1 data: allowlist.conf: |- ^net.ipv4.conf.IFNAME.accept_redirects$ ^net.ipv4.conf.IFNAME.accept_source_route$ ^net.ipv4.conf.IFNAME.arp_accept$ ^net.ipv4.conf.IFNAME.arp_notify$ ^net.ipv4.conf.IFNAME.disable_policy$ ^net.ipv4.conf.IFNAME.secure_redirects$ ^net.ipv4.conf.IFNAME.send_redirects$ ^net.ipv6.conf.IFNAME.accept_ra$ ^net.ipv6.conf.IFNAME.accept_redirects$ ^net.ipv6.conf.IFNAME.accept_source_route$ ^net.ipv6.conf.IFNAME.arp_accept$ ^net.ipv6.conf.IFNAME.arp_notify$ ^net.ipv6.neigh.IFNAME.base_reachable_time_ms$ ^net.ipv6.neigh.IFNAME.retrans_time_ms$ kind: ConfigMap metadata: annotations: kubernetes.io/description: | Sysctl allowlist for nodes. release.openshift.io/version: 4.20.19 creationTimestamp: "2026-04-22T15:04:38Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:allowlist.conf: {} f:metadata: f:annotations: .: {} f:kubernetes.io/description: {} f:release.openshift.io/version: {} manager: network-operator operation: Update time: "2026-04-22T15:04:38Z" name: cni-sysctl-allowlist namespace: openshift-multus resourceVersion: "2410" uid: fba54c0e-4d8a-402a-aa8a-3227ed8c83f2 - apiVersion: v1 data: allowlist.conf: |- ^net.ipv4.conf.IFNAME.accept_redirects$ ^net.ipv4.conf.IFNAME.accept_source_route$ ^net.ipv4.conf.IFNAME.arp_accept$ ^net.ipv4.conf.IFNAME.arp_notify$ ^net.ipv4.conf.IFNAME.disable_policy$ ^net.ipv4.conf.IFNAME.secure_redirects$ ^net.ipv4.conf.IFNAME.send_redirects$ ^net.ipv6.conf.IFNAME.accept_ra$ ^net.ipv6.conf.IFNAME.accept_redirects$ ^net.ipv6.conf.IFNAME.accept_source_route$ ^net.ipv6.conf.IFNAME.arp_accept$ ^net.ipv6.conf.IFNAME.arp_notify$ ^net.ipv6.neigh.IFNAME.base_reachable_time_ms$ ^net.ipv6.neigh.IFNAME.retrans_time_ms$ kind: ConfigMap metadata: annotations: kubernetes.io/description: | Sysctl allowlist for nodes. release.openshift.io/version: 4.20.19 creationTimestamp: "2026-04-22T15:04:38Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:allowlist.conf: {} f:metadata: f:annotations: f:kubernetes.io/description: {} f:release.openshift.io/version: {} f:ownerReferences: k:{"uid":"6ba009e8-496c-4354-9e9b-c5a5177f6f01"}: {} manager: cluster-network-operator/operconfig operation: Apply time: "2026-04-22T15:04:38Z" name: default-cni-sysctl-allowlist namespace: openshift-multus ownerReferences: - apiVersion: operator.openshift.io/v1 blockOwnerDeletion: true controller: true kind: Network name: cluster uid: 6ba009e8-496c-4354-9e9b-c5a5177f6f01 resourceVersion: "2406" uid: 754206f1-f1d0-4746-88fd-d8aaceeaac87 - apiVersion: v1 data: ca.crt: | -----BEGIN CERTIFICATE----- MIIDPDCCAiSgAwIBAgIIYtCHDqgIUjswDQYJKoZIhvcNAQELBQAwJjESMBAGA1UE CxMJb3BlbnNoaWZ0MRAwDgYDVQQDEwdyb290LWNhMB4XDTI2MDQyMjE1MDIxMloX DTM2MDQxOTE1MDIxMlowJjESMBAGA1UECxMJb3BlbnNoaWZ0MRAwDgYDVQQDEwdy b290LWNhMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAnMcz4Il027Ri MseggVXEM8uOeHPghpxUU0abiInTkwPYCrRGIz/CvNq1BCygRCAY8+fdukwH/1AL 1Q+N+w2ZYHEVUVvVSK1oVGXn53PgR4HYx5YpKwl9u+mSM1UJO9bsZ0WD3f4zaYiz WWyXIr24x4FsQd/q/twlj58qiuVLahMwqaDgB2SOv2GfdmAtbdoIHHGVNPNrDcMA qdEz6gd04FjKA20122vWHKQNk+LbLtrU3xzSz/Nlo6UivogHmpe4bHth3cVaXjNc vsZHU151yawfkH2r/WWc254+fjxmm6UWBRuPjGSTF5yaPi77L+U5CfZFZF92gQjJ zdN1rxA+CQIDAQABo24wbDAOBgNVHQ8BAf8EBAMCAqQwDwYDVR0TAQH/BAUwAwEB /zBJBgNVHQ4EQgRAF9/UUb8Nl1mHT9Bn5QCPW859F3e2hsAy5PjTWmDHXQw/hOjJ +Q5KXX9xLgec1KF+SU1El1B7nhUtO5lq18FERzANBgkqhkiG9w0BAQsFAAOCAQEA SwZVcnt8ZldmSu+yZrDBvMy08GhVK0GAWaXOLwDBLMD1cyzCm/DiOuEJKK9eKSNj HIz3TRy176BYmVlG5SEh8Ow01m/fABFtLA0zfnPbgwPFeW4KZgOeUl/mKm4OHT93 98mjEPUZ+/kuRxCstlwXQBlhJ3DeAiMtrA9mv+1G/IU5NmctWIxJTPGhyLvsymDX dm3KEcD4hH1VFWGOF3YQrxIMDYreYEVeXH14ZFLs+5c89rNB2AYKDwdKMrZSZpNE UJ/6D+n7LYRKsyCdIJ45VETkCxYDsDORvMqcGG5YZEwaPhzh9rtjQbq+Rjcr8RjK NLw11JoH3f5JT9x+vR192g== -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- MIIEADCCAuigAwIBAgIIVY3kO/l9yckwDQYJKoZIhvcNAQELBQAwJjESMBAGA1UE CxMJb3BlbnNoaWZ0MRAwDgYDVQQDEwdyb290LWNhMB4XDTI2MDQyMjE1MDI0MFoX DTI3MDQyMjE1MDI0MFowMDESMBAGA1UEChMJb3BlbnNoaWZ0MRowGAYDVQQDExFv cGVuc2hpZnQtaW5ncmVzczCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEB AMctGWHS6OXSUw7avUcMF60xUeTSuAl/0ikpnPI1ztTfxl2n2V0Va/SvvldG6AUb MRi3vGbkDM9D5oDAEuOeshWU+lukeDbbe5ewaV4X174MbBbvvUzaivW0UcxFEy2u hXaqPTK07KKbAGs+3+XO/4l+/Ndx1I/6IqwmI+ujcdm6DM4zBJ/lx8LWqsceqWP3 9QSK4D31zO2fCIykrJpx+d0kueK8OpXRcXWpMJZysHuePYCSQYlUjwIHzht4kJy6 kr4WG27JvRuWkLQ4njSo1rz+wVzSPynBxEmrDnUgILSKHqzJ2AGDPg/aRwsKb8Gh zr9R6ao48zgnJJZKWpBtAxECAwEAAaOCASYwggEiMA4GA1UdDwEB/wQEAwIFoDAd BgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDAYDVR0TAQH/BAIwADBJBgNV HQ4EQgRAsQw5WVv3leoTmhKZRwPZ1UjzGfZGO9hxcqWt9Gk/cN3GVdDt2i+tPbiU hgp/op/oZEoL6Fb43TURvy9K/aeQCTBLBgNVHSMERDBCgEAX39RRvw2XWYdP0Gfl AI9bzn0Xd7aGwDLk+NNaYMddDD+E6Mn5Dkpdf3EuB5zUoX5JTUSXUHueFS07mWrX wURHMEsGA1UdEQREMEKCQCouYXBwcy5kYjI0ZmM4ZS1hNjg4LTQ5ODgtODNhYy01 MWFiYWRiZjA2YTQucHJvZC5rb25mbHV4ZWFhcy5jb20wDQYJKoZIhvcNAQELBQAD ggEBAJbxWBqr3VMz8S8b2JMPyr2f8C/hfeod3tmq/OIdJ6TGNq5pOw0X92QjPRVA mPdvsjmz2+9ieR4kqeHGAzpTnKR0dDX2eYzHGkfD9PEYBkAg79Wo8A2j+Cmx4OiA NQflDRBXpG7GrbxdTrVeUp8AV7AhjwZ+Lp2tOugVbJVEYRNc6Vx+rk+HMG0b34fx PnIFCcOrj7ULY5lGytMOZzBl8TTij7XIFJt156OmoRbkw8YuyIJpTdWBBLrhZy+c nQOQkSkh5bNzvUe8vuk9BPWrkYZgH3iE5FuWMY0k3w5R3iDCmrCZ2xlOmWqNO13c V+aQRJRrCeHnxsY4gV5MbzaGkU8= -----END CERTIFICATE----- kind: ConfigMap metadata: annotations: kubernetes.io/description: Contains a CA bundle that can be used to verify the kube-apiserver when using internal endpoints such as the internal service IP or kubernetes.default.svc. No other usage is guaranteed across distributions of Kubernetes clusters. creationTimestamp: "2026-04-22T15:04:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:ca.crt: {} f:metadata: f:annotations: .: {} f:kubernetes.io/description: {} manager: kube-controller-manager operation: Update time: "2026-04-22T15:05:12Z" name: kube-root-ca.crt namespace: openshift-multus resourceVersion: "4419" uid: af280a39-9360-411a-81a5-62831ff17bf0 - apiVersion: v1 data: daemon-config.json: | { "cniVersion": "0.3.1", "chrootDir": "/hostroot", "logToStderr": true, "logLevel": "verbose", "binDir": "/var/lib/cni/bin", "perNodeCertificate": { "enabled": true, "bootstrapKubeconfig": "/var/lib/kubelet/kubeconfig", "certDir": "/etc/cni/multus/certs", "certDuration": "24h" }, "cniConfigDir": "/host/etc/cni/net.d", "multusConfigFile": "auto", "multusAutoconfigDir": "/host/run/multus/cni/net.d", "namespaceIsolation": true, "globalNamespaces": "default,openshift-multus,openshift-sriov-network-operator,openshift-cnv", "readinessindicatorfile": "/host/run/multus/cni/net.d/10-ovn-kubernetes.conf", "daemonSocketDir": "/run/multus/socket", "socketDir": "/host/run/multus/socket", "auxiliaryCNIChainName": "vendor-cni-chain" } kind: ConfigMap metadata: creationTimestamp: "2026-04-22T15:04:39Z" labels: app: multus tier: node managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:daemon-config.json: {} f:metadata: f:labels: f:app: {} f:tier: {} f:ownerReferences: k:{"uid":"6ba009e8-496c-4354-9e9b-c5a5177f6f01"}: {} manager: cluster-network-operator/operconfig operation: Apply time: "2026-04-22T15:04:39Z" name: multus-daemon-config namespace: openshift-multus ownerReferences: - apiVersion: operator.openshift.io/v1 blockOwnerDeletion: true controller: true kind: Network name: cluster uid: 6ba009e8-496c-4354-9e9b-c5a5177f6f01 resourceVersion: "2434" uid: 332535c7-78da-4be9-96bb-9dbd7443c009 - apiVersion: v1 data: service-ca.crt: | -----BEGIN CERTIFICATE----- MIIDUTCCAjmgAwIBAgIIBULQMDIaXncwDQYJKoZIhvcNAQELBQAwNjE0MDIGA1UE Awwrb3BlbnNoaWZ0LXNlcnZpY2Utc2VydmluZy1zaWduZXJAMTc3Njg3MDY0NDAe Fw0yNjA0MjIxNTEwNDRaFw0yODA2MjAxNTEwNDVaMDYxNDAyBgNVBAMMK29wZW5z aGlmdC1zZXJ2aWNlLXNlcnZpbmctc2lnbmVyQDE3NzY4NzA2NDQwggEiMA0GCSqG SIb3DQEBAQUAA4IBDwAwggEKAoIBAQDEltA4bcW15Rbe7VKcF6xC6GyzoDkI1nBB jaIHyBmNxaydFlhJZIB4zMt6rvteMoBOnFYS5h0MFY4wtMPaOtYXxH3PftqjhOIP WLvrlGJWrjy2wiU6wLCHzze9u1kFflbHmuVklTWW6bHHi3RUQt44qZ0gtTcg5Y/Z tUW+TeRvbYY9YoYRE9ZK8QmMxBp1JRYycgwInnFmSfn8k5JGC+1S3wWRdMupEsZ2 kiW5N/zsK3Bs5zhBDYjlgHPgebAF6NwdeOj1DO9IXLudLC3AdJCgeOyrLlne+70N KZZLhIThoOI93F8y1Uf9YiKpm7eVIly6FPTMZrbaB1FZe7tVKtuRAgMBAAGjYzBh MA4GA1UdDwEB/wQEAwICpDAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBTe7n9e ZItoOlk9OJAQ1svfImJg5zAfBgNVHSMEGDAWgBTe7n9eZItoOlk9OJAQ1svfImJg 5zANBgkqhkiG9w0BAQsFAAOCAQEApfGDDKLp+dLTS9VsCJL+mqEirLLeGlWNbNmi z2Wwkm5fZbyG7d5YrOuyDsdbhtDF8id+ZpOQ4Ff26yfd0EcYrGT26Rtzbl1vvb5y adRGt2yXMYPWma16Nf3g2b65Xgqi1VNjtmMC8s6/qG3BVm86hLqDrcqXwSUQ4Yjd jdvPMWEaOHgaok/PoKtFIi86JqsZTbvzDFVS0BiWC+0qv/qcr5nq1+qjyacgForj bRC/gr0uXUdELFznAnD7XR82LtZjIhMykLxHACJn6rUiJcyC/5LNZVam/Uc9pzzO dkauL/loEw3DAgs27qLbgnAExTGyYmdCLXFoD9FBkulheZhpSw== -----END CERTIFICATE----- kind: ConfigMap metadata: annotations: service.beta.openshift.io/inject-cabundle: "true" creationTimestamp: "2026-04-22T15:04:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: {} f:metadata: f:annotations: .: {} f:service.beta.openshift.io/inject-cabundle: {} manager: kube-controller-manager operation: Update time: "2026-04-22T15:04:36Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:service-ca.crt: {} manager: service-ca-operator operation: Update time: "2026-04-22T15:10:56Z" name: openshift-service-ca.crt namespace: openshift-multus resourceVersion: "10585" uid: c0579206-b41e-4843-951f-31351a3090ac - apiVersion: v1 data: whereabouts.conf: | { "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/etc/kubernetes/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "reconciler_cron_expression": "30 4 * * *", "log_level": "verbose", "configuration_path": "/etc/kubernetes/cni/net.d/whereabouts.d" } kind: ConfigMap metadata: creationTimestamp: "2026-04-22T15:04:39Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:whereabouts.conf: {} f:metadata: f:ownerReferences: k:{"uid":"6ba009e8-496c-4354-9e9b-c5a5177f6f01"}: {} manager: cluster-network-operator/operconfig operation: Apply time: "2026-04-22T15:04:39Z" name: whereabouts-flatfile-config namespace: openshift-multus ownerReferences: - apiVersion: operator.openshift.io/v1 blockOwnerDeletion: true controller: true kind: Network name: cluster uid: 6ba009e8-496c-4354-9e9b-c5a5177f6f01 resourceVersion: "2429" uid: 18732f5e-3552-40e2-af80-20288926ff4b kind: ConfigMapList metadata: resourceVersion: "18196"