You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
//For providers that support multiple modes of operation
44
45
ifdef::cco-multi-mode[]
45
-
The Cloud Credential Operator (CCO) can be put into manual mode prior to
46
-
installation in environments where the cloud identity and access management
47
-
(IAM) APIs are not reachable, or the administrator prefers not to store an
48
-
administrator-level credential secret in the cluster `kube-system` namespace.
46
+
The Cloud Credential Operator (CCO) can be put into manual mode prior to installation in environments where the cloud identity and access management (IAM) APIs are not reachable, or the administrator prefers not to store an administrator-level credential secret in the cluster `kube-system` namespace.
49
47
endif::cco-multi-mode[]
50
48
51
49
//For providers who only support manual mode
@@ -56,7 +54,7 @@ endif::cco-manual-mode[]
56
54
.Procedure
57
55
58
56
ifdef::cco-multi-mode[]
59
-
. Change to the directory that contains the installation program and create the `install-config.yaml` file:
57
+
. Change to the directory that contains the installation program and create the `install-config.yaml` file by running the following command:
`<installation_directory>`:: Specifies the directory in which the installation program creates files.
89
+
where `<installation_directory>` is the directory in which the installation program creates files.
94
90
95
-
. From the directory that contains the installation program, obtain details of the {product-title} release image that your `openshift-install` binary is built to use:
91
+
. From the directory that contains the installation program, obtain details of the {product-title} release image that your `openshift-install` binary is built to use by running the following command:
This command creates a YAML file for each `CredentialsRequest` object.
128
122
+
129
-
ifdef::aws[]
130
123
.Sample `CredentialsRequest` object
131
124
[source,yaml]
132
125
----
133
126
apiVersion: cloudcredential.openshift.io/v1
134
127
kind: CredentialsRequest
135
128
metadata:
136
-
name: cloud-credential-operator-iam-ro
129
+
name: <component-credentials-request>
137
130
namespace: openshift-cloud-credential-operator
131
+
...
138
132
spec:
139
-
secretRef:
140
-
name: cloud-credential-operator-iam-ro-creds
141
-
namespace: openshift-cloud-credential-operator
142
133
providerSpec:
143
134
apiVersion: cloudcredential.openshift.io/v1
135
+
ifdef::aws[]
144
136
kind: AWSProviderSpec
145
137
statementEntries:
146
138
- effect: Allow
@@ -149,108 +141,62 @@ spec:
149
141
- iam:GetUserPolicy
150
142
- iam:ListAccessKeys
151
143
resource: "*"
152
-
----
153
144
endif::aws[]
154
145
ifdef::azure,ash[]
155
-
.Sample `CredentialsRequest` object
156
-
[source,yaml]
157
-
----
158
-
apiVersion: cloudcredential.openshift.io/v1
159
-
kind: CredentialsRequest
160
-
metadata:
161
-
labels:
162
-
controller-tools.k8s.io: "1.0"
163
-
name: openshift-image-registry-azure
164
-
namespace: openshift-cloud-credential-operator
165
-
spec:
166
-
secretRef:
167
-
name: installer-cloud-credentials
168
-
namespace: openshift-image-registry
169
-
providerSpec:
170
-
apiVersion: cloudcredential.openshift.io/v1
171
146
kind: AzureProviderSpec
172
147
roleBindings:
173
148
- role: Contributor
174
-
----
175
149
endif::azure,ash[]
176
150
ifdef::google-cloud-platform[]
177
-
.Sample `CredentialsRequest` object
178
-
[source,yaml]
179
-
----
180
-
apiVersion: cloudcredential.openshift.io/v1
181
-
kind: CredentialsRequest
182
-
metadata:
183
-
labels:
184
-
controller-tools.k8s.io: "1.0"
185
-
name: openshift-image-registry-gcs
186
-
namespace: openshift-cloud-credential-operator
187
-
spec:
188
-
secretRef:
189
-
name: installer-cloud-credentials
190
-
namespace: openshift-image-registry
191
-
providerSpec:
192
-
apiVersion: cloudcredential.openshift.io/v1
193
151
kind: GCPProviderSpec
194
152
predefinedRoles:
195
153
- roles/storage.admin
196
154
- roles/iam.serviceAccountUser
197
155
skipServiceCheck: true
198
-
----
199
156
endif::google-cloud-platform[]
157
+
...
158
+
----
200
159
201
160
. Create YAML files for secrets in the `openshift-install` manifests directory that you generated previously. The secrets must be stored using the namespace and secret name defined in the `spec.secretRef` for each `CredentialsRequest` object.
0 commit comments