Bug 1713982
Summary: | TemplateInstance object not taking into account values passed in through secret | |||
---|---|---|---|---|
Product: | OpenShift Container Platform | Reporter: | Joel Rosental R. <jrosenta> | |
Component: | Templates | Assignee: | Gabe Montero <gmontero> | |
Status: | CLOSED ERRATA | QA Contact: | XiuJuan Wang <xiuwang> | |
Severity: | high | Docs Contact: | ||
Priority: | unspecified | |||
Version: | 3.11.0 | CC: | adam.kaplan, aos-bugs, chezhang, erich, gmontero, jesusr, jkim, joboyer, jokerman, mmariyan, mmccomas, openshift-bugs-escalate, rkshirsa, shurley, wzheng, xiuwang, xtian | |
Target Milestone: | --- | |||
Target Release: | 3.11.z | |||
Hardware: | Unspecified | |||
OS: | Linux | |||
Whiteboard: | ||||
Fixed In Version: | Doc Type: | Bug Fix | ||
Doc Text: |
Cause: The templateinstance controller switch to the dynamic client in 3.9 did not properly deal with cluster level objects in its create path, as it always tried to set a namespace/project on its create request. This was especially problematic when trying to create projects themselves.
Consequence: The templateinstance controller started failing to create any projects specified in templates.
Fix: The templatesinstance controller now determines if each object it is creating is cluster level in scope, and if its, it does not set the namespace on its dynamic client create request.
Result: The templateinstance controller can now create projects, assuming it has that capability has been added to its permission set, defined in templates.
|
Story Points: | --- | |
Clone Of: | ||||
: | 1718412 1719044 (view as bug list) | Environment: | ||
Last Closed: | 2019-07-23 19:56:23 UTC | Type: | Bug | |
Regression: | --- | Mount Type: | --- | |
Documentation: | --- | CRM: | ||
Verified Versions: | Category: | --- | ||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
Cloudforms Team: | --- | Target Upstream Version: | ||
Embargoed: | ||||
Bug Depends On: | ||||
Bug Blocks: | 1718412, 1719044 |
Description
Joel Rosental R.
2019-05-26 11:19:09 UTC
PR https://github.com/openshift/origin/pull/23107 up for 3.11 release PR has merged XiuJuan - can you provide the precise steps you took in trying to verify the bug? Would it be possible for me to get access to the cluster you are attempting to verify against? Verified this in cluster: # oc version oc v3.11.125 kubernetes v1.11.0+d4cacc0 features: Basic-Auth GSSAPI Kerberos SPNEGO Server https://ip-172-18-1-156.ec2.internal:8443 openshift v3.11.125 kubernetes v1.11.0+d4cacc0 # oc get ns openshift-proj011 -o yaml apiVersion: v1 kind: Namespace metadata: annotations: openshift.io/description: Openshift Project delivered via Hybrid Cloud openshift.io/display-name: openshift-proj011 openshift.io/node-selector: slabasic=true openshift.io/sa.scc.mcs: s0:c17,c14 openshift.io/sa.scc.supplemental-groups: 1000300000/10000 openshift.io/sa.scc.uid-range: 1000300000/10000 creationTimestamp: 2019-07-02T02:34:10Z labels: apmid: OS assignmentcode: VY02RJ crq: SRTest013 deliverymanager: vishwa requester: tin2933 ritm: openritm013 serviceruntimemanager: vishwa sla: basic sz: VolvoCI technicalcontact: tin2933 template.openshift.io/template-instance-owner: df2a2e3e-9c71-11e9-8353-0e01018c1f1c name: openshift-proj011 resourceVersion: "8469" selfLink: /api/v1/namespaces/openshift-proj011 uid: df3fafcf-9c71-11e9-8353-0e01018c1f1c spec: finalizers: - kubernetes status: phase: Active Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2019:1753 |