Bug 1820687
Summary: | [sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled is forbidden: unable to validate against any security context constraint: [] | |||
---|---|---|---|---|
Product: | OpenShift Container Platform | Reporter: | Gabe Montero <gmontero> | |
Component: | kube-controller-manager | Assignee: | Maciej Szulik <maszulik> | |
Status: | CLOSED ERRATA | QA Contact: | zhou ying <yinzhou> | |
Severity: | medium | Docs Contact: | ||
Priority: | unspecified | |||
Version: | 4.5 | CC: | adam.kaplan, aos-bugs, dcbw, deads, mfojtik, wzheng, yinzhou | |
Target Milestone: | --- | |||
Target Release: | 4.5.0 | |||
Hardware: | Unspecified | |||
OS: | Unspecified | |||
Whiteboard: | ||||
Fixed In Version: | Doc Type: | No Doc Update | ||
Doc Text: | Story Points: | --- | ||
Clone Of: | ||||
: | 1829327 (view as bug list) | Environment: | ||
Last Closed: | 2020-07-13 17:25:33 UTC | Type: | Bug | |
Regression: | --- | Mount Type: | --- | |
Documentation: | --- | CRM: | ||
Verified Versions: | Category: | --- | ||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
Cloudforms Team: | --- | Target Upstream Version: | ||
Embargoed: | ||||
Bug Depends On: | ||||
Bug Blocks: | 1829327 |
Description
Gabe Montero
2020-04-03 15:34:51 UTC
Upon initiation by Adam, and slack discussion between Adam, David Eads, and myself, updating cluster-policy-controller seems warranted. See discussion in slack: https://coreos.slack.com/archives/CB48XQ4KZ/p1586282511367900 Highlights: - Latest failed image eco test: https://prow.svc.ci.openshift.org/view/gcs/origin-ci-test/pr-logs/pull/24703/pull-ci-openshift-origin-master-e2e-gcp-image-ecosystem/200 - look at the "openshift images should be SCL enabled" failures - And the additional debug in PR 24703 - David suggests a Patch instead of Update should be used in namespace_scc_allocation_controller.go - David is also unhappy that there were no metrics for cluster-policy-controller https://ftygpjfx-promecieus.svc.ci.openshift.org/graph?g0.range_input=72m&g0.end_input=2020-04-02%2021%3A00&g0.expr=workqueue_retries_total&g0.tab=0 https://ftygpjfx-promecieus.svc.ci.openshift.org/graph?g0.range_input=72m&g0.end_input=2020-04-02%2021%3A00&g0.expr=workqueue_retries_total%7Bnamespace%3D%22openshift-kube-controller-manager%22%2Cname%3D%22namespace%22%7D&g0.tab=0 For now leaving the test case work around of waiting for the namespace scc annotations associated with this bug. *** Bug 1822298 has been marked as a duplicate of this bug. *** See https://bugzilla.redhat.com/show_bug.cgi?id=1822298 for more data. Confirmed with latest code , I run the e2e test with command: `openshift-tests run all --dry-run | grep -E "\[Feature:ImageEcosystem\]\[Slow\] openshift images should be SCL enabled" | openshift-tests run -f - ` 26 pass, 0 skip (2m8s) I'll verify this issue. Correct me when I was wrong. It would be best to use audit and confirm that SCC allocation controller is using the patch operation when updating the namespace. Double checked with payload: 4.5.0-0.nightly-2020-05-06-003431, when update namespace could see audit log like: {"kind":"Event","apiVersion":"audit.k8s.io/v1","level":"Metadata","auditID":"dde874a5-26b7-4b68-b2fe-bf412bf6e9ab","stage":"ResponseComplete","requestURI":"/apis/project.openshift.io/v1/projects/zhouy","verb":"patch","user":{"username":"system:admin","groups":["system:masters","system:authenticated"]},"sourceIPs":["10.0.6.201","10.130.0.1"],"userAgent":"oc/4.4.0 (linux/amd64) kubernetes/2576e48","objectRef":{"resource":"projects","namespace":"zhouy","name":"zhouy","apiGroup":"project.openshift.io","apiVersion":"v1"},"responseStatus":{"metadata":{},"code":200},"requestReceivedTimestamp":"2020-05-08T09:30:41.613870Z","stageTimestamp":"2020-05-08T09:30:41.626430Z","annotations":{"authorization.k8s.io/decision":"allow","authorization.k8s.io/reason":""}} *** Bug 1817099 has been marked as a duplicate of this bug. *** Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2020:2409 |