Bug 1830406

Summary: kube-sceduler-operator targetconfig controller uses legacy router configmap
Product: OpenShift Container Platform Reporter: Daneyon Hansen <dhansen>
Component: kube-schedulerAssignee: Maciej Szulik <maszulik>
Status: CLOSED ERRATA QA Contact: RamaKasturi <knarra>
Severity: medium Docs Contact:
Priority: unspecified    
Version: 4.5CC: aos-bugs, mfojtik
Target Milestone: ---   
Target Release: 4.5.0   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: Doc Type: No Doc Update
Doc Text:
Story Points: ---
Clone Of:
: 1833122 (view as bug list) Environment:
Last Closed: 2020-07-13 17:34:13 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 1833120, 1833122    

Description Daneyon Hansen 2020-05-01 20:25:07 UTC
Description of problem:
kube-sceduler-operator uses the legacy cm/router-ca -n openshift-config-managed to build cm/serviceaccount-ca -n openshift-kube-scheduler. As with [1], kube-sceduler-operator should use cm/default-ingress-cert -n openshift-config-managed.

Version-Release number of selected component (if applicable):
4.5

How reproducible:
N/A

Steps to Reproduce:
1.N/A

Actual results:
N/A

Expected results:
N/A

Additional info:
[1] https://github.com/openshift/cluster-kube-controller-manager-operator/pull/402

Comment 3 RamaKasturi 2020-05-14 10:24:56 UTC
Verified the bug with the payload below and i did not find any references to router-ca in audit logs for 4.5 cluster. 

[ramakasturinarra@dhcp35-60 cucushift]$ oc get clusterversion
NAME      VERSION                             AVAILABLE   PROGRESSING   SINCE   STATUS
version   4.5.0-0.nightly-2020-05-13-092431   True        False         21h     Cluster version is 4.5.0-0.nightly-2020-05-13-092431


Below are the steps followed to verify the bug:
==================================================
1) Install 4.5 cluster with latest build
2) oc project "openshift-kube-apiserver"
3) oc cp <kube-apiserver-pod-name>:/var/log/kube-api-server/audit.log /tmp/oc45.log
4) cat /tmp/oc45.log | grep "router-ca"
[ramakasturinarra@dhcp35-60 cucushift]$ cat /tmp/oc45.log | grep "router-ca"
[ramakasturinarra@dhcp35-60 cucushift]$ 

[ramakasturinarra@dhcp35-60 cucushift]$ cat /tmp/oc45.log | grep "default-ingress-cert" | wc -l
297

Based on that moving the bug to verified state.

Comment 4 errata-xmlrpc 2020-07-13 17:34:13 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2020:2409