Bug 1905792
| Summary: | [OVN]Cannot create egressfirewalll with dnsName | ||
|---|---|---|---|
| Product: | OpenShift Container Platform | Reporter: | huirwang |
| Component: | Networking | Assignee: | Jacob Tanenbaum <jtanenba> |
| Networking sub component: | ovn-kubernetes | QA Contact: | huirwang |
| Status: | CLOSED ERRATA | Docs Contact: | |
| Severity: | high | ||
| Priority: | high | CC: | aconstan, zzhao |
| Version: | 4.7 | ||
| Target Milestone: | --- | ||
| Target Release: | 4.7.0 | ||
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | If docs needed, set a value | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2021-02-24 15:41:14 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
Verified in 4.7.0-0.nightly-2020-12-14-165231 .
huiran-mac:script hrwang$ cat eg_policy_dnsname1.yaml
kind: EgressFirewall
apiVersion: k8s.ovn.org/v1
metadata:
name: default
spec:
egress:
- type: Allow
to:
dnsName: www.test.com
- type: Allow
to:
dnsName: www.yahoo.com
ports:
- protocol: TCP
port: 80
- type: Deny
to:
cidrSelector: 0.0.0.0/0
huiran-mac:script hrwang$ oc create -f eg_policy_dnsname1.yaml -n test
egressfirewall.k8s.ovn.org/default created
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Moderate: OpenShift Container Platform 4.7.0 security, bug fix, and enhancement update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2020:5633 |
Description of problem: Cannot create egressfirewalll with dnsName Version-Release number of selected component (if applicable): 4.7.0-0.ci-2020-12-08-014807 How reproducible: Always Steps to Reproduce: 1. oc create ns test namespace/test created 2. oc create -f tmp/egressfirewall/eg_policy_dnsname1.yaml -n test The EgressFirewall "default" is invalid: spec.egress.to.cidrSelector: Required value cat tmp/egressfirewall/eg_policy_dnsname1.yaml kind: EgressFirewall apiVersion: k8s.ovn.org/v1 metadata: name: default spec: egress: - type: Allow to: dnsName: www.test.com ports: - protocol: TCP port: 80 - type: Deny to: cidrSelector: 0.0.0.0/0 Actual results: The EgressFirewall "default" is invalid: spec.egress.to.cidrSelector: Required value Expected results: Should create egressfirewall object successfully. Additional info: From DEV, issue is we have not updated the CRD in the CNO to reflect the upstream changes