Bug 2000480
| Summary: | Using depreacted 1.25 API calls | ||
|---|---|---|---|
| Product: | Container Native Virtualization (CNV) | Reporter: | Ruth Netser <rnetser> |
| Component: | Networking | Assignee: | oshoval |
| Status: | CLOSED ERRATA | QA Contact: | Meni Yakove <myakove> |
| Severity: | urgent | Docs Contact: | |
| Priority: | unspecified | ||
| Version: | 4.10.0 | CC: | cnv-qe-bugs, phoracek |
| Target Milestone: | --- | ||
| Target Release: | 4.10.0 | ||
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| Whiteboard: | |||
| Fixed In Version: | kubernetes-nmstate-handler-container-v4.10.0-7 | Doc Type: | If docs needed, set a value |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2022-03-16 15:55:26 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
https://github.com/nmstate/kubernetes-nmstate/pull/825 k8s-1.21 + is required Verified with CNV 4.10.0 Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Moderate: OpenShift Virtualization 4.10.0 Images security and bug fix update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2022:0947 |
Description of problem: Calls to deprecated 1.25 API are found in CNV 4.9, should be addressed in CNV 4.10. Version-Release number of selected component (if applicable): How reproducible: Steps to Reproduce: 1. 2. 3. Actual results: Expected results: Additional info: cluster-network-addons-operator {"kind":"Event","apiVersion":"audit.k8s.io/v1","level":"Metadata","auditID":"d4357b1c-e7c5-4a5b-ba4f-5f626f067f51","stage":"ResponseComplete","requestURI":"/apis/policy/v1beta1/namespaces/openshift-cnv/poddisruptionbudgets/nmstate-webhook","verb":"get","user":{"username":"system:serviceaccount:openshift-cnv:cluster-network-addons-operator","uid":"38cb15cf-4563-4712-97af-c9d5d5c72ca0","groups":["system:serviceaccounts","system:serviceaccounts:openshift-cnv","system:authenticated"],"extra":{"authentication.kubernetes.io/pod-name":["cluster-network-addons-operator-5cd89f6949-mc9p6"],"authentication.kubernetes.io/pod-uid":["16f087ea-375b-4c77-b0e5-50cf4787697d"]}},"sourceIPs":["10.1.156.18"],"userAgent":"cluster-network-addons-operator/v0.0.0 (linux/amd64) kubernetes/$Format","objectRef":{"resource":"poddisruptionbudgets","namespace":"openshift-cnv","name":"nmstate-webhook","apiGroup":"policy","apiVersion":"v1beta1"},"responseStatus":{"metadata":{},"code":200},"requestReceivedTimestamp":"2021-08-25T08:09:02.027130Z","stageTimestamp":"2021-08-25T08:09:02.028727Z","annotations":{"authorization.k8s.io/decision":"allow","authorization.k8s.io/reason":"RBAC: allowed by ClusterRoleBinding \"kubevirt-hyperconverged-operator.v4.9.0-5b6885dfcd\" of ClusterRole \"kubevirt-hyperconverged-operator.v4.9.0-5b6885dfcd\" to ServiceAccount \"cluster-network-addons-operator/openshift-cnv\"","k8s.io/deprecated":"true","k8s.io/removed-release":"1.25"}}