Bug 2070457

Summary: Image vulnerability Popover overflows from the visible area
Product: OpenShift Container Platform Reporter: Karthik Jeeyar <kjeeyar>
Component: Management ConsoleAssignee: Robb Hamilton <rhamilto>
Status: CLOSED ERRATA QA Contact: Salvatore Colangelo <scolange>
Severity: medium Docs Contact:
Priority: unspecified    
Version: 4.11CC: aos-bugs, rhamilto, yapei
Target Milestone: ---   
Target Release: 4.11.0   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2022-08-10 11:02:42 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Attachments:
Description Flags
IMV Popover issue none

Description Karthik Jeeyar 2022-03-31 08:49:39 UTC
Created attachment 1869653 [details]
IMV Popover issue

Created attachment 1869653 [details]
IMV Popover issue

Description of problem:

Project Overview page contains Image vulnerability status link, clicking on the link opens the popover which overflows on the top of the screen.


Version-Release number of selected component (if applicable):
4.11

How reproducible:
Alway

Steps to Reproduce:
1. Install Quay Container Security provided by Red Hat
2. Create a deployment through Import from yaml flow using this image quay.io/redhat-appstudio-qe/quarkus:7dd062e2e8cb4ba599185e48d628b65a
3. Visit Project overview

Actual results:

The popover overflows in the top and clicking on the links in the popover content changes the position of the popover and closes it.

Expected results:

The popover content should be displayed in the visible area and visiting the links should redirect properly.

Comment 1 Robb Hamilton 2022-04-01 14:06:45 UTC
I believe this bug to be the result of an issue in PatternFly and have opened an issue there:  https://github.com/patternfly/patternfly-react/issues/7162

Comment 2 Robb Hamilton 2022-05-09 19:43:29 UTC
More details steps to reproduce:

1. Go to Operators > OperatorHub
2. Search for Quay Container Security
3. Click Quay Container Security tile
4. Click Install in the modal
5. Click Install on the form with the defaults already selected
6. Wait for the operator to finish installing
7. Go to Workloads > Deployments
8. Click Create
9. Change line 19 of the example YAML to quay.io/redhat-appstudio-qe/quarkus:9f7af4d9d97a4093bffb94ed3cde712f	
10. Click Create
11. Go to Home > Projects
12. Click default
13. The Status card should contain an Image Vulnerabilities popover
14. Click Image Vulnerabilities and note the popover position

Comment 4 Robb Hamilton 2022-05-09 20:34:38 UTC
Per Joe Caiani, there is a PatternFly version bump coming later this week that will fix include the fix for this bug.  Will link it once it lands.

Comment 7 Salvatore Colangelo 2022-05-23 10:50:30 UTC
Hi , 

step done 
  
1. Go to Operators > OperatorHub
2. Search for Quay Container Security
3. Click Quay Container Security tile
4. Click Install in the modal
5. Click Install on the form with the defaults already selected
6. Wait for the operator to finish installing
7. Go to Workloads > Deployments
8. Click Create
9. Change line 19 of the example YAML to quay.io/redhat-appstudio-qe/quarkus:9f7af4d9d97a4093bffb94ed3cde712f	
10. Click Create
11. Go to Home > Projects
12. Click default
13. The Status card should contain an Image Vulnerabilities popover
14. Click Image Vulnerabilities and note the popover position

The links works in the right way

VERIFIED

Comment 9 errata-xmlrpc 2022-08-10 11:02:42 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Important: OpenShift Container Platform 4.11.0 bug fix and security update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHSA-2022:5069