Bug 2103738
| Summary: | Openshift route URLs starting with double slashes stopped working after update to 4.8.33 - curl version problems | ||
|---|---|---|---|
| Product: | OpenShift Container Platform | Reporter: | OpenShift BugZilla Robot <openshift-bugzilla-robot> |
| Component: | Networking | Assignee: | Andrew McDermott <amcdermo> |
| Networking sub component: | router | QA Contact: | Arvind iyengar <aiyengar> |
| Status: | CLOSED ERRATA | Docs Contact: | |
| Severity: | medium | ||
| Priority: | high | CC: | aiyengar, gspence, hongli, mmasters, molasaga, pescorza |
| Version: | 4.8 | ||
| Target Milestone: | --- | ||
| Target Release: | 4.8.z | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | If docs needed, set a value | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2022-08-24 08:05:46 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 2088539 | ||
| Bug Blocks: | 2103732 | ||
|
Comment 4
Andrew McDermott
2022-07-13 10:08:46 UTC
Brew build: Task info: https://brewweb.engineering.redhat.com/brew/taskinfo?taskID=46516312 CI smoke test https://github.com/openshift/router/pull/409 Verified in the latest "4.8.47" release payload. With this version containing the fixed haproxy package, the route appears to work properly when testing with http2 enabled as well in disabled state: ----- oc get clusterversion NAME VERSION AVAILABLE PROGRESSING SINCE STATUS version 4.8.47 True False 104m Cluster version is 4.8.47 oc -n openshift-ingress rsh router-default-5994bdcddd-29z2j sh-4.4$ rpm -qa | grep -i haproxy haproxy22-2.2.13-4.el8.x86_64 Deploy resources: oc get all NAME READY STATUS RESTARTS AGE pod/hello-app-6c899f86df-4vq9m 1/1 Running 0 61m NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE service/hello-app ClusterIP 172.30.246.144 <none> 8080/TCP 61m NAME READY UP-TO-DATE AVAILABLE AGE deployment.apps/hello-app 1/1 1 1 61m NAME DESIRED CURRENT READY AGE replicaset.apps/hello-app-6c899f86df 1 1 1 61m NAME HOST/PORT PATH SERVICES PORT TERMINATION WILDCARD route.route.openshift.io/hello-edge hello-edge.apps.aiyengar48bz.qe.azure.devcluster.openshift.com hello-app 8080 edge/Redirect None With https2 disabled: oc -n openshift-ingress-operator annotate --overwrite ingresscontrollers/default ingress.operator.openshift.io/default-enable-http2=false ingresscontroller.operator.openshift.io/default annotated oc rollout status deployment -n openshift-ingress router-default --timeout=120s deployment "router-default" successfully rolled out curl -k -L hello-edge.apps.aiyengar48bz.qe.azure.devcluster.openshift.com Hello OpenShift! curl --http1.1 -k -L hello-edge.apps.aiyengar48bz.qe.azure.devcluster.openshift.com Hello OpenShift! curl --http2 -k -L hello-edge.apps.aiyengar48bz.qe.azure.devcluster.openshift.com Hello OpenShift! With http2 enabled: oc -n openshift-ingress-operator annotate --overwrite ingresscontrollers/default ingress.operator.openshift.io/default-enable-http2=true ingresscontroller.operator.openshift.io/default annotated oc rollout status deployment -n openshift-ingress router-default --timeout=120s deployment "router-default" successfully rolled out curl -k -L hello-edge.apps.aiyengar48bz.qe.azure.devcluster.openshift.com Hello OpenShift! curl --http1.1 -k -L hello-edge.apps.aiyengar48bz.qe.azure.devcluster.openshift.com Hello OpenShift! curl --http2 -k -L hello-edge.apps.aiyengar48bz.qe.azure.devcluster.openshift.com Hello OpenShift! ----- Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (OpenShift Container Platform 4.8.48 security update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2022:6099 |