Bug 1741957 - [ci] [azure] e2e failing on a variety of OAuth tests
Summary: [ci] [azure] e2e failing on a variety of OAuth tests
Keywords:
Status: CLOSED DUPLICATE of bug 1743728
Alias: None
Product: OpenShift Container Platform
Classification: Red Hat
Component: Networking
Version: 4.2.0
Hardware: Unspecified
OS: Unspecified
high
high
Target Milestone: ---
: 4.2.0
Assignee: Dan Mace
QA Contact: Hongan Li
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2019-08-16 14:16 UTC by Yu Qi Zhang
Modified: 2022-08-04 22:39 UTC (History)
6 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2019-08-20 16:34:02 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)

Description Yu Qi Zhang 2019-08-16 14:16:00 UTC
Description of problem:
Azure e2e (See: https://testgrid.k8s.io/redhat-openshift-release-informing#redhat-canary-openshift-ocp-installer-e2e-azure-4.2) is failing on OAuth tests (see below for example)

Version-Release number of selected component (if applicable):
Openshift 4.2

How reproducible:
Always

Steps to Reproduce:
See CI Logs

Actual results:
Notable test failures:
[Feature:OAuthServer] [Token Expiration] Using a OAuth client with a non-default token max age to generate tokens that expire shortly works as expected when using a token authorization flow [Suite:openshift/conformance/parallel]The bootstrap user should successfully login with password decoded from kubeadmin secret [Suite:openshift/conformance/parallel][Feature:OAuthServer] OAuth server should use http1.1 only to prevent http2 connection reuse [Suite:openshift/conformance/parallel][Feature:OAuthServer] [Headers] expected headers returned from the grant URL [Suite:openshift/conformance/parallel][Feature:OAuthServer] [Headers] expected headers returned from the login URL for the allow all IDP [Suite:openshift/conformance/parallel][Feature:OAuthServer] [Headers] expected headers returned from the root URL [Suite:openshift/conformance/parallel][Feature:OAuthServer] well-known endpoint should be reachable [Suite:openshift/conformance/parallel][Feature:OAuthServer] [Headers] expected headers returned from the token request URL [Suite:openshift/conformance/parallel][Feature:OAuthServer] [Headers] expected headers returned from the logout URL [Suite:openshift/conformance/parallel][Feature:OAuthServer] [Token Expiration] Using a OAuth client with a non-default token max age to generate tokens that do not expire works as expected when using a code authorization flow [Suite:openshift/conformance/parallel][Feature:OAuthServer] [Headers] expected headers returned from the authorize URL [Suite:openshift/conformance/parallel][Feature:OAuthServer] [Headers] expected headers returned from the login URL for when there is only one IDP [Suite:openshift/conformance/parallel][Feature:OAuthServer] [Headers] expected headers returned from the login URL for the bootstrap IDP [Suite:openshift/conformance/parallel]


Expected results:


Additional info:

Comment 1 Michal Fojtik 2019-08-19 07:55:04 UTC
This looks like DNS problem:

dial tcp: lookup oauth-openshift.apps.ci-op-btyv29s0-282fe.ci.azure.devcluster.openshift.com on 10.142.15.218:53: no such host

Comment 2 Abhinav Dahiya 2019-08-19 23:18:12 UTC
From the ingress-operator pod logs.

```
[{"type":"Failed","status":"True","lastTransitionTime":"2019-08-19T19:58:47Z","reason":"ProviderError","message":"The DNS provider failed to ensure the record: failed to update dns a record: *.apps.ci-op-5idr0d56-282fe.ci.azure.devcluster.openshift.com: dns.RecordSetsClient#CreateOrUpdate: Failure responding to request: StatusCode=403 -- Original Error: autorest/azure: Service returned an error. Status=403 Code=\"AuthorizationFailed\" Message=\"The client '9988be96-f7f4-4cc1-9d0c-a4f477e51ca1' with object id '9988be96-f7f4-4cc1-9d0c-a4f477e51ca1' does not have authorization to perform action 'Microsoft.Network/dnsZones/A/write' over scope '/subscriptions/d38f1e38-4bed-438e-b227-833f997adf6a/resourceGroups/os4-common/providers/Microsoft.Network/dnsZones/ci.azure.devcluster.openshift.com/A/*.apps.ci-op-5idr0d56-282fe' or the scope is invalid. If access was recently granted, please refresh your credentials.\""}]}]}}}
```

Comment 3 Stefan Schimanski 2019-08-20 11:46:56 UTC
As this looks like a DNS issue (which breaks oauth), reassigning.

Comment 4 Abhinav Dahiya 2019-08-20 16:34:02 UTC

*** This bug has been marked as a duplicate of bug 1743728 ***


Note You need to log in before you can comment on or make changes to this bug.