Bug 1775060 - Problems with credentials when using more than one registry
Summary: Problems with credentials when using more than one registry
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: OpenShift Container Platform
Classification: Red Hat
Component: Migration Tooling
Version: 4.2.0
Hardware: Unspecified
OS: Unspecified
medium
medium
Target Milestone: ---
: 4.4.0
Assignee: Scott Seago
QA Contact: Sergio
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2019-11-21 11:53 UTC by Sergio
Modified: 2020-05-28 11:10 UTC (History)
4 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2020-05-28 11:09:55 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHEA-2020:2326 0 None None None 2020-05-28 11:10:20 UTC

Description Sergio 2019-11-21 11:53:11 UTC
Description of problem:
If we try to use more than one registry, the application has problems when there are migration plans opened and they use different registries, for instance one Azure registry and one AWS registry.


Version-Release number of selected component (if applicable):
Controller
    image: quay.io/ocpmigrate/mig-controller:latest
    imageID: quay.io/ocpmigrate/mig-controller@sha256:478069f3c6574b31cbd68241d796e4b9eb4ab1234586208ccfc1adca3806594d
Velero:
    image: quay.io/ocpmigrate/velero:latest
    imageID: quay.io/ocpmigrate/velero@sha256:558a7a27bca175b3a9fd5318462f66bf7f1396da48ed2ca7f1a2ea6f32ff5331
    image: quay.io/ocpmigrate/migration-plugin:latest
    imageID: quay.io/ocpmigrate/migration-plugin@sha256:96e956dd650b72dfd1db4f951b4ecb545e94c6253968d83ef33de559d83ece85

How reproducible:
Always

Steps to Reproduce:
1. Add an AWS S3 bucket as registry.
2. Create a migration plan and migrate it.
3. Create a migration plan, but do not migrate it, let it open.
3. Add an Azure storage account as registry.
4  Create a migration plan and try to migrate it.


Actual results:
The application fails with this error in velero

time="2019-11-18T16:21:43Z" level=error msg="Error getting backup store for this location" backupLocation=awsbucket-7bprf controller=backup-sync error="rpc error: code = Unknown desc = NoCredentialProviders: no valid providers in chain. Deprecated.\n\tFor verbose messaging see aws.Config.CredentialsChainVerboseErrors" error.file="/go/src/github.com/heptio/velero/pkg/cloudprovider/aws/volume_snapshotter.go:60" error.function=github.com/heptio/velero/pkg/cloudprovider/aws.getSession logSource="pkg/controller/backup_sync_controller.go:168"

Expected results:
The migration plan should be migrated.

Additional info:

Comment 1 Scott Seago 2020-04-03 14:44:14 UTC
It looks like this fix has been in the product for a while now. The associated PRs were merged in December, but this BZ was never updated because I'd already posted the fix PRs before this BZ was created, so we hadn't connected the two.

The PRs are:
https://github.com/konveyor/mig-operator/pull/166
https://github.com/konveyor/mig-controller/pull/373

This should be ready to test for either 1.1.2 or 1.2

Comment 5 Sergio 2020-05-12 10:32:20 UTC
Verified using CAM 1.2 stage

We verified that we can use several replication repositories at the same time now (Azure + AWS, for instance).

Nevertheless, there are still credentials collisions when we use several S3 replication repositories at the same time, for instance using AWS and nooba.

The decision was to move this BZ to VERIFIED, and open a new one reporting the new problem. The AWS + noobaa collision problem is reported in this BZ https://bugzilla.redhat.com/show_bug.cgi?id=1834744

Comment 7 errata-xmlrpc 2020-05-28 11:09:55 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHEA-2020:2326


Note You need to log in before you can comment on or make changes to this bug.