Bug 2000478 - Using deprecated 1.25 API calls
Summary: Using deprecated 1.25 API calls
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Container Native Virtualization (CNV)
Classification: Red Hat
Component: Virtualization
Version: 4.9.0
Hardware: Unspecified
OS: Unspecified
urgent
high
Target Milestone: ---
: 4.10.1
Assignee: ffossemo
QA Contact: Kedar Bidarkar
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2021-09-02 08:46 UTC by Ruth Netser
Modified: 2022-05-18 20:28 UTC (History)
6 users (show)

Fixed In Version: virt-operator-container-v4.10.1-6 hco-bundle-registry-container-v4.10.1-86
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2022-05-18 20:26:54 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Github kubevirt kubevirt pull 6955 0 None open Update deprecated v1beta1 poddisruptionbudget api calls 2022-03-07 13:06:48 UTC
Red Hat Product Errata RHSA-2022:4668 0 None None None 2022-05-18 20:28:24 UTC

Description Ruth Netser 2021-09-02 08:46:41 UTC
Description of problem:
Calls to deprecated 1.25 API are found in CNV 4.9, should be addressed in CNV 4.10.


Version-Release number of selected component (if applicable):


How reproducible:


Steps to Reproduce:
1.
2.
3.

Actual results:


Expected results:


Additional info:

virt-controller

{"kind":"Event","apiVersion":"audit.k8s.io/v1","level":"Metadata","auditID":"c463d9f9-3812-4df2-aeba-b96066d5a538","stage":"ResponseComplete","requestURI":"/apis/policy/v1beta1/namespaces/supported-os-common-templates-windows-test-windows-os-support/poddisruptionbudgets","verb":"create","user":{"username":"system:serviceaccount:openshift-cnv:kubevirt-controller","uid":"dfaaebb7-f5c2-4bb4-b650-51275afe4f77","groups":["system:serviceaccounts","system:serviceaccounts:openshift-cnv","system:authenticated"],"extra":{"authentication.kubernetes.io/pod-name":["virt-controller-699d86df8f-r6zrj"],"authentication.kubernetes.io/pod-uid":["be8fecd4-d1e4-4137-a6b3-1873022e5988"]}},"sourceIPs":["10.1.156.19"],"userAgent":"virt-controller/v0.0.0 (linux/amd64) kubernetes/$Format","objectRef":{"resource":"poddisruptionbudgets","namespace":"supported-os-common-templates-windows-test-windows-os-support","apiGroup":"policy","apiVersion":"v1beta1"},"responseStatus":{"metadata":{},"code":201},"requestReceivedTimestamp":"2021-08-25T16:05:29.346779Z","stageTimestamp":"2021-08-25T16:05:29.374351Z","annotations":{"authorization.k8s.io/decision":"allow","authorization.k8s.io/reason":"RBAC: allowed by ClusterRoleBinding \"kubevirt-controller\" of ClusterRole \"kubevirt-controller\" to ServiceAccount \"kubevirt-controller/openshift-cnv\"","k8s.io/deprecated":"true","k8s.io/removed-release":"1.25"}}

virt-operator

{"kind":"Event","apiVersion":"audit.k8s.io/v1","level":"Metadata","auditID":"f2ec4a35-bdf3-4ce9-a161-d459bc69075e","stage":"ResponseComplete","requestURI":"/apis/policy/v1beta1/poddisruptionbudgets?labelSelector=app.kubernetes.io%2Fmanaged-by%3Dkubevirt-operator\u0026limit=500\u0026resourceVersion=0","verb":"list","user":{"username":"system:serviceaccount:openshift-cnv:kubevirt-operator","uid":"b6752265-8900-45e8-818a-e7413b047be9","groups":["system:serviceaccounts","system:serviceaccounts:openshift-cnv","system:authenticated"],"extra":{"authentication.kubernetes.io/pod-name":["virt-operator-6b8dc669d9-zt4gm"],"authentication.kubernetes.io/pod-uid":["b212aa75-2210-4e2c-ad4d-593e29a29d57"]}},"sourceIPs":["10.1.156.17"],"userAgent":"virt-operator/v0.0.0 (linux/amd64) kubernetes/$Format","objectRef":{"resource":"poddisruptionbudgets","apiGroup":"policy","apiVersion":"v1beta1"},"responseStatus":{"metadata":{},"code":200},"requestReceivedTimestamp":"2021-08-25T17:37:05.020172Z","stageTimestamp":"2021-08-25T17:37:05.022086Z","annotations":{"authorization.k8s.io/decision":"allow","authorization.k8s.io/reason":"RBAC: allowed by ClusterRoleBinding \"kubevirt-hyperconverged-operator.v4.9.0-75565d8f5\" of ClusterRole \"kubevirt-hyperconverged-operator.v4.9.0-75565d8f5\" to ServiceAccount \"kubevirt-operator/openshift-cnv\"","k8s.io/deprecated":"true","k8s.io/removed-release":"1.25"}}

Comment 1 Kedar Bidarkar 2021-09-02 09:34:52 UTC
Components effected:
a) virt-operator
b) virt-controller

Comment 2 sgott 2021-12-14 22:08:48 UTC
Explicitly downgrading this from urgent. Please correct my misunderstanding if this truly is an emergency, but it does not seem to be.

Comment 3 sgott 2021-12-14 22:11:49 UTC
Per the description, this should be fixed in the 4.10 series because upgrades to 4.11 will be complicated if the fix is not already in place.

Comment 4 sgott 2022-01-26 20:47:44 UTC
Upgrading priority to urgent. We must fix this for the upgrade path for 4.10 to 4.12.

Comment 5 Denys Shchedrivyi 2022-04-27 17:06:22 UTC
Verified on v4.10.1-88

Comment 11 errata-xmlrpc 2022-05-18 20:26:54 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Moderate: OpenShift Virtualization 4.10.1 Images security and bug fix update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHSA-2022:4668


Note You need to log in before you can comment on or make changes to this bug.