Bug 2062347 - Missing ConfigMap oauth-serving-cert
Summary: Missing ConfigMap oauth-serving-cert
Keywords:
Status: CLOSED DUPLICATE of bug 2026860
Alias: None
Product: OpenShift Container Platform
Classification: Red Hat
Component: oauth-apiserver
Version: 4.8
Hardware: Unspecified
OS: Unspecified
unspecified
high
Target Milestone: ---
: ---
Assignee: Standa Laznicka
QA Contact: Xingxing Xia
URL:
Whiteboard: EmergencyConfirmed
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2022-03-09 15:35 UTC by Kevin Cormier
Modified: 2023-09-15 01:52 UTC (History)
9 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2022-03-24 10:36:25 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)
500 error seen when trying to use OAuth for RHACM (46.06 KB, image/jpeg)
2022-03-09 15:35 UTC, Kevin Cormier
no flags Details
must gather logs (14.78 MB, application/gzip)
2022-03-14 18:10 UTC, tflower
no flags Details
output of oc get clusteroperators (91.59 KB, text/plain)
2022-03-14 18:11 UTC, tflower
no flags Details

Description Kevin Cormier 2022-03-09 15:35:14 UTC
Created attachment 1864937 [details]
500 error seen when trying to use OAuth for RHACM

Description of problem:

Installations of 4.8.12 and 4.8.13 are sometimes missing the `oauth-serving-cert` ConfigMap in the `openshift-console` and `openshift-config-managed` namespaces.

This leads to an authentication problem for RHACM.

Version-Release number of selected component (if applicable):


How reproducible:
Not sure. 


Steps to Reproduce:
1. Install 4.8.12 or 4.8.13.

Actual results:
Config maps are missing.

Expected results:
Config maps should be present.


Additional info:

Comment 1 Kevin Cormier 2022-03-09 15:58:00 UTC
Also seen with a 4.8.27 cluster on AWS.

Comment 2 Kevin Cormier 2022-03-09 18:48:38 UTC
After consulting with @kbempah it appears we have not had a successful test run on OCP 4.8 during our current release cycle, so I am increasing the severity and confirming it is a blocker.

We need confirmation first if these ConfigMaps should indeed exist in 4.8. They do in 4.9+.

Comment 4 Jakub Hadvig 2022-03-11 09:51:59 UTC
So console-operator is just syncing the `oauth-serving-cert` from the `openshift-config-managed` namespaces to the `openshift-console` namespace. Creating the CM in the `openshift-config-managed` namespaces is the responsibility of auth operator. Reassigning due to that fact.

Comment 5 Michal Fojtik 2022-03-11 10:08:03 UTC
** A NOTE ABOUT USING URGENT **

This BZ has been set to urgent severity and priority. When a BZ is marked urgent priority Engineers are asked to stop whatever they are doing, putting everything else on hold.
Please be prepared to have reasonable justification ready to discuss, and ensure your own and engineering management are aware and agree this BZ is urgent. Keep in mind, urgent bugs are very expensive and have maximal management visibility.

NOTE: This bug was automatically assigned to an engineering manager with the severity reset to *unspecified* until the emergency is vetted and confirmed. Please do not manually override the severity.

** INFORMATION REQUIRED **

Please answer these questions before escalation to engineering:

1. Has a link to must-gather output been provided in this BZ? We cannot work without. If must-gather fails to run, attach all relevant logs and provide the error message of must-gather.
2. Give the output of "oc get clusteroperators -o yaml".
3. In case of degraded/unavailable operators, have all their logs and the logs of the operands been analyzed [yes/no]
4. List the top 5 relevant errors from the logs of the operators and operands in (3).
5. Order the list of degraded/unavailable operators according to which is likely the cause of the failure of the other, root-cause at the top.
6. Explain why (5) is likely the right order and list the information used for that assessment.
7. Explain why Engineering is necessary to make progress.

Comment 6 tflower 2022-03-14 18:10:08 UTC
Created attachment 1865896 [details]
must gather logs

We've recreated on a 4.8.26 AWS cluster.

Attaching must gather logs (must-gather.local.5115599406220173222.tar.gz)

output from must gather shows:

ClusterID: 5b98a094-e6c8-4318-adae-5cf0503a5175
ClusterVersion: Stable at "4.8.26"
ClusterOperators:
	All healthy and stable

Comment 7 tflower 2022-03-14 18:11:17 UTC
Created attachment 1865897 [details]
output of oc get clusteroperators

Along with must gather, here's the output of

 `oc get clusteroperators -o yaml` (clusteroperators.yaml)

Comment 9 kbempah 2022-03-21 20:44:18 UTC
Marked this as urgent as it is currently blocking our validation of RHACM 2.5 on OCP 4.8 deployments.

Comment 10 Standa Laznicka 2022-03-23 07:16:49 UTC
Unless we get an actual description of the problem, I'm going to close this BZ as INSUFFICIENT_DATA.

"ConfigMaps not being present leads to an authentication problem for RHACM." is most definitely not an adequate bug description.

Comment 11 Sergiusz Urbaniak 2022-03-23 08:05:51 UTC
setting blocker- as this does not indicate a regression.

Comment 12 Sergiusz Urbaniak 2022-03-23 08:11:36 UTC
Note this configmap was introduced in 4.9. I am unclear why there is the expectation this should be present in 4.8.

> This leads to an authentication problem for RHACM.

What is meant by this?

Comment 13 Kevin Cormier 2022-03-23 17:59:23 UTC
Thank you for letting us know that the `oauth-serving-cert` should not be present in OCP 4.8

This led us to some further investigation. We are using https://github.com/openshift/oauth-proxy as part of our management-ingress, and it seems that we recently updated the version of the image we pull in to be 4.9. So it makes sense that it is not compatible with OCP 4.8. Previously we have been using 4.5. Can you offer any guidance as to whether the version used needs to match exactly the OCP version? We currently support OCP 4.8, 4.9, and 4.10.

Comment 14 Sergiusz Urbaniak 2022-03-24 10:36:25 UTC
A couple of comments for oauth-proxy. Generally oauth-proxy is bound to internal use inside OpenShift. We do not officially support usage outside of OpenShift core components. Fixes here are best efforts.

Having said that for your concrete problem https://github.com/openshift/oauth-proxy/pull/238 should fix the problem. This fix is available starting from OpenShift 4.10.

Closing this out as a duplicate of the actual BZ https://bugzilla.redhat.com/show_bug.cgi?id=2026860.

*** This bug has been marked as a duplicate of bug 2026860 ***

Comment 15 Red Hat Bugzilla 2023-09-15 01:52:36 UTC
The needinfo request[s] on this closed bug have been removed as they have been unresolved for 365 days


Note You need to log in before you can comment on or make changes to this bug.