Bug 2162016 - hostpath provisioner operator consuming stray k8s API
Summary: hostpath provisioner operator consuming stray k8s API
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Container Native Virtualization (CNV)
Classification: Red Hat
Component: Storage
Version: 4.13.0
Hardware: Unspecified
OS: Unspecified
unspecified
medium
Target Milestone: ---
: 4.13.0
Assignee: Alex Kalenyuk
QA Contact: Kevin Alon Goldblatt
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2023-01-18 15:38 UTC by Alex Kalenyuk
Modified: 2023-05-18 02:57 UTC (History)
1 user (show)

Fixed In Version: v4.13.0.rhel9-1832
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2023-05-18 02:56:40 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Github kubevirt hostpath-provisioner-operator pull 293 0 None Merged [release-v0.15] Manual backport of 1.26.1 2023-03-22 14:22:07 UTC
Red Hat Issue Tracker CNV-25503 0 None None None 2023-02-13 17:31:33 UTC
Red Hat Product Errata RHSA-2023:3205 0 None None None 2023-05-18 02:57:04 UTC

Description Alex Kalenyuk 2023-01-18 15:38:17 UTC
Description of problem:
As a temporary fix for a k8s bug https://github.com/kubernetes/kubernetes/pull/114617
We started consuming k8s API from a stray commit.
Let's have this bug to remind us we should undo that once 1.26.1 is out.

Version-Release number of selected component (if applicable):


How reproducible:


Steps to Reproduce:
1.
2.
3.

Actual results:


Expected results:


Additional info:

Comment 1 Yan Du 2023-03-22 13:23:51 UTC
Alex, could you please link the PR?

Comment 4 errata-xmlrpc 2023-05-18 02:56:40 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Moderate: OpenShift Virtualization 4.13.0 Images security, bug fix, and enhancement update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHSA-2023:3205


Note You need to log in before you can comment on or make changes to this bug.