Uploaded image for project: 'OpenShift Virtualization'
  1. OpenShift Virtualization
  2. CNV-22384

[2141419] Unable to set TLS Security profile for CNAO using HCO jsonpatch annotations

XMLWordPrintable

    • Medium

      Description of problem:
      ------------------------
      Attempt to set the TLS security profile for CNAO fails

      Version-Release number of selected component (if applicable):
      -------------------------------------------------------------
      kubevirt-hyperconverged-operator.4.12.0-684

      How reproducible:
      -----------------
      Always

      Steps to Reproduce:
      -------------------
      1. Apply HCO jsonpatch annotation to update TLS security profile for CNAO

      1. oc annotate --overwrite -n openshift-cnv hco kubevirt-hyperconverged networkaddonsconfigs.kubevirt.io/jsonpatch='[{"op": "replace", "path": "/spec/tlsSecurityProfile", "value": {"old":{}, "type": "Old"}}]'

      2. Get the TLS security profile set on CNAO

      1. oc get networkaddonsconfig cluster -n openshift-cnv -ojsonpath= {.spec.tlsSecurityProfile}

        Actual results:
        ---------------
        CNAO has got incorrect definition for 'tlsSecurityProfile' as:
        [cnv-qe-jenkins@ ~]$ oc get networkaddonsconfig cluster -n openshift-cnv -ojsonpath={.spec.tlsSecurityProfile}

        {"intermediate":{},"old":{},"type":"Old"}[

      Expected results:
      -----------------
      CNAO should contain the right definition ( not the mix of 2 TLS profiles ) for TLS security profile.
      {"old":{}, "type": "Old"}

      Additional info:
      ----------------
      Also tested with 'Custom' TLS profile and still there is a mix of 'intermediate' TLS profile with the 'Custom' profile

            stirabos Simone Tiraboschi
            sasundar@redhat.com Satheesaran Sundaramoorthi
            Satheesaran Sundaramoorthi Satheesaran Sundaramoorthi
            Votes:
            0 Vote for this issue
            Watchers:
            1 Start watching this issue

              Created:
              Updated:
              Resolved: