-
Bug
-
Resolution: Done
-
Normal
-
Logging 5.6.0
-
False
-
None
-
False
-
NEW
-
VERIFIED
-
Before this change the dev console used cluster scoped queries instead of namespace scoped queries for filters. This change uses the correct scope and displays an error message when the user has no permission over the current namespace resources.
-
-
-
Log Storage - Sprint 229
Description of problem:
When a non-admin user selects a filter from the dropdown that includes pods or containers, it uses the cluster scoped API. This leads to an error as most non-admin users won't have permission over broad set of resources
Version-Release number of selected component (if applicable):
OCP 4.12
Logging 5.6
How reproducible:
Always
Steps to Reproduce:
- Enable Console plugin
- Create test projects using normal user
- Login to Openshift console as a normal user
- Switch to Developer mode
- Go to 'Aggregated logs' in 'Observe' menu
- In the filter Dropdown select "Pods" and click on "Filter by pod"
Actual results:
Error if the user does not have cluster-scoped list pods permission
Expected results:
No error when the user has namespace-scoped permissions to list pods
- links to
- mentioned on
(3 mentioned on)
[LOG-3427] Dev console uses cluster-scoped instead of namespace-scoped resource queries for filters
Assignee | Original: Periklis Tsirakidis [ ptsiraki@redhat.com ] | New: Gabriel Bernal [ gbernal@redhat.com ] |
Reporter | Original: Giriyamma Karagere Ramaswamy [ gkarager ] | New: Gabriel Bernal [ gbernal@redhat.com ] |
Status | Original: To Do [ 10020 ] | New: Code Review [ 14434 ] |
Description |
Original:
h4. Description of problem:
When a non-admin user adds Severity filter, the Aggregated Logs page shows "parse error at line 1, col 113: syntax error: unexpected STRING" h4. Version-Release number of selected component (if applicable): OCP 4.12 Logging 5.6 h4. How reproducible: Always h4. Steps to Reproduce: # Enable Console plugin # Create test projects using normal user # Login to Openshift console as a normal user # Switch to Developer mode # Go to 'Aggregated logs' in 'Observe' menu # select a severity from the drop down h4. Actual results: !image-2022-12-08-16-33-40-591.png! h4. Expected results: No error |
New:
h4. Description of problem:
When a non-admin user selects a filter from the dropdown that includes pods or containers, it uses the cluster scoped API. This leads to an error as most non admin users won't have permission over this resources h4. Version-Release number of selected component (if applicable): OCP 4.12 Logging 5.6 h4. How reproducible: Always h4. Steps to Reproduce: # Enable Console plugin # Create test projects using normal user # Login to Openshift console as a normal user # Switch to Developer mode # Go to 'Aggregated logs' in 'Observe' menu # In the filter Dropdown select "Pods" and click on "Filter by pod" h4. Actual results: Error if the user does not have cluster-scoped list pods permission h4. Expected results: No error when the user has namespace-scoped permissions to list pods |
Remote Link | New: This issue links to "openshift/logging-view-plugin#46: Use namespace scoped api to fetch dev console resources (Web Link)" [ 1094086 ] |
Description |
Original:
h4. Description of problem:
When a non-admin user selects a filter from the dropdown that includes pods or containers, it uses the cluster scoped API. This leads to an error as most non admin users won't have permission over this resources h4. Version-Release number of selected component (if applicable): OCP 4.12 Logging 5.6 h4. How reproducible: Always h4. Steps to Reproduce: # Enable Console plugin # Create test projects using normal user # Login to Openshift console as a normal user # Switch to Developer mode # Go to 'Aggregated logs' in 'Observe' menu # In the filter Dropdown select "Pods" and click on "Filter by pod" h4. Actual results: Error if the user does not have cluster-scoped list pods permission h4. Expected results: No error when the user has namespace-scoped permissions to list pods |
New:
h4. Description of problem:
When a non-admin user selects a filter from the dropdown that includes pods or containers, it uses the cluster scoped API. This leads to an error as most non-admin users won't have permission over broad set of resources h4. Version-Release number of selected component (if applicable): OCP 4.12 Logging 5.6 h4. How reproducible: Always h4. Steps to Reproduce: # Enable Console plugin # Create test projects using normal user # Login to Openshift console as a normal user # Switch to Developer mode # Go to 'Aggregated logs' in 'Observe' menu # In the filter Dropdown select "Pods" and click on "Filter by pod" h4. Actual results: Error if the user does not have cluster-scoped list pods permission h4. Expected results: No error when the user has namespace-scoped permissions to list pods |
Sprint | New: Log Storage - Sprint 229 [ 49157 ] |
Rank | New: Ranked higher |
Remote Link | New: This issue links to "Merge request - Updated US source to: 9e2b3b2 Merge pull request #46 from jgbernalp/use-namespace-scoped-api-dev-console (Web Link)" [ 1099660 ] |
Remote Link | New: This issue links to "Merge request - Updated 2 upstream sources (Web Link)" [ 1100316 ] |
Status | Original: Code Review [ 14434 ] | New: Review [ 12422 ] |
Remote Link | New: This issue links to "Merge request - Updated 2 upstream sources (Web Link)" [ 1101400 ] |
Attachment | New: image-2022-12-19-17-39-31-218.png [ 12796972 ] |
Status | Original: Review [ 12422 ] | New: In Progress [ 10018 ] |
Remote Link | New: This issue links to "openshift/logging-view-plugin#48: Handle resource request errors (Web Link)" [ 1105319 ] |
Status | Original: In Progress [ 10018 ] | New: Code Review [ 14434 ] |
Remote Link | New: This issue links to "Merge request - Updated 2 upstream sources (Web Link)" [ 1105725 ] |
Remote Link | New: This issue links to "Merge request - Updated US source to: b6cd028 Merge pull request #48 from jgbernalp/handle-resource-fetch-errors (Web Link)" [ 1106150 ] |
Remote Link | New: This issue links to "Merge request - Updated US source to: b6cd028 Merge pull request #48 from jgbernalp/handle-resource-fetch-errors (Web Link)" [ 1105793 ] |
Status | Original: Code Review [ 14434 ] | New: Review [ 12422 ] |
QE Status | Original: NEW [ 11052 ] | New: VERIFIED [ 11055 ] |
Resolution | New: Fixed [ 11101 ] | |
Status | Original: Review [ 12422 ] | New: Closed [ 6 ] |
QA Contact | New: Giriyamma K R [ gkarager ] |
Component/s | New: Log Console [ 12368501 ] | |
Component/s | Original: Log Storage [ 12334141 ] |
Workflow | Original: OJA-WF-Y [ 22352585 ] | New: RH1-WF-Q [ 22727812 ] |
Release Note Text | New: Before this change the dev console used cluster scoped queries instead of namespace scoped queries for filters. This change uses the correct scope and displays an error message when the user has no permission over the current namespace resources. |