Uploaded image for project: 'OpenShift Bugs'
  1. OpenShift Bugs
  2. OCPBUGS-48443

[4.18] Non-admin users cannot read or modify UserDefinedNetwork CRs

    • Critical
    • None
    • Rejected
    • False
    • Hide

      None

      Show
      None
    • Release Note Not Required
    • In Progress

      Description of problem:

      Non admin users cannot create UserDefinedNetwork instances.

      Version-Release number of selected component (if applicable):

      How reproducible:

      100%

      Steps to Reproduce:

      1. Create UDN instance as non-admin users.

      2.

      3.

      Actual results:

      In the UI, openning the UserDefinedPage fails with the following error

      ```
      userdefinednetworks.k8s.ovn.org is forbidden: User "test" cannot list resource "userdefinednetworks" in API group "k8s.ovn.org" at the cluster scope
      ```
      We get similar error trying to create one.
      Expected results:

      As a non-admin user I want to be able to create UDN CR w/o cluster-admin intervention.

      Additional info:

      Please fill in the following template while reporting a bug and provide as much relevant information as possible. Doing so will give us the best chance to find a prompt resolution.

      Affected Platforms:

      Is it an

      1. internal CI failure
      2. customer issue / SD
      3. internal RedHat testing failure

      If it is an internal RedHat testing failure:

      • Please share a kubeconfig or creds to a live cluster for the assignee to debug/troubleshoot along with reproducer steps (specially if it's a telco use case like ICNI, secondary bridges or BM+kubevirt).

      If it is a CI failure:

      • Did it happen in different CI lanes? If so please provide links to multiple failures with the same error instance
      • Did it happen in both sdn and ovn jobs? If so please provide links to multiple failures with the same error instance
      • Did it happen in other platforms (e.g. aws, azure, gcp, baremetal etc) ? If so please provide links to multiple failures with the same error instance
      • When did the failure start happening? Please provide the UTC timestamp of the networking outage window from a sample failure run
      • If it's a connectivity issue,
      • What is the srcNode, srcIP and srcNamespace and srcPodName?
      • What is the dstNode, dstIP and dstNamespace and dstPodName?
      • What is the traffic path? (examples: pod2pod? pod2external?, pod2svc? pod2Node? etc)

      If it is a customer / SD issue:

      • Provide enough information in the bug description that Engineering doesnโ€™t need to read the entire case history.
      • Donโ€™t presume that Engineering has access to Salesforce.
      • Do presume that Engineering will access attachments through supportshell.
      • Describe what each relevant attachment is intended to demonstrate (failed pods, log errors, OVS issues, etc).
      • Referring to the attached must-gather, sosreport or other attachment, please provide the following details:
        • If the issue is in a customer namespace then provide a namespace inspect.
        • If it is a connectivity issue:
          • What is the srcNode, srcNamespace, srcPodName and srcPodIP?
          • What is the dstNode, dstNamespace, dstPodName and dstPodIP?
          • What is the traffic path? (examples: pod2pod? pod2external?, pod2svc? pod2Node? etc)
          • Please provide the UTC timestamp networking outage window from must-gather
          • Please provide tcpdump pcaps taken during the outage filtered based on the above provided src/dst IPs
        • If it is not a connectivity issue:
          • Describe the steps taken so far to analyze the logs from networking components (cluster-network-operator, OVNK, SDN, openvswitch, ovs-configure etc) and the actual component where the issue was seen based on the attached must-gather. Please attach snippets of relevant logs around the window when problem has happened if any.
      • When showing the results from commands, include the entire command in the output.  
      • For OCPBUGS in which the issue has been identified, label with โ€œsbr-triagedโ€
      • For OCPBUGS in which the issue has not been identified and needs Engineering help for root cause, label with โ€œsbr-untriagedโ€
      • Do not set the priority, that is owned by Engineering and will be set when the bug is evaluated
      • Note: bugs that do not meet these minimum standards will be closed with label โ€œSDN-Jira-templateโ€
      • For guidance on using this template please see
        OCPBUGS Template Training for Networking  components

       
       
       

       

            [OCPBUGS-48443] [4.18] Non-admin users cannot read or modify UserDefinedNetwork CRs

            Or Mergi created issue -
            Or Mergi made changes -
            Link New: This issue clones OCPBUGS-48425 [ OCPBUGS-48425 ]
            Or Mergi made changes -
            Summary Original: [4.17] Non-admin users cannon read or modify UserDefinedNetwork CRs New: [4.18] Non-admin users cannon read or modify UserDefinedNetwork CRs
            Or Mergi made changes -
            Target Version Original: 4.19 [ 12436721 ] New: 4.18 [ 12431396 ]
            Martin Kennelly made changes -
            Release Blocker Original: Proposed [ 25756 ] New: Rejected [ 25757 ]
            Martin Kennelly made changes -
            Assignee Original: Ben Bennett [ bbennett@redhat.com ] New: Or Mergi [ omergi@redhat.com ]
            Martin Kennelly made changes -
            Labels New: SDN:OVNK:UserDefinedNetworks:Primary
            OpenShift Prow Bot made changes -
            Remote Link New: This issue links to "openshift/cluster-network-operator#2627: [release-4.18] OCPBUGS-48443: ovn-k, rbac: Enable users read & modify UserDefinedNetwork CRs (Web Link)" [ 1916137 ]
            Or Mergi made changes -
            Release Note Type New: Release Note Not Required [ 31862 ]
            OpenShift Jira Bot made changes -
            Release Note Status New: In Progress [ 30960 ]
            Or Mergi made changes -
            Link Original: This issue clones OCPBUGS-48425 [ OCPBUGS-48425 ]
            Or Mergi made changes -
            Link New: This issue depends on OCPBUGS-48425 [ OCPBUGS-48425 ]
            OpenShift Prow Bot made changes -
            Status Original: New [ 10016 ] New: POST [ 15726 ]
            OpenShift Prow Bot made changes -
            Status Original: POST [ 15726 ] New: MODIFIED [ 14454 ]
            OpenShift Prow Bot made changes -
            Link New: This issue is cloned by OCPBUGS-49816 [ OCPBUGS-49816 ]
            OpenShift Prow Bot made changes -
            Link New: This issue blocks OCPBUGS-49816 [ OCPBUGS-49816 ]
            Or Mergi made changes -
            Summary Original: [4.18] Non-admin users cannon read or modify UserDefinedNetwork CRs New: [4.18] Non-admin users cannot read or modify UserDefinedNetwork CRs
            Or Mergi made changes -
            Target Version Original: 4.18 [ 12431396 ] New: 4.18.0 [ 12431397 ]
            Surya Seetharaman made changes -
            Status Original: MODIFIED [ 14454 ] New: ON_QA [ 15723 ]
            Errata Tool made changes -
            Remote Link New: This issue links to "RHEA-2024:6122 (Web Link)" [ 1936221 ]
            Anurag Saxena made changes -
            Status Original: ON_QA [ 15723 ] New: Verified [ 10015 ]
            Errata Tool made changes -
            Resolution New: Done-Errata [ 10803 ]
            Status Original: Verified [ 10015 ] New: Closed [ 6 ]

              omergi@redhat.com Or Mergi
              omergi@redhat.com Or Mergi
              Anurag Saxena Anurag Saxena
              Votes:
              0 Vote for this issue
              Watchers:
              4 Start watching this issue

                Created:
                Updated:
                Resolved: