-
Bug
-
Resolution: Won't Do
-
Undefined
-
None
-
4.19.0
-
Quality / Stability / Reliability
-
False
-
-
None
-
Important
-
None
-
None
-
None
-
Rejected
-
None
-
None
-
None
-
None
-
None
-
None
-
None
-
None
Description of problem:
CI test [sig-arch][Late][Jira:"kube-apiserver"] all tls artifacts must be registered [Suite:openshift/conformance/parallel] always ran into flaky, because some tls artifacts are not registered.
Version-Release number of selected component (if applicable):
4.19
How reproducible:
always
Steps to Reproduce:
1. Check test results of [ sig-arch][Late][Jira:"kube-apiserver"] all tls artifacts must be registered [Suite:openshift/conformance/parallel ] in sippy:
https://sippy.dptools.openshift.org/sippy-ng/tests/4.18/analysis?test=%5Bsig-arch%5D%5BLate%5D%5BJira%3A%22kube-apiserver%22%5D%20all%20tls%20artifacts%20must%20be%20registered%20%5BSuite%3Aopenshift%2Fconformance%2Fparallel%5D&filters=%7B%22items%22%3A%5B%7B%22columnField%22%3A%22name%22%2C%22operatorValue%22%3A%22equals%22%2C%22value%22%3A%22%5Bsig-arch%5D%5BLate%5D%5BJira%3A%5C%22kube-apiserver%5C%22%5D%20all%20tls%20artifacts%20must%20be%20registered%20%5BSuite%3Aopenshift%2Fconformance%2Fparallel%5D%22%7D%2C%7B%22columnField%22%3A%22variants%22%2C%22not%22%3Atrue%2C%22operatorValue%22%3A%22contains%22%2C%22value%22%3A%22never-stable%22%7D%2C%7B%22columnField%22%3A%22variants%22%2C%22not%22%3Atrue%2C%22operatorValue%22%3A%22contains%22%2C%22value%22%3A%22aggregated%22%7D%5D%2C%22linkOperator%22%3A%22and%22%7D
Actual results:
case always fails
Expected results:
case should run passed, all tls artifacts must be registered
Additional info:
Failed log of case:
Run #0: Failed expand_less33s{ ],
"owningJiraComponent": "",
"description": "Created and managed by the machine-config-operator"
}
},
"OnDiskLocation": null
},
{
"InClusterLocation": {
"configMapLocation": {
"Namespace": "openshift-etcd",
"Name": "etcd-all-bundles"
},
"certificateAuthorityBundleInfo": {
"selectedCertMetadataAnnotations": [
{
"key": "openshift.io/owning-component",
"value": "Etcd"
}
],
"owningJiraComponent": "Etcd",
"description": ""
}
},
"OnDiskLocation": null
},
{
"InClusterLocation": {
"configMapLocation": {
"Namespace": "openshift-image-registry",
"Name": "image-registry-certificates"
},
"certificateAuthorityBundleInfo": {
"owningJiraComponent": "",
"description": ""
}
},
"OnDiskLocation": null
},
{
"InClusterLocation": {
"configMapLocation": {
"Namespace": "openshift-monitoring",
"Name": "metrics-client-ca"
},
"certificateAuthorityBundleInfo": {
"owningJiraComponent": "",
"description": ""
}
},
"OnDiskLocation": null
},
{
"InClusterLocation": {
"configMapLocation": {
"Namespace": "openshift-operator-controller",
"Name": "operator-controller-trusted-ca-bundle"
},
"certificateAuthorityBundleInfo": {
"selectedCertMetadataAnnotations": [
{
"key": "openshift.io/owning-component",
"value": "Networking / cluster-network-operator"
}
],
"owningJiraComponent": "Networking / cluster-network-operator",
"description": ""
}
},
"OnDiskLocation": null
}
],
"certKeyPairs": [
{
"InClusterLocation": {
"secretLocation": {
"Namespace": "openshift-insights",
"Name": "insights-runtime-extractor-tls"
},
"certKeyInfo": {
"selectedCertMetadataAnnotations": [
{
"key": "openshift.io/owning-component",
"value": "service-ca"
},
{
"key": "openshift.io/description",
"value": "Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with 'service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls'. The certificate is valid for 2 years."
}
],
"owningJiraComponent": "service-ca",
"description": "Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with 'service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls'. The certificate is valid for 2 years."
}
},
"OnDiskLocation": null
}
]
}
See tls/ownership/README.md in origin repo
Ginkgo exit error 4: exit with code 4}
- relates to
-
API-1886 CI implementation: Create TLS artifacts registry
-
- Closed
-