-
Bug
-
Resolution: Won't Do
-
Undefined
-
None
-
4.19.0
-
Quality / Stability / Reliability
-
False
-
-
None
-
Important
-
None
-
None
-
None
-
Rejected
-
None
-
None
-
None
-
None
-
None
-
None
-
None
-
None
Description of problem:
CI test [sig-arch][Late][Jira:"kube-apiserver"] all tls artifacts must be registered [Suite:openshift/conformance/parallel] always ran into flaky, because some tls artifacts are not registered.
Version-Release number of selected component (if applicable):
4.19
How reproducible:
always
Steps to Reproduce:
1. Check test results of [ sig-arch][Late][Jira:"kube-apiserver"] all tls artifacts must be registered [Suite:openshift/conformance/parallel ] in sippy:
https://sippy.dptools.openshift.org/sippy-ng/tests/4.18/analysis?test=%5Bsig-arch%5D%5BLate%5D%5BJira%3A%22kube-apiserver%22%5D%20all%20tls%20artifacts%20must%20be%20registered%20%5BSuite%3Aopenshift%2Fconformance%2Fparallel%5D&filters=%7B%22items%22%3A%5B%7B%22columnField%22%3A%22name%22%2C%22operatorValue%22%3A%22equals%22%2C%22value%22%3A%22%5Bsig-arch%5D%5BLate%5D%5BJira%3A%5C%22kube-apiserver%5C%22%5D%20all%20tls%20artifacts%20must%20be%20registered%20%5BSuite%3Aopenshift%2Fconformance%2Fparallel%5D%22%7D%2C%7B%22columnField%22%3A%22variants%22%2C%22not%22%3Atrue%2C%22operatorValue%22%3A%22contains%22%2C%22value%22%3A%22never-stable%22%7D%2C%7B%22columnField%22%3A%22variants%22%2C%22not%22%3Atrue%2C%22operatorValue%22%3A%22contains%22%2C%22value%22%3A%22aggregated%22%7D%5D%2C%22linkOperator%22%3A%22and%22%7D
Actual results:
case always fails
Expected results:
case should run passed, all tls artifacts must be registered
Additional info:
Failed log of case: Run #0: Failed expand_less33s{ ], "owningJiraComponent": "", "description": "Created and managed by the machine-config-operator" } }, "OnDiskLocation": null }, { "InClusterLocation": { "configMapLocation": { "Namespace": "openshift-etcd", "Name": "etcd-all-bundles" }, "certificateAuthorityBundleInfo": { "selectedCertMetadataAnnotations": [ { "key": "openshift.io/owning-component", "value": "Etcd" } ], "owningJiraComponent": "Etcd", "description": "" } }, "OnDiskLocation": null }, { "InClusterLocation": { "configMapLocation": { "Namespace": "openshift-image-registry", "Name": "image-registry-certificates" }, "certificateAuthorityBundleInfo": { "owningJiraComponent": "", "description": "" } }, "OnDiskLocation": null }, { "InClusterLocation": { "configMapLocation": { "Namespace": "openshift-monitoring", "Name": "metrics-client-ca" }, "certificateAuthorityBundleInfo": { "owningJiraComponent": "", "description": "" } }, "OnDiskLocation": null }, { "InClusterLocation": { "configMapLocation": { "Namespace": "openshift-operator-controller", "Name": "operator-controller-trusted-ca-bundle" }, "certificateAuthorityBundleInfo": { "selectedCertMetadataAnnotations": [ { "key": "openshift.io/owning-component", "value": "Networking / cluster-network-operator" } ], "owningJiraComponent": "Networking / cluster-network-operator", "description": "" } }, "OnDiskLocation": null } ], "certKeyPairs": [ { "InClusterLocation": { "secretLocation": { "Namespace": "openshift-insights", "Name": "insights-runtime-extractor-tls" }, "certKeyInfo": { "selectedCertMetadataAnnotations": [ { "key": "openshift.io/owning-component", "value": "service-ca" }, { "key": "openshift.io/description", "value": "Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with 'service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls'. The certificate is valid for 2 years." } ], "owningJiraComponent": "service-ca", "description": "Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with 'service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls'. The certificate is valid for 2 years." } }, "OnDiskLocation": null } ] } See tls/ownership/README.md in origin repo Ginkgo exit error 4: exit with code 4}
- relates to
-
API-1886 CI implementation: Create TLS artifacts registry
-
- Closed
-