-
Bug
-
Resolution: Won't Do
-
Critical
-
None
-
OSSM 2.1.2, OSSM 2.2.1
-
None
OCP 4.11 OSSM 2.1 ServiceMeshExtension failed to be ready
When we testÂ
quay.io/maistra-dev/header-append-filter:2.1
The test case "Creating ServiceMeshExtension" failed to be ready.
Build info:
OCP 4.11.0-0.nightly-2022-05-09-050156
OSSM operator 2.1.2
SMCP 2.1
How to reproduce:
1. Deploy OSSM 2.1.2 and SMCP 2.1 on OCP 4.11 nightly aws cluster
2. Test script: https://github.com/maistra/maistra-test-tool/blob/maistra-2.1/pkg/ossm/sme_install.go
or user can run maistra-test-tool $ go test -run T25 -v
Results: test failed and "error checking for SME header-append
Logs:
SME status: http://pastebin.test.redhat.com/1050913
Status: Deployment: Message: failed to pull image "quay.io/maistra-dev/header-append-filter:2.1": Trying to pull image-registry.openshift-image-registry.svc:5000/bookinfo/ossm-extension-header-a-a0eb0712@sha256:7d295f5dff1143f7afdd5ef61d02c8b987df86672e7ead8fb41f0cbc9328aa90... Getting image source signatures Copying blob sha256:dc5085a7738a0c23fdeab666b621ff693711929d89b519b9dab6556f18dcc2f2 Copying blob sha256:dc5085a7738a0c23fdeab666b621ff693711929d89b519b9dab6556f18dcc2f2 time="2022-05-10T23:31:00Z" level=error msg="Error while applying layer: ApplyLayer exit status 1 stdout: stderr: Error creating mount namespace before pivot: function not implemented" Error: writing blob: adding layer with blob "sha256:dc5085a7738a0c23fdeab666b621ff693711929d89b519b9dab6556f18dcc2f2": ApplyLayer exit status 1 stdout: stderr: Error creating mount namespace before pivot: function not implemented Ready: false Events: <none>
httpbin deployment CLI warning
serviceaccount/httpbin created service/httpbin created Warning: would violate PodSecurity "restricted:latest": allowPrivilegeEscalation != false (container "httpbin" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "httpbin" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "httpbin" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "httpbin" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost")
proxy envoy debug log: See attachment
- is blocked by
-
RFE-2868 Add Security Context Constraint taylored to running Podman and Skopeo in a Pod
- Deferred
- is caused by
-
OCPNODE-887 Enable the RuntimeDefault seccomp profile in OpenShift for all workloads
- Closed
- is documented by
-
OSSM-2748 [OCP 4.11] Document that ServiceMeshExtenson doesn't work
- Closed