-
Bug
-
Resolution: Done
-
Blocker
-
quay-v3.6.0
-
False
-
False
-
Quay Enterprise
-
Description of problem:
when install CSO via OLM, the installation is not completed, operator stuck in pending status, CRD imagemanifestvulns.secscan.quay.redhat.com is not created
Version-Release number of selected component (if applicable):
quay-container-security-operator-bundle-container-v3.6.0-16
- Index image v4.5: registry-proxy.engineering.redhat.com/rh-osbs/iib:104362
- Index image v4.6: registry-proxy.engineering.redhat.com/rh-osbs/iib:104366
- Index image v4.7: registry-proxy.engineering.redhat.com/rh-osbs/iib:104372
- Index image v4.8: registry-proxy.engineering.redhat.com/rh-osbs/iib:104375
- Index image v4.9: registry-proxy.engineering.redhat.com/rh-osbs/iib:104380
quay-container-security-operator-container-v3.6.0-22
- registry-proxy.engineering.redhat.com/rh-osbs/quay-quay-container-security-operator-rhel8@sha256:ecb9630cff475c1669ee845a898ac5cbb46e0301b9b421734eb3e971ef339b63
How reproducible:
Always
Steps to Reproduce:
1. Create catalogsource
2. Open openshift webconsole, install operator by operatorhub
3. Check operator status
Actual results:
operator stuck in pending status, CRD imagemanifestvulns.secscan.quay.redhat.com is not created
Expected results:
operator installs successfully
Additional info:
$ oc describe csv container-security-operator.v3.6.0 Name: container-security-operator.v3.6.0 Namespace: default Labels: olm.api.ffe32d10d41a32e9=provided olm.copiedFrom=openshift-operators Annotations: alm-examples: [ { "apiVersion": "secscan.quay.redhat.com/v1alpha1", "kind": "ImageManifestVuln", "metadata": { "selfLink": "/apis/secscan.quay.redhat.com/v1alpha1/namespaces/openshift-cluster-version/imagemanifestvulns/sha256.a7b23f38d1e5be975... "resourceVersion": "14565395", "name": "sha256.a7b23f38d1e5be975a6b516739689673011bdfa59a7158dc6ca36cefae169c18", "uid": "3f16a188-e69a-406c-aa06-df340195409c", "creationTimestamp": "2021-03-17T12:07:16Z", "generation": 2, "managedFields": [ { "apiVersion": "secscan.quay.redhat.com/v1alpha1", "fieldsType": "FieldsV1", "fieldsV1": { "f:metadata": { "f:labels": { ".": {}, "f:openshift-cluster-version/cluster-version-operator-b98ccdb7d-t5sq6": {} } }, "f:spec": { ".": {}, "f:features": {}, "f:image": {}, "f:manifest": {} }, "f:status": { ".": {}, "f:affectedPods": { ".": {}, "f:openshift-cluster-version/cluster-version-operator-b98ccdb7d-t5sq6": {} }, "f:fixableCount": {}, "f:highCount": {}, "f:highestSeverity": {}, "f:lastUpdate": {}, "f:lowCount": {}, "f:mediumCount": {} } }, "manager": "security-labeller", "operation": "Update", "time": "2021-03-17T13:07:20Z" } ], "namespace": "openshift-cluster-version", "labels": { "openshift-cluster-version/cluster-version-operator-b98ccdb7d-t5sq6": "true" } } } ] capabilities: Full Lifecycle categories: OpenShift Optional, Security containerImage: registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:ecb9630cff475c1669ee845a898ac5cbb46e0301b9b421734eb3e971ef339b63 createdAt: 2021-08-25 17:08 UTC description: Identify image vulnerabilities in Kubernetes pods olm.operatorGroup: global-operators olm.operatorNamespace: openshift-operators olm.skipRange: >=3.5.x <3.6.0 operatorframework.io/properties: {"properties":[{"type":"olm.gvk","value":{"group":"secscan.quay.redhat.com","kind":"ImageManifestVuln","version":"v1alpha1"}},{"type":"olm... repository: https://github.com/quay/container-security-operator tectonic-visibility: ocs API Version: operators.coreos.com/v1alpha1 Kind: ClusterServiceVersion Metadata: Creation Timestamp: 2021-09-01T09:40:50Z Generation: 1 Managed Fields: API Version: operators.coreos.com/v1alpha1 Fields Type: FieldsV1 fieldsV1: f:metadata: f:annotations: .: f:alm-examples: f:capabilities: f:categories: f:containerImage: f:createdAt: f:description: f:olm.operatorGroup: f:olm.operatorNamespace: f:olm.skipRange: f:olm.targetNamespaces: f:operatorframework.io/properties: f:repository: f:tectonic-visibility: f:labels: .: f:olm.api.ffe32d10d41a32e9: f:olm.copiedFrom: f:spec: .: f:apiservicedefinitions: f:cleanup: .: f:enabled: f:customresourcedefinitions: .: f:owned: f:description: f:displayName: f:icon: f:install: .: f:spec: .: f:deployments: f:permissions: f:strategy: f:installModes: f:keywords: f:labels: .: f:alm-owner-container-security-operator: f:operated-by: f:links: f:maintainers: f:maturity: f:provider: .: f:name: f:relatedImages: f:selector: .: f:matchLabels: .: f:alm-owner-container-security-operator: f:operated-by: f:version: f:status: .: f:cleanup: f:conditions: f:lastTransitionTime: f:lastUpdateTime: f:message: f:phase: f:reason: f:requirementStatus: Manager: olm Operation: Update Time: 2021-09-01T09:40:53Z Resource Version: 643457 UID: 34b7544d-7e77-4aad-bc50-ec6d627c5810 Spec: Apiservicedefinitions: Cleanup: Enabled: false Customresourcedefinitions: Owned: Description: Represents a set of vulnerabilities in an image manifest. Display Name: Image Manifest Vulnerability Kind: ImageManifestVuln Name: imagemanifestvulns.secscan.quay.redhat.com Version: v1alpha1 Description: The Quay Container Security Operator (CSO) brings Quay and Clair metadata to Kubernetes / OpenShift. Starting with vulnerability information the scope will get expanded over time. If it runs on OpenShift, the corresponding vulnerability information is shown inside the OCP Console. The Quay Container Security Operator enables cluster administrators to monitor known container image vulnerabilities in pods running on their Kubernetes cluster. The controller sets up a watch on pods in the specified namespace(s) and queries the container registry for vulnerability information. If the container registry supports image scanning, such as [Quay](https://github.com/quay/quay) with [Clair](https://github.com/quay/clair), then the Operator will expose any vulnerabilities found via the Kubernetes API in an `ImageManifestVuln` object. This Operator requires no additional configuration after deployment, and will begin watching pods and populating `ImageManifestVulns` immediately once installed. Display Name: Quay Container Security Icon: base64data: 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 Mediatype: image/png Install: Spec: Deployments: Name: container-security-operator Spec: Replicas: 1 Selector: Match Labels: Name: container-security-operator-alm-owned Strategy: Template: Metadata: Creation Timestamp: <nil> Labels: Name: container-security-operator-alm-owned Name: container-security-operator-alm-owned Spec: Containers: Command: /bin/security-labeller --namespaces=$(WATCH_NAMESPACE) --extraCerts=/extra-certs Env: Name: MY_POD_NAMESPACE Value From: Field Ref: Field Path: metadata.namespace Name: MY_POD_NAME Value From: Field Ref: Field Path: metadata.name Name: WATCH_NAMESPACE Value From: Field Ref: Field Path: metadata.annotations['olm.targetNamespaces'] Image: registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:ecb9630cff475c1669ee845a898ac5cbb46e0301b9b421734eb3e971ef339b63 Name: container-security-operator Resources: Volume Mounts: Mount Path: /extra-certs Name: extra-certs Read Only: true Service Account Name: container-security-operator Volumes: Name: extra-certs Secret: Optional: true Secret Name: container-security-operator-extra-certs Permissions: Rules: API Groups: secscan.quay.redhat.com Resources: imagemanifestvulns imagemanifestvulns/status Verbs: * API Groups: Resources: pods events Verbs: * API Groups: Resources: secrets Verbs: get Service Account Name: container-security-operator Strategy: deployment Install Modes: Supported: true Type: OwnNamespace Supported: true Type: SingleNamespace Supported: true Type: MultiNamespace Supported: true Type: AllNamespaces Keywords: open source containers security Labels: Alm - Owner - Container - Security - Operator: container-security-operator Operated - By: container-security-operator Links: Name: Source Code URL: https://github.com/quay/container-security-operator Maintainers: Email: quay-devel@redhat.com Name: Quay Engineering Team Maturity: alpha Provider: Name: Red Hat Related Images: Image: registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:ecb9630cff475c1669ee845a898ac5cbb46e0301b9b421734eb3e971ef339b63 Name: quay-container-security-operator-rhel8-ecb9630cff475c1669ee845a898ac5cbb46e0301b9b421734eb3e971ef339b63-annotation Image: registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:ecb9630cff475c1669ee845a898ac5cbb46e0301b9b421734eb3e971ef339b63 Name: container-security-operator Selector: Match Labels: Alm - Owner - Container - Security - Operator: container-security-operator Operated - By: container-security-operator Version: 3.6.0 Status: Cleanup: Conditions: Last Transition Time: 2021-09-01T09:40:46Z Last Update Time: 2021-09-01T09:40:46Z Message: requirements not yet checked Phase: Pending Reason: RequirementsUnknown Last Transition Time: 2021-09-01T09:40:46Z Last Update Time: 2021-09-01T09:40:46Z Message: one or more requirements couldn't be found Phase: Pending Reason: RequirementsNotMet Last Transition Time: 2021-09-01T09:40:46Z Last Update Time: 2021-09-01T09:40:46Z Message: The operator is running in openshift-operators but is managing this namespace Phase: Pending Reason: Copied Requirement Status: Group: apiextensions.k8s.io Kind: CustomResourceDefinition Message: CRD is not present Name: imagemanifestvulns.secscan.quay.redhat.com Status: NotPresent Version: v1 Group: Kind: ServiceAccount Message: Service account does not exist Name: container-security-operator Status: NotPresent Version: v1 Events: <none>