-
Notifications
You must be signed in to change notification settings - Fork 1.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
OpenShift 3.7 Release Notes Tracker #4906
Comments
Notes are already being tracked via #4021 Thanks! |
@ahardin-rh sorry this was for 3.7 ;-) wrong copy/paste... |
The 'generatedeploymentconfig' API endpoint will be removed: openshift/origin#15585 |
Automatic merge from submit-queue (batch tested with PRs 15585, 15561) deploy: remove deprecated generatedeploymentconfig api Needs a deprecation notice in openshift/openshift-docs#4906 Need public announcement. Need a release notes. According to @Kargakis this API is not used at all so we should nuke it.
We are deprecating two deployment environment variables: Although the variables aren't documented and aren't used by OpenShift's supported deployment strategies, it's possible there are custom deployer images or hooks in the wild which may be using the variables. @smarterclayton, do you know of any user-facing docs around these variables? A search of the docs repo turned up the following potential references:
Release note draftOpenShift deployments using a custom strategy or hooks are provided with a container environment which includes
These variables are now deprecated, as they refer to internal endpoints rather than the published OpenShift API service endpoints. To connect to the OpenShift API in these contexts, use service DNS or the automatically exposed The |
The |
We are deprecating a large number of policy related APIs and commands.
Note: a 3.7 client will display an error message when trying these command against a 3.7 server, but will still work against a previous server version, and old client will just fail hard against a 3.7 server. |
From Ben B: The odds of someone hitting this (https://bugzilla.redhat.com/show_bug.cgi?id=1500961) are so slim there's no point. Especially if we get the ostree update out in a day or two after 7.4.2. Where we might make a note is in the OCP docs for 3.7, stating that 7.4.2.1 or newer is required for a containerized install. @adellape @ahardin-rh - might need an update in both the release notes and install docs. |
Starting with 3.7 versions of the installer if you've configured AWS provider credentials you must also ensure that all instances are labeled and then set |
Some SCCs became stricter and now drop the following capabilities:
Related PR: openshift/origin#16436 |
Updated installer support for CFME 4.6 on OCP 3.7. |
A 3.7 master will return an unstructured response instead of structured JSON when an action is forbidden. This is a known issue (openshift/origin/issues/16731) and will be fixed in 3.8. |
Known issue: The installer can not deploy system container based installations when the specified registry requires authentication credentials in order to pull the required system container images. The fix for this depends on an update to the |
Known issue: The volume snapshot tech-preview feature may not be available to non-admin users by default due to API RBAC settings. When the volume snapshot controller and provisioner are installed and run, the cluster admin needs to configure the API access to the VolumeSnapshot objects by creating Roles/ClusterRoles and assigning them to the desired users or user groups. |
The node authorizer and admission plugin are used to manage and limit node's permissions in 3.7. Thus nodes should be removed from the group that previously granted them broad permissions across the cluster:
|
@ahardin-rh In regard to the last release note (#4906 (comment)), we plan to perform this step automatically via Ansible as a post upgrade step once the cluster is upgraded to 3.8. Specifically, since this a new feature, we want to give users a release (i.e. 3.7) before forcing it on for them. |
The |
Migration to Kubernetes Role Based Access Control (RBAC) Steps Taken During the 3.6 Release A custom migration controller was created to automatically migrate OpenShift authorization policy resources to the equivalent RBAC resources:
In essence, OpenShift authorization policy objects were the source of truth, and the RBAC objects were forced into matching these objects. Release 3.6 Pre-upgrade steps before upgrading to 3.7 There is a small set of configurations that are possible in OpenShift authorization policy resources that are not supported by RBAC. Such configurations require manual migration based on the customer's use case. To guarantee that all Openshift authorization policy objects are in sync with RBAC, the During rolling upgrade from release 3.6 to 3.7 The following scenario describes a rolling upgrade
Considerations for administrators during rolling upgrade Avoid actions that require changes to OpenShift authorization policy resources such as the creation of new projects. If a project is created against a new master, the RBAC resources it creates will be deleted by the migration controller since they will be seen as out of sync from the OpenShift authorization policy resources. If a project is created against an old master and the migration controller is no longer present due to a 3.7 controller process being the leader, then its policy objects will not be synced and it will have no RBAC resources. After the 3.7 upgrade is complete, the following read-only script can be used to determine what namespaces lack RBAC role bindings (it is up to the cluster administrator to decide how to remediate these namespaces): #!/bin/bash
set -o errexit
set -o nounset
set -o pipefail
for namespace in $(oc get namespace -o name); do
ns=$(echo "${namespace}" | cut -d / -f 2)
rolebindings_count=$(oc get rolebinding.rbac -o name -n "${ns}" | wc -l)
if [[ "${rolebindings_count}" == "0" ]]; then
echo "Namespace ${ns} has no role bindings which may require further investigation"
else
echo "Namespace ${ns}: ok"
fi
done RBAC and OpenShift authorization policy in release 3.7 In 3.7, the RBAC objects become the source of truth. The OpenShift authorization policy objects no longer exist as real objects; the APIs are proxied to the RBAC resources. Therefore creating or modifying or deleting OpenShift authorization policy resources seamlessly results in actions against RBAC objects. The API master handles the conversion between these resources and legacy clients will continue to work as if nothing has changed. The RBAC objects also support watches, unlike the OpenShift authorization policy resources. Policy-based resources have been removed in 3.7. However, RBAC role and binding objects are available and provide equivalent functionality. |
is the catalog api opened back up in 3.7? I can't find any info on it. |
@mfojtik That means if apb registry only have 3.6 apb images, asb work well. But, will have problem while we upgrade to ocp3.7. @jwmatthews @pmorie Please help to confirm this issue and decide if need to add release note. Thanks. |
@openshift/team-documentation can this be closed now? |
All notes related to the Origin / OCP 3.7 release
The text was updated successfully, but these errors were encountered: