Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

When provisioning an RKE1 downstream cluster with io.cattle.cluster.cridockerd.enable set to false and enable_cri_dockerd set to true, the cluster successfully provisions when it shouldn't #38265

Closed
markusewalker opened this issue Jul 13, 2022 · 2 comments
Assignees
Labels
kind/bug-qa Issues that have not yet hit a real release. Bugs introduced by a new feature or enhancement priority/2 QA/XS team/hostbusters The team that is responsible for provisioning/managing downstream clusters + K8s version support

Comments

@markusewalker
Copy link
Contributor

Rancher Server Setup

  • Rancher version: v2.6-head 2c21373
  • Installation option (Docker install/Helm Chart): Helm Chart
    • If Helm Chart, Kubernetes Cluster and version (RKE1, RKE2, k3s, EKS, etc):
  • Proxy/Cert Details:

Information about the Cluster

  • Kubernetes version: v1.24.2-rancher1-1
  • Cluster Type (Local/Downstream): Downstream
    • If downstream, what type of cluster? (Custom/Imported or specify provider for Hosted/Infrastructure Provider): AWS

User Information

  • What is the role of the user logged in? (Admin/Cluster Owner/Cluster Member/Project Owner/Project Member/Custom) Admin
    • If custom, define the set of permissions:

Describe the bug

When deploying a v1.24.2-rancher1-1 cluster with Rancher, I added the following annotation: io.cattle.cluster.cridockerd.enable and set it to be false. Additionally, I modified the cluster config's YAML to have enable_cri_dockerd set to be true. The expected output is that the annotation would override enable_cri_dockerd and cluster provisioning would fail.

However, that does not happen and provisioning is successful. Looking into why this happened, this specific combination, for whatever reason, causes the annotation to disappear from my list:

image

If I have this annotation set to false and do not modify enable_cri_dockerd in the YAML, the cluster does not provision as expected.

To Reproduce

  1. Setup Rancher and navigate to the UI in a browser.
  2. Provision a downstream RKE1 node driver cluster.
    • Add the annotation io.cattle.cluster.cridockerd.enable and give it the value false.
    • Edit the cluster configuration as YAML and change enable_cri_dockerd to have a value of true
  3. Once you begin provisioning, note that the cluster does not fail and will eventually successfully provision.
  4. Edit the cluster's configuration and view the annotations; you should see your added annotation disappear.

Result
The cluster should not provision with these conditions.

Expected Result
The cluster is successfully provisioning when it shouldn't.

@markusewalker markusewalker added kind/bug-qa Issues that have not yet hit a real release. Bugs introduced by a new feature or enhancement team/hostbusters The team that is responsible for provisioning/managing downstream clusters + K8s version support labels Jul 13, 2022
@markusewalker markusewalker added this to the v2.6.7 milestone Jul 13, 2022
@Sahota1225 Sahota1225 modified the milestones: v2.6.7, v2.7.0 Jul 14, 2022
@markusewalker
Copy link
Contributor Author

markusewalker commented Aug 19, 2022

While we wait for this issue to be addressed, here is the QA test plan:

QA TEST PLAN

Scenarios Test Case
1 Fresh install: As a standard user, provision an RKE1 node driver cluster with io.cattle.cluster.cridockerd.enable set to false and enable_cri_dockerd set to true

@Sahota1225 Sahota1225 modified the milestones: v2.7.0, v2.7.1 Sep 13, 2022
@Sahota1225 Sahota1225 modified the milestones: v2.7.1, v2.7.x Oct 10, 2022
@snasovich snasovich removed this from the v2.7.x milestone Feb 22, 2024
@snasovich
Copy link
Collaborator

This is no longer relevant for K8s 1.24+ as the flag is now true by default.

@snasovich snasovich closed this as not planned Won't fix, can't repro, duplicate, stale Feb 22, 2024
@zube zube bot closed this as completed Feb 22, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
kind/bug-qa Issues that have not yet hit a real release. Bugs introduced by a new feature or enhancement priority/2 QA/XS team/hostbusters The team that is responsible for provisioning/managing downstream clusters + K8s version support
Projects
None yet
Development

No branches or pull requests

5 participants