Closed sarveshtamba closed 4 years ago
we did this on IBM system z platform, it works so far so good you need prepare those catalog images
something like below
oc import-image openjdk18 \--from=registry.access.redhat.com/redhat-openjdk18/openjdk18-openshift --confirm
oc annotate istag/openjdk18:latest tags=builder
[root@bastion odo-handson]# odo login -u developer -p developer Connecting to the OpenShift cluster Login failed (401 Unauthorized) Verify you have provided correct credentials. ✗ challenger chose not to retry the request [root@bastion odo-handson]# odo catalog list components ✗ unable to retrieve any catalog images from the OpenShift cluster
Tthat looks like failure to login to the OpenShift cluster using odo. I think none of the odo commands that require connectivity with the cluster would work in this case. To verify, you could check if odo project create <project-name>
works or not.
[root@bastion odo-handson]# odo login -u developer -p developer Connecting to the OpenShift cluster Login failed (401 Unauthorized) Verify you have provided correct credentials. ✗ challenger chose not to retry the request [root@bastion odo-handson]# odo catalog list components ✗ unable to retrieve any catalog images from the OpenShift cluster
Tthat looks like failure to login to the OpenShift cluster using odo. I think none of the odo commands that require connectivity with the cluster would work in this case. To verify, you could check if
odo project create <project-name>
works or not.
@dharmit odo project create
seems to work fine.
[root@bastion odo-handson]# odo project create sarvesh-project
✓ Project 'sarvesh-project' is ready for use
✓ New project created and now using project: sarvesh-project
[root@bastion odo-handson]# odo login -u developer -p developer
Connecting to the OpenShift cluster
Login failed (401 Unauthorized)
Verify you have provided correct credentials.
✗ challenger chose not to retry the request
[root@bastion odo-handson]#
That looks weird.
odo preference view
odo login -u developer -p developer -v9
and odo catalog list components -v9
?Non x86 platform is ppc64le. Below is output of request commands:-
[root@bastion ~]# odo preference view
PARAMETER CURRENT_VALUE
UpdateNotification
NamePrefix
Timeout
PushTimeout
[root@bastion ~]# odo login -u developer -p developer -v9
I0528 03:07:48.091718 27038 loader.go:359] Config loaded from file /root/ocp4-workdir/auth/kubeconfig
Connecting to the OpenShift cluster
I0528 03:07:48.092333 27038 round_trippers.go:386] curl -k -v -XHEAD 'https://api.ocp-ppc64le-test-102135.redhat.com:6443/'
I0528 03:07:48.101672 27038 round_trippers.go:405] HEAD https://api.ocp-ppc64le-test-102135.redhat.com:6443/ 403 Forbidden in 9 milliseconds
I0528 03:07:48.101689 27038 round_trippers.go:411] Response Headers:
I0528 03:07:48.101697 27038 round_trippers.go:414] Audit-Id: eaab0720-d226-4163-b1b2-1fd04b43c61b
I0528 03:07:48.101704 27038 round_trippers.go:414] Cache-Control: no-cache, private
I0528 03:07:48.101712 27038 round_trippers.go:414] Content-Type: application/json
I0528 03:07:48.101719 27038 round_trippers.go:414] X-Content-Type-Options: nosniff
I0528 03:07:48.101726 27038 round_trippers.go:414] Content-Length: 186
I0528 03:07:48.101733 27038 round_trippers.go:414] Date: Thu, 28 May 2020 07:07:48 GMT
I0528 03:07:48.101778 27038 round_trippers.go:386] curl -k -v -XGET -H "X-Csrf-Token: 1" 'https://api.ocp-ppc64le-test-102135.redhat.com:6443/.well-known/oauth-authorization-server'
I0528 03:07:48.102525 27038 round_trippers.go:405] GET https://api.ocp-ppc64le-test-102135.redhat.com:6443/.well-known/oauth-authorization-server 200 OK in 0 milliseconds
I0528 03:07:48.102534 27038 round_trippers.go:411] Response Headers:
I0528 03:07:48.102542 27038 round_trippers.go:414] Audit-Id: 2e7fc016-a28d-4fa9-ba68-9f4065d4f898
I0528 03:07:48.102550 27038 round_trippers.go:414] Cache-Control: no-cache, private
I0528 03:07:48.102557 27038 round_trippers.go:414] Content-Type: application/json
I0528 03:07:48.102564 27038 round_trippers.go:414] Content-Length: 642
I0528 03:07:48.102571 27038 round_trippers.go:414] Date: Thu, 28 May 2020 07:07:48 GMT
I0528 03:07:48.102836 27038 round_trippers.go:386] curl -k -v -XGET -H "X-Csrf-Token: 1" 'https://oauth-openshift.apps.ocp-ppc64le-test-102135.redhat.com/oauth/authorize?client_id=openshift-challenging-client&code_challenge=0B_Kbjm2vnvR4vOPiwhgy_mzrFPy9dwjmNxVsZX9QVQ&code_challenge_method=S256&redirect_uri=https%3A%2F%2Foauth-openshift.apps.ocp-ppc64le-test-102135.redhat.com%2Foauth%2Ftoken%2Fimplicit&response_type=code'
I0528 03:07:48.130384 27038 round_trippers.go:405] GET https://oauth-openshift.apps.ocp-ppc64le-test-102135.redhat.com/oauth/authorize?client_id=openshift-challenging-client&code_challenge=0B_Kbjm2vnvR4vOPiwhgy_mzrFPy9dwjmNxVsZX9QVQ&code_challenge_method=S256&redirect_uri=https%3A%2F%2Foauth-openshift.apps.ocp-ppc64le-test-102135.redhat.com%2Foauth%2Ftoken%2Fimplicit&response_type=code 401 Unauthorized in 27 milliseconds
I0528 03:07:48.130411 27038 round_trippers.go:411] Response Headers:
I0528 03:07:48.130422 27038 round_trippers.go:414] Referrer-Policy: strict-origin-when-cross-origin
I0528 03:07:48.130430 27038 round_trippers.go:414] Www-Authenticate: Basic realm="openshift"
I0528 03:07:48.130438 27038 round_trippers.go:414] X-Dns-Prefetch-Control: off
I0528 03:07:48.130445 27038 round_trippers.go:414] X-Frame-Options: DENY
I0528 03:07:48.130455 27038 round_trippers.go:414] Content-Length: 0
I0528 03:07:48.130464 27038 round_trippers.go:414] Pragma: no-cache
I0528 03:07:48.130473 27038 round_trippers.go:414] Expires: 0
I0528 03:07:48.130482 27038 round_trippers.go:414] X-Content-Type-Options: nosniff
I0528 03:07:48.130491 27038 round_trippers.go:414] X-Xss-Protection: 1; mode=block
I0528 03:07:48.130499 27038 round_trippers.go:414] Date: Thu, 28 May 2020 07:07:48 GMT
I0528 03:07:48.130508 27038 round_trippers.go:414] Cache-Control: no-cache, no-store, max-age=0, must-revalidate
I0528 03:07:48.130571 27038 round_trippers.go:386] curl -k -v -XGET -H "Authorization: Basic ZGV2ZWxvcGVyOmRldmVsb3Blcg==" -H "X-Csrf-Token: 1" 'https://oauth-openshift.apps.ocp-ppc64le-test-102135.redhat.com/oauth/authorize?client_id=openshift-challenging-client&code_challenge=0B_Kbjm2vnvR4vOPiwhgy_mzrFPy9dwjmNxVsZX9QVQ&code_challenge_method=S256&redirect_uri=https%3A%2F%2Foauth-openshift.apps.ocp-ppc64le-test-102135.redhat.com%2Foauth%2Ftoken%2Fimplicit&response_type=code'
I0528 03:07:48.136905 27038 round_trippers.go:405] GET https://oauth-openshift.apps.ocp-ppc64le-test-102135.redhat.com/oauth/authorize?client_id=openshift-challenging-client&code_challenge=0B_Kbjm2vnvR4vOPiwhgy_mzrFPy9dwjmNxVsZX9QVQ&code_challenge_method=S256&redirect_uri=https%3A%2F%2Foauth-openshift.apps.ocp-ppc64le-test-102135.redhat.com%2Foauth%2Ftoken%2Fimplicit&response_type=code 401 Unauthorized in 6 milliseconds
I0528 03:07:48.136926 27038 round_trippers.go:411] Response Headers:
I0528 03:07:48.136939 27038 round_trippers.go:414] Expires: 0
I0528 03:07:48.136948 27038 round_trippers.go:414] X-Dns-Prefetch-Control: off
I0528 03:07:48.136955 27038 round_trippers.go:414] Www-Authenticate: Basic realm="openshift"
I0528 03:07:48.136962 27038 round_trippers.go:414] X-Content-Type-Options: nosniff
I0528 03:07:48.136970 27038 round_trippers.go:414] X-Frame-Options: DENY
I0528 03:07:48.136977 27038 round_trippers.go:414] X-Xss-Protection: 1; mode=block
I0528 03:07:48.136986 27038 round_trippers.go:414] Date: Thu, 28 May 2020 07:07:48 GMT
I0528 03:07:48.136994 27038 round_trippers.go:414] Cache-Control: no-cache, no-store, max-age=0, must-revalidate
I0528 03:07:48.137001 27038 round_trippers.go:414] Pragma: no-cache
I0528 03:07:48.137008 27038 round_trippers.go:414] Referrer-Policy: strict-origin-when-cross-origin
I0528 03:07:48.137016 27038 round_trippers.go:414] Content-Length: 0
I0528 03:07:48.137039 27038 basicauth.go:51] already handled basic challenge
Login failed (401 Unauthorized)
Verify you have provided correct credentials.
I0528 03:07:48.137071 27038 cmdutils.go:48] Error:
challenger chose not to retry the request
✗ challenger chose not to retry the request
[root@bastion ~]# odo catalog list components -v9
I0528 03:08:39.198827 27048 loader.go:359] Config loaded from file /root/ocp4-workdir/auth/kubeconfig
I0528 03:08:39.201819 27048 round_trippers.go:386] curl -k -v -XGET -H "Accept: application/json, */*" -H "User-Agent: odo/v0.0.0 (linux/ppc64le) kubernetes/$Format" -H "Authorization: Bearer SkO8Ok7B2c0YBVs7ql9kjupBRL40M6eFgExq2KpzZG4" 'https://api.ocp-ppc64le-test-102135.redhat.com:6443/apis/project.openshift.io/v1/projects/openshift'
I0528 03:08:39.243159 27048 round_trippers.go:405] GET https://api.ocp-ppc64le-test-102135.redhat.com:6443/apis/project.openshift.io/v1/projects/openshift 200 OK in 41 milliseconds
I0528 03:08:39.243194 27048 round_trippers.go:411] Response Headers:
I0528 03:08:39.243203 27048 round_trippers.go:414] Date: Thu, 28 May 2020 07:08:39 GMT
I0528 03:08:39.243211 27048 round_trippers.go:414] Content-Length: 496
I0528 03:08:39.243218 27048 round_trippers.go:414] Audit-Id: b67bfde3-55f2-4b75-9327-fd71a7cb8a5f
I0528 03:08:39.243226 27048 round_trippers.go:414] Cache-Control: no-cache, private
I0528 03:08:39.243233 27048 round_trippers.go:414] Cache-Control: no-store
I0528 03:08:39.243240 27048 round_trippers.go:414] Content-Type: application/json
I0528 03:08:39.245316 27048 request.go:897] Response Body: {"kind":"Project","apiVersion":"project.openshift.io/v1","metadata":{"name":"openshift","selfLink":"/apis/project.openshift.io/v1/projects/openshift","uid":"8f70dc38-a8e2-45e2-a485-88ec06d7c03a","resourceVersion":"8756","creationTimestamp":"2020-05-13T07:11:07Z","annotations":{"openshift.io/sa.scc.mcs":"s0:c22,c9","openshift.io/sa.scc.supplemental-groups":"1000480000/10000","openshift.io/sa.scc.uid-range":"1000480000/10000"}},"spec":{"finalizers":["kubernetes"]},"status":{"phase":"Active"}}
I0528 03:08:39.246586 27048 round_trippers.go:386] curl -k -v -XGET -H "User-Agent: odo/v0.0.0 (linux/ppc64le) kubernetes/$Format" -H "Authorization: Bearer SkO8Ok7B2c0YBVs7ql9kjupBRL40M6eFgExq2KpzZG4" -H "Accept: application/json, */*" 'https://api.ocp-ppc64le-test-102135.redhat.com:6443/apis/image.openshift.io/v1/namespaces/openshift/imagestreams'
I0528 03:08:39.254602 27048 round_trippers.go:405] GET https://api.ocp-ppc64le-test-102135.redhat.com:6443/apis/image.openshift.io/v1/namespaces/openshift/imagestreams 200 OK in 7 milliseconds
I0528 03:08:39.254617 27048 round_trippers.go:411] Response Headers:
I0528 03:08:39.254629 27048 round_trippers.go:414] Cache-Control: no-cache, private
I0528 03:08:39.254637 27048 round_trippers.go:414] Cache-Control: no-store
I0528 03:08:39.254645 27048 round_trippers.go:414] Content-Type: application/json
I0528 03:08:39.254655 27048 round_trippers.go:414] Date: Thu, 28 May 2020 07:08:39 GMT
I0528 03:08:39.254664 27048 round_trippers.go:414] Audit-Id: a381f306-9b78-43d9-9c2d-a9c9ccba9d9a
I0528 03:08:39.255405 27048 request.go:897] Response Body: {"kind":"ImageStreamList","apiVersion":"image.openshift.io/v1","metadata":{"selfLink":"/apis/image.openshift.io/v1/namespaces/openshift/imagestreams","resourceVersion":"10554251"},"items":[{"metadata":{"name":"cli","namespace":"openshift","selfLink":"/apis/image.openshift.io/v1/namespaces/openshift/imagestreams/cli","uid":"fc0e6c4f-ad91-4b0b-b0d3-bf57d832bd9a","resourceVersion":"12339","generation":2,"creationTimestamp":"2020-05-13T07:13:31Z"},"spec":{"lookupPolicy":{"local":false},"tags":[{"name":"latest","annotations":null,"from":{"kind":"DockerImage","name":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:85188d9ccefd6923ce9b4e7cf5b2445739706aa9f642a9cb06d7b4ba82fcf1e6"},"generation":2,"importPolicy":{"scheduled":true},"referencePolicy":{"type":"Source"}}]},"status":{"dockerImageRepository":"image-registry.openshift-image-registry.svc:5000/openshift/cli","publicDockerImageRepository":"default-route-openshift-image-registry.apps.ocp-ppc64le-test-102135.redhat.com/openshift/cli","tags":[{"tag":"latest","items":null,"conditions":[{"type":"ImportSuccess","status":"False","lastTransitionTime":"2020-05-13T07:13:31Z","reason":"Unauthorized","message":"you may not have access to the container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:85188d9ccefd6923ce9b4e7cf5b2445739706aa9f642a9cb06d7b4ba82fcf1e6\"","generation":2}]}]}},{"metadata":{"name":"cli-artifacts","namespace":"openshift","selfLink":"/apis/image.openshift.io/v1/namespaces/openshift/imagestreams/cli-artifacts","uid":"7b2cdd59-197c-4a4b-86ea-bf47046d785a","resourceVersion":"12341","generation":2,"creationTimestamp":"2020-05-13T07:13:31Z"},"spec":{"lookupPolicy":{"local":false},"tags":[{"name":"latest","annotations":null,"from":{"kind":"DockerImage","name":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:29d02a351e3a203e344ac9a835193d3bd6ba6edd770bc33ce963f6718dcf3c8a"},"generation":2,"importPolicy":{"scheduled":true},"referencePolicy":{"type":"Source"}}]},"status":{"dockerImageRepository":"image-registry.openshift-image-registry.svc:5000/openshift/cli-artifacts","publicDockerImageRepository":"default-route-openshift-image-registry.apps.ocp-ppc64le-test-102135.redhat.com/openshift/cli-artifacts","tags":[{"tag":"latest","items":null,"conditions":[{"type":"ImportSuccess","status":"False","lastTransitionTime":"2020-05-13T07:13:31Z","reason":"Unauthorized","message":"you may not have access to the container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:29d02a351e3a203e344ac9a835193d3bd6ba6edd770bc33ce963f6718dcf3c8a\"","generation":2}]}]}},{"metadata":{"name":"installer","namespace":"openshift","selfLink":"/apis/image.openshift.io/v1/namespaces/openshift/imagestreams/installer","uid":"f812bb1d-f82b-47c3-b451-134a4a94ff30","resourceVersion":"12343","generation":2,"creationTimestamp":"2020-05-13T07:13:31Z"},"spec":{"lookupPolicy":{"local":false},"tags":[{"name":"latest","annotations":null,"from":{"kind":"DockerImage","name":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3fe646e65a68528f352eab5179e1c1c64f9b8c55ca2b196e5964c42faa6833e7"},"generation":2,"importPolicy":{"scheduled":true},"referencePolicy":{"type":"Source"}}]},"status":{"dockerImageRepository":"image-registry.openshift-image-registry.svc:5000/openshift/installer","publicDockerImageRepository":"default-route-openshift-image-registry.apps.ocp-ppc64le-test-102135.redhat.com/openshift/installer","tags":[{"tag":"latest","items":null,"conditions":[{"type":"ImportSuccess","status":"False","lastTransitionTime":"2020-05-13T07:13:31Z","reason":"Unauthorized","message":"you may not have access to the container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3fe646e65a68528f352eab5179e1c1c64f9b8c55ca2b196e5964c42faa6833e7\"","generation":2}]}]}},{"metadata":{"name":"installer-artifacts","namespace":"openshift","selfLink":"/apis/image.openshift.io/v1/namespaces/openshift/imagestreams/installer-artifacts","uid":"11d43ad3-6f4f-46d5-8a41-15cd8e89ca23","resourceVersion":"12344","generation":2,"creationTimestamp":"2020-05-13T07:13:31Z"},"spec":{"lookupPolicy":{"local":false},"tags":[{"name":"latest","annotations":null,"from":{"kind":"DockerImage","name":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ad760ebec3bbc755107b39c7f5098f1b4dffdd2f804467dd25f5fe07ea8a9859"},"generation":2,"importPolicy":{"scheduled":true},"referencePolicy":{"type":"Source"}}]},"status":{"dockerImageRepository":"image-registry.openshift-image-registry.svc:5000/openshift/installer-artifacts","publicDockerImageRepository":"default-route-openshift-image-registry.apps.ocp-ppc64le-test-102135.redhat.com/openshift/installer-artifacts","tags":[{"tag":"latest","items":null,"conditions":[{"type":"ImportSuccess","status":"False","lastTransitionTime":"2020-05-13T07:13:31Z","reason":"Unauthorized","message":"you may not have access to the container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ad760ebec3bbc755107b39c7f5098f1b4dffdd2f804467dd25f5fe07ea8a9859\"","generation":2}]}]}},{"metadata":{"name":"must-gather","namespace":"openshift","selfLink":"/apis/image.openshift.io/v1/namespaces/openshift/imagestreams/must-gather","uid":"d9495dc8-f318-405f-9b39-3a69539b520b","resourceVersion":"12347","generation":2,"creationTimestamp":"2020-05-13T07:13:31Z"},"spec":{"lookupPolicy":{"local":false},"tags":[{"name":"latest","annotations":null,"from":{"kind":"DockerImage","name":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:097bdc2123fd0f6e1dc6207fc52410ff29a35fd30de8b6012c877684c1a53c04"},"generation":2,"importPolicy":{"scheduled":true},"referencePolicy":{"type":"Source"}}]},"status":{"dockerImageRepository":"image-registry.openshift-image-registry.svc:5000/openshift/must-gather","publicDockerImageRepository":"default-route-openshift-image-registry.apps.ocp-ppc64le-test-102135.redhat.com/openshift/must-gather","tags":[{"tag":"latest","items":null,"conditions":[{"type":"ImportSuccess","status":"False","lastTransitionTime":"2020-05-13T07:13:31Z","reason":"Unauthorized","message":"you may not have access to the container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:097bdc2123fd0f6e1dc6207fc52410ff29a35fd30de8b6012c877684c1a53c04\"","generation":2}]}]}},{"metadata":{"name":"nodejs","namespace":"openshift","selfLink":"/apis/image.openshift.io/v1/namespaces/openshift/imagestreams/nodejs","uid":"bb902162-eb0b-4a0c-bd89-8156470cbb96","resourceVersion":"9772929","generation":1,"creationTimestamp":"2020-05-27T08:25:18Z","annotations":{"openshift.io/image.dockerRepositoryCheck":"2020-05-27T08:25:18Z"}},"spec":{"lookupPolicy":{"local":false},"tags":[{"name":"latest","annotations":null,"from":{"kind":"DockerImage","name":"registry.redhat.io/rhoar-nodejs/nodejs-10"},"generation":1,"importPolicy":{"insecure":true},"referencePolicy":{"type":"Source"}}]},"status":{"dockerImageRepository":"image-registry.openshift-image-registry.svc:5000/openshift/nodejs","publicDockerImageRepository":"default-route-openshift-image-registry.apps.ocp-ppc64le-test-102135.redhat.com/openshift/nodejs","tags":[{"tag":"latest","items":null,"conditions":[{"type":"ImportSuccess","status":"False","lastTransitionTime":"2020-05-27T08:25:18Z","reason":"InternalError","message":"Internal error occurred: registry.redhat.io/rhoar-nodejs/nodejs-10:latest: Get http://registry.redhat.io/v2/: dial tcp: lookup registry.redhat.io on 172.30.0.10:53: server misbehaving","generation":1}]}]}},{"metadata":{"name":"oauth-proxy","namespace":"openshift","selfLink":"/apis/image.openshift.io/v1/namespaces/openshift/imagestreams/oauth-proxy","uid":"73a0260f-53f8-469b-be57-41e1ffadf813","resourceVersion":"12349","generation":2,"creationTimestamp":"2020-05-13T07:13:31Z"},"spec":{"lookupPolicy":{"local":false},"tags":[{"name":"v4.4","annotations":null,"from":{"kind":"DockerImage","name":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:dc4fa269ae29c954b33a6cdcafcc154784e8bcafae5e5031298ae96fb1ecedd2"},"generation":2,"importPolicy":{"scheduled":true},"referencePolicy":{"type":"Source"}}]},"status":{"dockerImageRepository":"image-registry.openshift-image-registry.svc:5000/openshift/oauth-proxy","publicDockerImageRepository":"default-route-openshift-image-registry.apps.ocp-ppc64le-test-102135.redhat.com/openshift/oauth-proxy","tags":[{"tag":"v4.4","items":null,"conditions":[{"type":"ImportSuccess","status":"False","lastTransitionTime":"2020-05-13T07:13:31Z","reason":"Unauthorized","message":"you may not have access to the container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:dc4fa269ae29c954b33a6cdcafcc154784e8bcafae5e5031298ae96fb1ecedd2\"","generation":2}]}]}},{"metadata":{"name":"openjdk18","namespace":"openshift","selfLink":"/apis/image.openshift.io/v1/namespaces/openshift/imagestreams/openjdk18","uid":"ff014c3f-c6b1-4292-8ee9-4aaf9e0ca348","resourceVersion":"9718189","generation":2,"creationTimestamp":"2020-05-27T06:45:15Z","annotations":{"openshift.io/image.dockerRepositoryCheck":"2020-05-27T06:45:15Z"}},"spec":{"lookupPolicy":{"local":false},"tags":[{"name":"latest","annotations":{"tags":"builder"},"from":{"kind":"DockerImage","name":"registry.access.redhat.com/redhat-openjdk-18/openjdk18-openshift"},"generation":1,"importPolicy":{"insecure":true},"referencePolicy":{"type":"Source"}}]},"status":{"dockerImageRepository":"image-registry.openshift-image-registry.svc:5000/openshift/openjdk18","publicDockerImageRepository":"default-route-openshift-image-registry.apps.ocp-ppc64le-test-102135.redhat.com/openshift/openjdk18","tags":[{"tag":"latest","items":[{"created":"2020-05-27T06:45:15Z","dockerImageReference":"registry.access.redhat.com/redhat-openjdk-18/openjdk18-openshift@sha256:b2efa9bf72d4e81d299605602ef9f046ec49bde8e817c89c0614dbd8a4508395","image":"sha256:b2efa9bf72d4e81d299605602ef9f046ec49bde8e817c89c0614dbd8a4508395","generation":1}]}]}},{"metadata":{"name":"openjdk18-pkvr-app","namespace":"openshift","selfLink":"/apis/image.openshift.io/v1/namespaces/openshift/imagestreams/openjdk18-pkvr-app","uid":"9fb2e59b-b6ba-4836-bc5a-571e087dc2e7","resourceVersion":"9736318","generation":1,"creationTimestamp":"2020-05-27T07:21:37Z","labels":{"app":"app","app.kubernetes.io/instance":"openjdk18-pkvr","app.kubernetes.io/managed-by":"odo" [truncated 5786 chars]
I0528 03:08:39.257599 27048 round_trippers.go:386] curl -k -v -XGET -H "User-Agent: odo/v0.0.0 (linux/ppc64le) kubernetes/$Format" -H "Authorization: Bearer SkO8Ok7B2c0YBVs7ql9kjupBRL40M6eFgExq2KpzZG4" -H "Accept: application/json, */*" 'https://api.ocp-ppc64le-test-102135.redhat.com:6443/apis/image.openshift.io/v1/namespaces/openshift/imagestreams'
I0528 03:08:39.273488 27048 round_trippers.go:405] GET https://api.ocp-ppc64le-test-102135.redhat.com:6443/apis/image.openshift.io/v1/namespaces/openshift/imagestreams 200 OK in 15 milliseconds
I0528 03:08:39.273500 27048 round_trippers.go:411] Response Headers:
I0528 03:08:39.273511 27048 round_trippers.go:414] Content-Type: application/json
I0528 03:08:39.273518 27048 round_trippers.go:414] Date: Thu, 28 May 2020 07:08:39 GMT
I0528 03:08:39.273528 27048 round_trippers.go:414] Audit-Id: fc90ce59-2496-444f-a7d2-35d67fed0704
I0528 03:08:39.273536 27048 round_trippers.go:414] Cache-Control: no-cache, private
I0528 03:08:39.273543 27048 round_trippers.go:414] Cache-Control: no-store
I0528 03:08:39.273811 27048 request.go:897] Response Body: {"kind":"ImageStreamList","apiVersion":"image.openshift.io/v1","metadata":{"selfLink":"/apis/image.openshift.io/v1/namespaces/openshift/imagestreams","resourceVersion":"10554251"},"items":[{"metadata":{"name":"cli","namespace":"openshift","selfLink":"/apis/image.openshift.io/v1/namespaces/openshift/imagestreams/cli","uid":"fc0e6c4f-ad91-4b0b-b0d3-bf57d832bd9a","resourceVersion":"12339","generation":2,"creationTimestamp":"2020-05-13T07:13:31Z"},"spec":{"lookupPolicy":{"local":false},"tags":[{"name":"latest","annotations":null,"from":{"kind":"DockerImage","name":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:85188d9ccefd6923ce9b4e7cf5b2445739706aa9f642a9cb06d7b4ba82fcf1e6"},"generation":2,"importPolicy":{"scheduled":true},"referencePolicy":{"type":"Source"}}]},"status":{"dockerImageRepository":"image-registry.openshift-image-registry.svc:5000/openshift/cli","publicDockerImageRepository":"default-route-openshift-image-registry.apps.ocp-ppc64le-test-102135.redhat.com/openshift/cli","tags":[{"tag":"latest","items":null,"conditions":[{"type":"ImportSuccess","status":"False","lastTransitionTime":"2020-05-13T07:13:31Z","reason":"Unauthorized","message":"you may not have access to the container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:85188d9ccefd6923ce9b4e7cf5b2445739706aa9f642a9cb06d7b4ba82fcf1e6\"","generation":2}]}]}},{"metadata":{"name":"cli-artifacts","namespace":"openshift","selfLink":"/apis/image.openshift.io/v1/namespaces/openshift/imagestreams/cli-artifacts","uid":"7b2cdd59-197c-4a4b-86ea-bf47046d785a","resourceVersion":"12341","generation":2,"creationTimestamp":"2020-05-13T07:13:31Z"},"spec":{"lookupPolicy":{"local":false},"tags":[{"name":"latest","annotations":null,"from":{"kind":"DockerImage","name":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:29d02a351e3a203e344ac9a835193d3bd6ba6edd770bc33ce963f6718dcf3c8a"},"generation":2,"importPolicy":{"scheduled":true},"referencePolicy":{"type":"Source"}}]},"status":{"dockerImageRepository":"image-registry.openshift-image-registry.svc:5000/openshift/cli-artifacts","publicDockerImageRepository":"default-route-openshift-image-registry.apps.ocp-ppc64le-test-102135.redhat.com/openshift/cli-artifacts","tags":[{"tag":"latest","items":null,"conditions":[{"type":"ImportSuccess","status":"False","lastTransitionTime":"2020-05-13T07:13:31Z","reason":"Unauthorized","message":"you may not have access to the container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:29d02a351e3a203e344ac9a835193d3bd6ba6edd770bc33ce963f6718dcf3c8a\"","generation":2}]}]}},{"metadata":{"name":"installer","namespace":"openshift","selfLink":"/apis/image.openshift.io/v1/namespaces/openshift/imagestreams/installer","uid":"f812bb1d-f82b-47c3-b451-134a4a94ff30","resourceVersion":"12343","generation":2,"creationTimestamp":"2020-05-13T07:13:31Z"},"spec":{"lookupPolicy":{"local":false},"tags":[{"name":"latest","annotations":null,"from":{"kind":"DockerImage","name":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3fe646e65a68528f352eab5179e1c1c64f9b8c55ca2b196e5964c42faa6833e7"},"generation":2,"importPolicy":{"scheduled":true},"referencePolicy":{"type":"Source"}}]},"status":{"dockerImageRepository":"image-registry.openshift-image-registry.svc:5000/openshift/installer","publicDockerImageRepository":"default-route-openshift-image-registry.apps.ocp-ppc64le-test-102135.redhat.com/openshift/installer","tags":[{"tag":"latest","items":null,"conditions":[{"type":"ImportSuccess","status":"False","lastTransitionTime":"2020-05-13T07:13:31Z","reason":"Unauthorized","message":"you may not have access to the container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3fe646e65a68528f352eab5179e1c1c64f9b8c55ca2b196e5964c42faa6833e7\"","generation":2}]}]}},{"metadata":{"name":"installer-artifacts","namespace":"openshift","selfLink":"/apis/image.openshift.io/v1/namespaces/openshift/imagestreams/installer-artifacts","uid":"11d43ad3-6f4f-46d5-8a41-15cd8e89ca23","resourceVersion":"12344","generation":2,"creationTimestamp":"2020-05-13T07:13:31Z"},"spec":{"lookupPolicy":{"local":false},"tags":[{"name":"latest","annotations":null,"from":{"kind":"DockerImage","name":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ad760ebec3bbc755107b39c7f5098f1b4dffdd2f804467dd25f5fe07ea8a9859"},"generation":2,"importPolicy":{"scheduled":true},"referencePolicy":{"type":"Source"}}]},"status":{"dockerImageRepository":"image-registry.openshift-image-registry.svc:5000/openshift/installer-artifacts","publicDockerImageRepository":"default-route-openshift-image-registry.apps.ocp-ppc64le-test-102135.redhat.com/openshift/installer-artifacts","tags":[{"tag":"latest","items":null,"conditions":[{"type":"ImportSuccess","status":"False","lastTransitionTime":"2020-05-13T07:13:31Z","reason":"Unauthorized","message":"you may not have access to the container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ad760ebec3bbc755107b39c7f5098f1b4dffdd2f804467dd25f5fe07ea8a9859\"","generation":2}]}]}},{"metadata":{"name":"must-gather","namespace":"openshift","selfLink":"/apis/image.openshift.io/v1/namespaces/openshift/imagestreams/must-gather","uid":"d9495dc8-f318-405f-9b39-3a69539b520b","resourceVersion":"12347","generation":2,"creationTimestamp":"2020-05-13T07:13:31Z"},"spec":{"lookupPolicy":{"local":false},"tags":[{"name":"latest","annotations":null,"from":{"kind":"DockerImage","name":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:097bdc2123fd0f6e1dc6207fc52410ff29a35fd30de8b6012c877684c1a53c04"},"generation":2,"importPolicy":{"scheduled":true},"referencePolicy":{"type":"Source"}}]},"status":{"dockerImageRepository":"image-registry.openshift-image-registry.svc:5000/openshift/must-gather","publicDockerImageRepository":"default-route-openshift-image-registry.apps.ocp-ppc64le-test-102135.redhat.com/openshift/must-gather","tags":[{"tag":"latest","items":null,"conditions":[{"type":"ImportSuccess","status":"False","lastTransitionTime":"2020-05-13T07:13:31Z","reason":"Unauthorized","message":"you may not have access to the container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:097bdc2123fd0f6e1dc6207fc52410ff29a35fd30de8b6012c877684c1a53c04\"","generation":2}]}]}},{"metadata":{"name":"nodejs","namespace":"openshift","selfLink":"/apis/image.openshift.io/v1/namespaces/openshift/imagestreams/nodejs","uid":"bb902162-eb0b-4a0c-bd89-8156470cbb96","resourceVersion":"9772929","generation":1,"creationTimestamp":"2020-05-27T08:25:18Z","annotations":{"openshift.io/image.dockerRepositoryCheck":"2020-05-27T08:25:18Z"}},"spec":{"lookupPolicy":{"local":false},"tags":[{"name":"latest","annotations":null,"from":{"kind":"DockerImage","name":"registry.redhat.io/rhoar-nodejs/nodejs-10"},"generation":1,"importPolicy":{"insecure":true},"referencePolicy":{"type":"Source"}}]},"status":{"dockerImageRepository":"image-registry.openshift-image-registry.svc:5000/openshift/nodejs","publicDockerImageRepository":"default-route-openshift-image-registry.apps.ocp-ppc64le-test-102135.redhat.com/openshift/nodejs","tags":[{"tag":"latest","items":null,"conditions":[{"type":"ImportSuccess","status":"False","lastTransitionTime":"2020-05-27T08:25:18Z","reason":"InternalError","message":"Internal error occurred: registry.redhat.io/rhoar-nodejs/nodejs-10:latest: Get http://registry.redhat.io/v2/: dial tcp: lookup registry.redhat.io on 172.30.0.10:53: server misbehaving","generation":1}]}]}},{"metadata":{"name":"oauth-proxy","namespace":"openshift","selfLink":"/apis/image.openshift.io/v1/namespaces/openshift/imagestreams/oauth-proxy","uid":"73a0260f-53f8-469b-be57-41e1ffadf813","resourceVersion":"12349","generation":2,"creationTimestamp":"2020-05-13T07:13:31Z"},"spec":{"lookupPolicy":{"local":false},"tags":[{"name":"v4.4","annotations":null,"from":{"kind":"DockerImage","name":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:dc4fa269ae29c954b33a6cdcafcc154784e8bcafae5e5031298ae96fb1ecedd2"},"generation":2,"importPolicy":{"scheduled":true},"referencePolicy":{"type":"Source"}}]},"status":{"dockerImageRepository":"image-registry.openshift-image-registry.svc:5000/openshift/oauth-proxy","publicDockerImageRepository":"default-route-openshift-image-registry.apps.ocp-ppc64le-test-102135.redhat.com/openshift/oauth-proxy","tags":[{"tag":"v4.4","items":null,"conditions":[{"type":"ImportSuccess","status":"False","lastTransitionTime":"2020-05-13T07:13:31Z","reason":"Unauthorized","message":"you may not have access to the container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:dc4fa269ae29c954b33a6cdcafcc154784e8bcafae5e5031298ae96fb1ecedd2\"","generation":2}]}]}},{"metadata":{"name":"openjdk18","namespace":"openshift","selfLink":"/apis/image.openshift.io/v1/namespaces/openshift/imagestreams/openjdk18","uid":"ff014c3f-c6b1-4292-8ee9-4aaf9e0ca348","resourceVersion":"9718189","generation":2,"creationTimestamp":"2020-05-27T06:45:15Z","annotations":{"openshift.io/image.dockerRepositoryCheck":"2020-05-27T06:45:15Z"}},"spec":{"lookupPolicy":{"local":false},"tags":[{"name":"latest","annotations":{"tags":"builder"},"from":{"kind":"DockerImage","name":"registry.access.redhat.com/redhat-openjdk-18/openjdk18-openshift"},"generation":1,"importPolicy":{"insecure":true},"referencePolicy":{"type":"Source"}}]},"status":{"dockerImageRepository":"image-registry.openshift-image-registry.svc:5000/openshift/openjdk18","publicDockerImageRepository":"default-route-openshift-image-registry.apps.ocp-ppc64le-test-102135.redhat.com/openshift/openjdk18","tags":[{"tag":"latest","items":[{"created":"2020-05-27T06:45:15Z","dockerImageReference":"registry.access.redhat.com/redhat-openjdk-18/openjdk18-openshift@sha256:b2efa9bf72d4e81d299605602ef9f046ec49bde8e817c89c0614dbd8a4508395","image":"sha256:b2efa9bf72d4e81d299605602ef9f046ec49bde8e817c89c0614dbd8a4508395","generation":1}]}]}},{"metadata":{"name":"openjdk18-pkvr-app","namespace":"openshift","selfLink":"/apis/image.openshift.io/v1/namespaces/openshift/imagestreams/openjdk18-pkvr-app","uid":"9fb2e59b-b6ba-4836-bc5a-571e087dc2e7","resourceVersion":"9736318","generation":1,"creationTimestamp":"2020-05-27T07:21:37Z","labels":{"app":"app","app.kubernetes.io/instance":"openjdk18-pkvr","app.kubernetes.io/managed-by":"odo" [truncated 5786 chars]
I0528 03:08:39.274801 27048 round_trippers.go:386] curl -k -v -XGET -H "Accept: application/json, */*" -H "User-Agent: odo/v0.0.0 (linux/ppc64le) kubernetes/$Format" -H "Authorization: Bearer SkO8Ok7B2c0YBVs7ql9kjupBRL40M6eFgExq2KpzZG4" 'https://api.ocp-ppc64le-test-102135.redhat.com:6443/apis/image.openshift.io/v1/namespaces/openshift/imagestreamtags'
I0528 03:08:39.281618 27048 round_trippers.go:405] GET https://api.ocp-ppc64le-test-102135.redhat.com:6443/apis/image.openshift.io/v1/namespaces/openshift/imagestreamtags 200 OK in 6 milliseconds
I0528 03:08:39.281657 27048 round_trippers.go:411] Response Headers:
I0528 03:08:39.281669 27048 round_trippers.go:414] Cache-Control: no-cache, private
I0528 03:08:39.281681 27048 round_trippers.go:414] Cache-Control: no-store
I0528 03:08:39.281690 27048 round_trippers.go:414] Content-Type: application/json
I0528 03:08:39.281701 27048 round_trippers.go:414] Date: Thu, 28 May 2020 07:08:39 GMT
I0528 03:08:39.281708 27048 round_trippers.go:414] Content-Length: 2753
I0528 03:08:39.281715 27048 round_trippers.go:414] Audit-Id: aeb7729b-763b-4769-bd7c-e29170c81e7c
I0528 03:08:39.281782 27048 request.go:897] Response Body: {"kind":"ImageStreamTagList","apiVersion":"image.openshift.io/v1","metadata":{"selfLink":"/apis/image.openshift.io/v1/namespaces/openshift/imagestreamtags"},"items":[{"metadata":{"name":"openjdk18:latest","namespace":"openshift","selfLink":"/apis/image.openshift.io/v1/namespaces/openshift/imagestreamtags/openjdk18:latest","uid":"ff014c3f-c6b1-4292-8ee9-4aaf9e0ca348","resourceVersion":"9718189","creationTimestamp":"2020-05-27T06:45:15Z","annotations":{"tags":"builder"}},"tag":{"name":"latest","annotations":{"tags":"builder"},"from":{"kind":"DockerImage","name":"registry.access.redhat.com/redhat-openjdk-18/openjdk18-openshift"},"generation":1,"importPolicy":{"insecure":true},"referencePolicy":{"type":"Source"}},"generation":1,"lookupPolicy":{"local":false},"image":{"metadata":{"name":"sha256:b2efa9bf72d4e81d299605602ef9f046ec49bde8e817c89c0614dbd8a4508395","creationTimestamp":null},"dockerImageReference":"registry.access.redhat.com/redhat-openjdk-18/openjdk18-openshift@sha256:b2efa9bf72d4e81d299605602ef9f046ec49bde8e817c89c0614dbd8a4508395","dockerImageMetadata":{"kind":"DockerImage","apiVersion":"1.0","Id":"","Created":null,"ContainerConfig":{}},"dockerImageMetadataVersion":"1.0","dockerImageLayers":null}},{"metadata":{"name":"release:ruby-25","namespace":"openshift","selfLink":"/apis/image.openshift.io/v1/namespaces/openshift/imagestreamtags/release:ruby-25","uid":"2fd6debc-3a4f-402c-83ca-126186cc5b68","resourceVersion":"10536193","creationTimestamp":"2020-05-26T17:11:24Z"},"tag":{"name":"ruby-25","annotations":null,"from":{"kind":"DockerImage","name":"docker.io/centos/ruby-25-centos7:latest"},"generation":420,"importPolicy":{"scheduled":true},"referencePolicy":{"type":"Source"}},"generation":419,"lookupPolicy":{"local":false},"conditions":[{"type":"ImportSuccess","status":"False","lastTransitionTime":"2020-05-28T06:37:41Z","reason":"InternalError","message":"Internal error occurred: docker.io/centos/ruby-25-centos7:latest: Get https://production.cloudflare.docker.com/registry-v2/docker/registry/v2/blobs/sha256/1a/1ae740842a4455e979ade986f8452f522c3d6263e53f42b3feb82d02a17906a7/data?verify=1590650851-yaGm0B6nUC6GWlr3%2BWHr%2FXqUvfc%3D: dial tcp: lookup production.cloudflare.docker.com on 172.30.0.10:53: read udp 10.128.0.6:54443-\u003e172.30.0.10:53: i/o timeout","generation":420}],"image":{"metadata":{"name":"sha256:8fa118f5960fe9d630e02f8449163d8fd8d4836061c8495197789164ba36e966","creationTimestamp":null},"dockerImageReference":"docker.io/centos/ruby-25-centos7@sha256:8fa118f5960fe9d630e02f8449163d8fd8d4836061c8495197789164ba36e966","dockerImageMetadata":{"kind":"DockerImage","apiVersion":"1.0","Id":"","Created":null,"ContainerConfig":{}},"dockerImageMetadataVersion":"1.0","dockerImageLayers":null}}]}
I0528 03:08:39.283870 27048 round_trippers.go:386] curl -k -v -XGET -H "User-Agent: odo/v0.0.0 (linux/ppc64le) kubernetes/$Format" -H "Authorization: Bearer SkO8Ok7B2c0YBVs7ql9kjupBRL40M6eFgExq2KpzZG4" -H "Accept: application/json, */*" 'https://api.ocp-ppc64le-test-102135.redhat.com:6443/apis/image.openshift.io/v1/namespaces/openshift/imagestreamtags'
I0528 03:08:39.290719 27048 round_trippers.go:405] GET https://api.ocp-ppc64le-test-102135.redhat.com:6443/apis/image.openshift.io/v1/namespaces/openshift/imagestreamtags 200 OK in 6 milliseconds
I0528 03:08:39.290740 27048 round_trippers.go:411] Response Headers:
I0528 03:08:39.290748 27048 round_trippers.go:414] Content-Length: 2753
I0528 03:08:39.290756 27048 round_trippers.go:414] Audit-Id: e9218d17-e3a2-4ada-9b1e-180d4670f46f
I0528 03:08:39.290766 27048 round_trippers.go:414] Cache-Control: no-cache, private
I0528 03:08:39.290773 27048 round_trippers.go:414] Cache-Control: no-store
I0528 03:08:39.290781 27048 round_trippers.go:414] Content-Type: application/json
I0528 03:08:39.290789 27048 round_trippers.go:414] Date: Thu, 28 May 2020 07:08:39 GMT
I0528 03:08:39.290846 27048 request.go:897] Response Body: {"kind":"ImageStreamTagList","apiVersion":"image.openshift.io/v1","metadata":{"selfLink":"/apis/image.openshift.io/v1/namespaces/openshift/imagestreamtags"},"items":[{"metadata":{"name":"openjdk18:latest","namespace":"openshift","selfLink":"/apis/image.openshift.io/v1/namespaces/openshift/imagestreamtags/openjdk18:latest","uid":"ff014c3f-c6b1-4292-8ee9-4aaf9e0ca348","resourceVersion":"9718189","creationTimestamp":"2020-05-27T06:45:15Z","annotations":{"tags":"builder"}},"tag":{"name":"latest","annotations":{"tags":"builder"},"from":{"kind":"DockerImage","name":"registry.access.redhat.com/redhat-openjdk-18/openjdk18-openshift"},"generation":1,"importPolicy":{"insecure":true},"referencePolicy":{"type":"Source"}},"generation":1,"lookupPolicy":{"local":false},"image":{"metadata":{"name":"sha256:b2efa9bf72d4e81d299605602ef9f046ec49bde8e817c89c0614dbd8a4508395","creationTimestamp":null},"dockerImageReference":"registry.access.redhat.com/redhat-openjdk-18/openjdk18-openshift@sha256:b2efa9bf72d4e81d299605602ef9f046ec49bde8e817c89c0614dbd8a4508395","dockerImageMetadata":{"kind":"DockerImage","apiVersion":"1.0","Id":"","Created":null,"ContainerConfig":{}},"dockerImageMetadataVersion":"1.0","dockerImageLayers":null}},{"metadata":{"name":"release:ruby-25","namespace":"openshift","selfLink":"/apis/image.openshift.io/v1/namespaces/openshift/imagestreamtags/release:ruby-25","uid":"2fd6debc-3a4f-402c-83ca-126186cc5b68","resourceVersion":"10536193","creationTimestamp":"2020-05-26T17:11:24Z"},"tag":{"name":"ruby-25","annotations":null,"from":{"kind":"DockerImage","name":"docker.io/centos/ruby-25-centos7:latest"},"generation":420,"importPolicy":{"scheduled":true},"referencePolicy":{"type":"Source"}},"generation":419,"lookupPolicy":{"local":false},"conditions":[{"type":"ImportSuccess","status":"False","lastTransitionTime":"2020-05-28T06:37:41Z","reason":"InternalError","message":"Internal error occurred: docker.io/centos/ruby-25-centos7:latest: Get https://production.cloudflare.docker.com/registry-v2/docker/registry/v2/blobs/sha256/1a/1ae740842a4455e979ade986f8452f522c3d6263e53f42b3feb82d02a17906a7/data?verify=1590650851-yaGm0B6nUC6GWlr3%2BWHr%2FXqUvfc%3D: dial tcp: lookup production.cloudflare.docker.com on 172.30.0.10:53: read udp 10.128.0.6:54443-\u003e172.30.0.10:53: i/o timeout","generation":420}],"image":{"metadata":{"name":"sha256:8fa118f5960fe9d630e02f8449163d8fd8d4836061c8495197789164ba36e966","creationTimestamp":null},"dockerImageReference":"docker.io/centos/ruby-25-centos7@sha256:8fa118f5960fe9d630e02f8449163d8fd8d4836061c8495197789164ba36e966","dockerImageMetadata":{"kind":"DockerImage","apiVersion":"1.0","Id":"","Created":null,"ContainerConfig":{}},"dockerImageMetadataVersion":"1.0","dockerImageLayers":null}}]}
I0528 03:08:39.291089 27048 catalog.go:361] Found builder image: catalog.ComponentType{TypeMeta:v1.TypeMeta{Kind:"ComponentType", APIVersion:"odo.openshift.io/v1alpha1"}, ObjectMeta:v1.ObjectMeta{Name:"openjdk18", GenerateName:"", Namespace:"openshift", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:v1.Time{Time:time.Time{wall:0x0, ext:0, loc:(*time.Location)(nil)}}, DeletionTimestamp:(*v1.Time)(nil), DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Initializers:(*v1.Initializers)(nil), Finalizers:[]string(nil), ClusterName:""}, Spec:catalog.ComponentSpec{AllTags:[]string{"latest"}, NonHiddenTags:[]string{"latest"}, SupportedTags:[]string(nil), ImageStreamRef:v1.ImageStream{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"openjdk18", GenerateName:"", Namespace:"openshift", SelfLink:"/apis/image.openshift.io/v1/namespaces/openshift/imagestreams/openjdk18", UID:"ff014c3f-c6b1-4292-8ee9-4aaf9e0ca348", ResourceVersion:"9718189", Generation:2, CreationTimestamp:v1.Time{Time:time.Time{wall:0x0, ext:63726158715, loc:(*time.Location)(0x28c1960)}}, DeletionTimestamp:(*v1.Time)(nil), DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string{"openshift.io/image.dockerRepositoryCheck":"2020-05-27T06:45:15Z"}, OwnerReferences:[]v1.OwnerReference(nil), Initializers:(*v1.Initializers)(nil), Finalizers:[]string(nil), ClusterName:""}, Spec:v1.ImageStreamSpec{LookupPolicy:v1.ImageLookupPolicy{Local:false}, DockerImageRepository:"", Tags:[]v1.TagReference{v1.TagReference{Name:"latest", Annotations:map[string]string{"tags":"builder"}, From:(*v1.ObjectReference)(0xc0006f6af0), Reference:false, Generation:(*int64)(0xc000a15210), ImportPolicy:v1.TagImportPolicy{Insecure:true, Scheduled:false}, ReferencePolicy:v1.TagReferencePolicy{Type:"Source"}}}}, Status:v1.ImageStreamStatus{DockerImageRepository:"image-registry.openshift-image-registry.svc:5000/openshift/openjdk18", PublicDockerImageRepository:"default-route-openshift-image-registry.apps.ocp-ppc64le-test-102135.redhat.com/openshift/openjdk18", Tags:[]v1.NamedTagEventList{v1.NamedTagEventList{Tag:"latest", Items:[]v1.TagEvent{v1.TagEvent{Created:v1.Time{Time:time.Time{wall:0x0, ext:63726158715, loc:(*time.Location)(0x28c1960)}}, DockerImageReference:"registry.access.redhat.com/redhat-openjdk-18/openjdk18-openshift@sha256:b2efa9bf72d4e81d299605602ef9f046ec49bde8e817c89c0614dbd8a4508395", Image:"sha256:b2efa9bf72d4e81d299605602ef9f046ec49bde8e817c89c0614dbd8a4508395", Generation:1}}, Conditions:[]v1.TagEventCondition(nil)}}}}}}
I0528 03:08:39.291242 27048 catalog.go:361] Found builder image: catalog.ComponentType{TypeMeta:v1.TypeMeta{Kind:"ComponentType", APIVersion:"odo.openshift.io/v1alpha1"}, ObjectMeta:v1.ObjectMeta{Name:"openjdk18", GenerateName:"", Namespace:"openshift", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:v1.Time{Time:time.Time{wall:0x0, ext:0, loc:(*time.Location)(nil)}}, DeletionTimestamp:(*v1.Time)(nil), DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Initializers:(*v1.Initializers)(nil), Finalizers:[]string(nil), ClusterName:""}, Spec:catalog.ComponentSpec{AllTags:[]string{"latest"}, NonHiddenTags:[]string{"latest"}, SupportedTags:[]string(nil), ImageStreamRef:v1.ImageStream{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"openjdk18", GenerateName:"", Namespace:"openshift", SelfLink:"/apis/image.openshift.io/v1/namespaces/openshift/imagestreams/openjdk18", UID:"ff014c3f-c6b1-4292-8ee9-4aaf9e0ca348", ResourceVersion:"9718189", Generation:2, CreationTimestamp:v1.Time{Time:time.Time{wall:0x0, ext:63726158715, loc:(*time.Location)(0x28c1960)}}, DeletionTimestamp:(*v1.Time)(nil), DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string{"openshift.io/image.dockerRepositoryCheck":"2020-05-27T06:45:15Z"}, OwnerReferences:[]v1.OwnerReference(nil), Initializers:(*v1.Initializers)(nil), Finalizers:[]string(nil), ClusterName:""}, Spec:v1.ImageStreamSpec{LookupPolicy:v1.ImageLookupPolicy{Local:false}, DockerImageRepository:"", Tags:[]v1.TagReference{v1.TagReference{Name:"latest", Annotations:map[string]string{"tags":"builder"}, From:(*v1.ObjectReference)(0xc0006fe850), Reference:false, Generation:(*int64)(0xc000a20890), ImportPolicy:v1.TagImportPolicy{Insecure:true, Scheduled:false}, ReferencePolicy:v1.TagReferencePolicy{Type:"Source"}}}}, Status:v1.ImageStreamStatus{DockerImageRepository:"image-registry.openshift-image-registry.svc:5000/openshift/openjdk18", PublicDockerImageRepository:"default-route-openshift-image-registry.apps.ocp-ppc64le-test-102135.redhat.com/openshift/openjdk18", Tags:[]v1.NamedTagEventList{v1.NamedTagEventList{Tag:"latest", Items:[]v1.TagEvent{v1.TagEvent{Created:v1.Time{Time:time.Time{wall:0x0, ext:63726158715, loc:(*time.Location)(0x28c1960)}}, DockerImageReference:"registry.access.redhat.com/redhat-openjdk-18/openjdk18-openshift@sha256:b2efa9bf72d4e81d299605602ef9f046ec49bde8e817c89c0614dbd8a4508395", Image:"sha256:b2efa9bf72d4e81d299605602ef9f046ec49bde8e817c89c0614dbd8a4508395", Generation:1}}, Conditions:[]v1.TagEventCondition(nil)}}}}}}
Odo Supported OpenShift Components:
NAME PROJECT TAGS
openjdk18 openshift latest
openjdk18 openshift latest
I0528 03:08:39.291422 27048 odo.go:77] Could not get the latest release information in time. Never mind, exiting gracefully :)
[root@bastion ~]# uname -a
Linux bastion 4.18.0-144.el8.ppc64le #1 SMP Thu Sep 12 14:21:35 UTC 2019 ppc64le ppc64le ppc64le GNU/Linux
[root@bastion ~]# arch
ppc64le
[root@bastion ~]#
we did this on IBM system z platform, it works so far so good you need prepare those catalog images
something like below
oc import-image openjdk18 \--from=registry.access.redhat.com/redhat-openjdk18/openjdk18-openshift --confirm oc annotate istag/openjdk18:latest tags=builder
We tried preparing the catalog images as per below commands.
oc project openshift oc import-image openjdk18 --from=registry.access.redhat.com/redhat-openjdk-18/openjdk18-openshift --confirm --insecure=true oc annotate istag/openjdk18:latest tags=builder odo catalog list components
However not able to list the services after doing odo push
.
[cloud-user@shivanij-bastion ~]$ odo push
Validation
✓ Checking component [10ms]
Configuration changes
✓ Initializing component
✓ Creating component [819ms]
✓ Triggering build from git [205ms]
◒ Waiting for build to finish
✓ Waiting for build to finish [2m]
✓ Deploying component openjdk18-kkro [33s]
Applying URL changes
✓ URLs are synced with the cluster, no changes are required.
Pushing to component openjdk18-kkro of type git
✓ Changes successfully pushed to component
[cloud-user@shivanij-bastion ~]$ odo catalog list services
✗ unable to list services because Service Catalog is not enabled in your cluster: unable to get cluster serviceClassExternalName: unable to get cluster service classes: unable to list cluster service classes: the server could not find the requested resource (get clusterserviceclasses.servicecatalog.k8s.io)
[cloud-user@shivanij-bastion ~]$
ok I got same result on my system, sorry I didn't pay attention (I thought it's push command) to the question at beginning
[root@bastion nodejs-ex]# odo catalog list services
✗ unable to list services because Service Catalog is not enabled in your cluster: unable to get cluster serviceClassExternalName: unable to get cluster service classes: unable to list cluster service classes: the server could not find the requested resource (get clusterserviceclasses.servicecatalog.k8s.io)
[root@bastion nodejs-ex]# uanme -a
-bash: uanme: command not found
[root@bastion nodejs-ex]# uname -a
Linux bastion 3.10.0-1062.el7.s390x #1 SMP Thu Jul 18 16:27:07 EDT 2019 s390x s390x s390x GNU/Linux
I think it's not the odo's responsibility to do so , it might be a CRD not well defined
[root@bastion nodejs-ex]# oc get clusterserviceclasses.servicecatalog.k8s.io
error: the server doesn't have a resource type "clusterserviceclasses"
have no skill in who should (guess some operator in the cluster) need define this but those operators seems not defined by default on non-x86 cluster
There's a difference between components and services. If you're on a 4.x cluster and would like to run odo catalog list services
, there are two things to keep in mind:
odo preference set Experimental true
and then run odo catalog list services
. More about odo and Operator Hub in this doc.odo catalog list services
or odo service
commands.not sure but seems this comes from svc https://github.com/kubernetes-sigs/service-catalog/blob/master/pkg/apis/servicecatalog/v1beta1/types.go#L400
@dharmit thanks a lot ,at least the experiment = true work for me
[root@bastion nodejs-ex]# odo preference set Experimental true
Global preference was successfully updated
[root@bastion nodejs-ex]# odo catalog list services
Operators available in the cluster
NAME CRDs
mongodb-enterprise.v1.4.5 MongoDB, MongoDBUser, MongoDBOpsManager
mongodb-enterprise.v1.5.1 MongoDB, MongoDBUser, MongoDBOpsManager
mongodb-enterprise.v1.5.2 MongoDB, MongoDBUser, MongoDBOpsManager
I am getting the below:-
[cloud-user@shivanij-bastion ~]$ odo preference set Experimental true
Global preference was successfully updated
[cloud-user@shivanij-bastion ~]$ odo catalog list services
✗ no deployable services/operators found
actually this works , you don't have service defined
you didn't see previous error
unable to list services because Service Catalog is not enabled in your cluster:
so try create a component and push it , may help you I guess? as I only do the create and push, nothing else..
[root@bastion ~]# odo catalog list components -v9 I0528 03:08:39.198827 27048 loader.go:359] Config loaded from file /root/ocp4-workdir/auth/kubeconfig openshift@sha256:b2efa9bf72d4e81d299605602ef9f046ec49bde8e817c89c0614dbd8a4508395", Image:"sha256:b2efa9bf72d4e81d299605602ef9f046ec49bde8e817c89c0614dbd8a4508395", Generation:1}}, Conditions:[]v1.TagEventCondition(nil)}}}}}} Odo Supported OpenShift Components: NAME PROJECT TAGS openjdk18 openshift latest openjdk18 openshift latest
@sarveshtamba above output indicates that listing the components worked fine without any error. In issue description, you were seeing the error - ✗ unable to retrieve any catalog images from the OpenShift cluster
.
But odo login
still fails.
Are you sure that you're logging into the same cluster that you earlier logged in using oc
? I'd recommend you to provide the server url to the login command. For example, I'm working on a CRC cluster and I login using:
$ odo login https://api.crc.testing:6443 -u developer -p developer
I'm suggesting this because if something caused switch in the context used by oc
/kubectl
, odo login
would try to login to that cluster and it might fail if the credentials are not valid for it.
Beyond that, I agree with what @jichenjc mentioned about an image being tagged as a builder image to show up in odo catalog list components
output:
# There are 77 imagestreams in my cluster under the openshift namespace
$ oc get is -n openshift | awk 'NR>1' | wc -l
77
$ odo project get
The current project is: myproject
# But only 12 are tagged as builder images
$ odo catalog list components | awk 'NR>2' | wc -l
12
[cloud-user@shivanij-bastion ~]$ odo catalog list services ✗ no deployable services/operators found
This is because you don't have any operators installed in the current namespace. Try installing an operator using the kubeadmin
user through the OpenShift Web Console. You can refer this section in the doc.
@dharmit here is the service added and listed:-
[cloud-user@shivanij-bastion ~]$ odo service create etcdoperator.v0.9.4 --crd EtcdCluster
Deploying service of type: EtcdCluster
✓ Deploying service [89ms]
✓ Service 'example' was created
Progress of the provisioning will not be reported and might take a long time
You can see the current status by executing 'odo service list'
Optionally, link etcdoperator.v0.9.4 to your component by running: 'odo link <component-name>'
[cloud-user@shivanij-bastion ~]$ odo service list
NAME TYPE AGE
example EtcdCluster 11s
[cloud-user@shivanij-bastion ~]$ odo catalog list services
Operators available in the cluster
NAME CRDs
etcdoperator.v0.9.4 EtcdCluster, EtcdBackup, EtcdRestore
I tried checking the login issue even with correct URL that oc is login to, still facing the same issue for the developer user. Trying to check up more on this
From the above, can we say odo v1.2.1 works fine with OCP4.3 on ppc64le platform, especially the creation and listing of the components and services?
From the above, can we say odo v1.2.1 works fine with OCP4.3 on ppc64le platform, especially the creation and listing of the components and services?
The service creation and listing is working fine. That too using Operator Hub which is in experimental mode.
As far as components are concerned, in the context of this issue, you're trying to list the ones based on s2i builder images. You're able to list them as well. So, IMO, both your issues are sorted.
As for the login issue, I'm sure that the credentials are skewed. Spinning up a service, the way you have based on my comment, is not possible if you're not logged into the OpenShift cluster. It's likely that you logged in using oc
. IMO, same credentials should work just fine when performing login with odo. Meaning, same username & password combination should work for both oc
and odo
:
$ oc login https://api.crc.testing:6443 -u developer -p developer
Login successful.
You have one project on this server: "myproject"
Using project "myproject".
$ oc logout
Logged "developer" out on "https://api.crc.testing:6443"
$ odo login https://api.crc.testing:6443 -u developer -p developer
Connecting to the OpenShift cluster
Login successful.
You have one project on this server: "myproject"
Using project "myproject".
@sarveshtamba I'd also suggest you to close this issue if the component and service related concerns are addressed. And open a new issue if login is not working. That would help track login issue properly.
Used the correct user which was used for oc login and was able to login successfully using odo as well.
[cloud-user@shivanij-bastion ~]$ odo login -u kubeadmin
Connecting to the OpenShift cluster
Authentication required for https://api.shivanij.example.com:6443 (openshift)
Username: kubeadmin
Password:
Login successful.
You have access to 57 projects, the list has been suppressed. You can list all projects with 'odo projects'
Using project "default".
Will close this issue.
@dharmit @jichenjc thank you both for all your help. Much appreciated!
I am trying to do basic some hands-on learning on odo (build and validate odo v1.2.1) on a non-x86 platform having OCP 4.3. However I am seeing some issue of missing catalog images required for creating a single-component application with odo:-
However I am able to do the same operations on OCP 3.11 with odo v1.2.1:-
Looks like Odo custom catalog images are missing for OCP4.3(unlike for OCP3.11) due to which we are seeing issues in Creating a single-component application with odo -
https://docs.openshift.com/container-platform/4.3/cli_reference/openshift_developer_cli/creating-a-single-component-application-with-odo.html
. Tried importing the images usingoc import-image
command, even that does not help much. Has anyone tried odo with OCP 4.3 on non-x86 platform? Is there anything that I am missing?