redhat-developer / odo

odo - Developer-focused CLI for fast & iterative container-based application development on Podman and Kubernetes. Implementation of the open Devfile standard.
https://odo.dev
Apache License 2.0
788 stars 243 forks source link

Using odo v1.2.1 with OCP 4.3 on non-x86 platform #3255

Closed sarveshtamba closed 4 years ago

sarveshtamba commented 4 years ago

I am trying to do basic some hands-on learning on odo (build and validate odo v1.2.1) on a non-x86 platform having OCP 4.3. However I am seeing some issue of missing catalog images required for creating a single-component application with odo:-

[root@bastion odo-handson]# odo login -u developer -p developer
Connecting to the OpenShift cluster
Login failed (401 Unauthorized)
Verify you have provided correct credentials.
 ✗  challenger chose not to retry the request
[root@bastion odo-handson]# odo catalog list components
 ✗  unable to retrieve any catalog images from the OpenShift cluster
[root@bastion odo-handson]# oc get is -n openshift
NAME                  IMAGE REPOSITORY                                                                                               TAGS      UPDATED
cli                   default-route-openshift-image-registry.apps.ocp-ppc64le-test-102135.redhat.com/openshift/cli                   latest
cli-artifacts         default-route-openshift-image-registry.apps.ocp-ppc64le-test-102135.redhat.com/openshift/cli-artifacts         latest
installer             default-route-openshift-image-registry.apps.ocp-ppc64le-test-102135.redhat.com/openshift/installer             latest
installer-artifacts   default-route-openshift-image-registry.apps.ocp-ppc64le-test-102135.redhat.com/openshift/installer-artifacts   latest
must-gather           default-route-openshift-image-registry.apps.ocp-ppc64le-test-102135.redhat.com/openshift/must-gather           latest
oauth-proxy           default-route-openshift-image-registry.apps.ocp-ppc64le-test-102135.redhat.com/openshift/oauth-proxy           v4.4
release               default-route-openshift-image-registry.apps.ocp-ppc64le-test-102135.redhat.com/openshift/release               ruby-25   10 days ago
tests                 default-route-openshift-image-registry.apps.ocp-ppc64le-test-102135.redhat.com/openshift/tests                 latest
[root@bastion odo-handson]# oc version
Client Version: openshift-clients-4.3.14-202004180552
Server Version: 4.3.18
Kubernetes Version: v1.16.2
[root@bastion odo-handson]# odo version
odo v1.2.1 (b7b7c2fac)

However I am able to do the same operations on OCP 3.11 with odo v1.2.1:-

[root@p006vm31 nodejs-ex]# odo login -u developer -p developer
Connecting to the OpenShift cluster
Login successful.
You don't have any projects. You can try to create a new project, by running
    odo project create <project-name>
[root@p006vm31 nodejs-ex]# odo catalog list components
Odo OpenShift Components:
NAME       PROJECT       TAGS                    SUPPORTED
java       openshift     8,latest                YES
nodejs     openshift     10,8,8-RHOAR,latest     YES
httpd      openshift     2.4,latest              NO
nginx      openshift     1.12,latest             NO
nodejs     openshift     6                       NO
perl       openshift     5.26,latest             NO
php        openshift     7.1,latest              NO
python     openshift     2.7,3.6,latest          NO
ruby       openshift     2.5,latest              NO
[root@p006vm31 nodejs-ex]# oc get is -n openshift
NAME         DOCKER REPO                                             TAGS                 UPDATED
httpd        docker-registry.default.svc:5000/openshift/httpd        2.4,latest           5 weeks ago
java         docker-registry.default.svc:5000/openshift/java         8,latest             5 weeks ago
jenkins      docker-registry.default.svc:5000/openshift/jenkins      2,latest             5 weeks ago
mariadb      docker-registry.default.svc:5000/openshift/mariadb      10.2,latest          5 weeks ago
mongodb      docker-registry.default.svc:5000/openshift/mongodb      3.6,latest           5 weeks ago
mysql        docker-registry.default.svc:5000/openshift/mysql        5.7,latest           5 weeks ago
nginx        docker-registry.default.svc:5000/openshift/nginx        latest,1.12          5 weeks ago
nodejs       docker-registry.default.svc:5000/openshift/nodejs       10,6,8 + 2 more...   5 weeks ago
perl         docker-registry.default.svc:5000/openshift/perl         5.26,latest          5 weeks ago
php          docker-registry.default.svc:5000/openshift/php          7.1,latest           5 weeks ago
postgresql   docker-registry.default.svc:5000/openshift/postgresql   10,latest            5 weeks ago
python       docker-registry.default.svc:5000/openshift/python       2.7,3.6,latest       5 weeks ago
ruby         docker-registry.default.svc:5000/openshift/ruby         2.5,latest           5 weeks ago
[root@p006vm31 nodejs-ex]# oc version
oc v3.11.170
kubernetes v1.11.0+d4cacc0
features: Basic-Auth GSSAPI Kerberos SPNEGO
Server https://p006vm31:8443
openshift v3.11.200
kubernetes v1.11.0+d4cacc0
[root@p006vm31 nodejs-ex]# odo version
odo v1.2.1 (b7b7c2fac)

Looks like Odo custom catalog images are missing for OCP4.3(unlike for OCP3.11) due to which we are seeing issues in Creating a single-component application with odo -https://docs.openshift.com/container-platform/4.3/cli_reference/openshift_developer_cli/creating-a-single-component-application-with-odo.html . Tried importing the images using oc import-image command, even that does not help much. Has anyone tried odo with OCP 4.3 on non-x86 platform? Is there anything that I am missing?

jichenjc commented 4 years ago

we did this on IBM system z platform, it works so far so good you need prepare those catalog images

something like below

oc import-image openjdk18 \--from=registry.access.redhat.com/redhat-openjdk18/openjdk18-openshift --confirm 

oc annotate istag/openjdk18:latest tags=builder
dharmit commented 4 years ago
[root@bastion odo-handson]# odo login -u developer -p developer
Connecting to the OpenShift cluster
Login failed (401 Unauthorized)
Verify you have provided correct credentials.
 ✗  challenger chose not to retry the request
[root@bastion odo-handson]# odo catalog list components
 ✗  unable to retrieve any catalog images from the OpenShift cluster

Tthat looks like failure to login to the OpenShift cluster using odo. I think none of the odo commands that require connectivity with the cluster would work in this case. To verify, you could check if odo project create <project-name> works or not.

sarveshtamba commented 4 years ago
[root@bastion odo-handson]# odo login -u developer -p developer
Connecting to the OpenShift cluster
Login failed (401 Unauthorized)
Verify you have provided correct credentials.
 ✗  challenger chose not to retry the request
[root@bastion odo-handson]# odo catalog list components
 ✗  unable to retrieve any catalog images from the OpenShift cluster

Tthat looks like failure to login to the OpenShift cluster using odo. I think none of the odo commands that require connectivity with the cluster would work in this case. To verify, you could check if odo project create <project-name> works or not.

@dharmit odo project create seems to work fine.

[root@bastion odo-handson]# odo project create sarvesh-project
 ✓  Project 'sarvesh-project' is ready for use
 ✓  New project created and now using project: sarvesh-project
[root@bastion odo-handson]# odo login -u developer -p developer
Connecting to the OpenShift cluster

Login failed (401 Unauthorized)
Verify you have provided correct credentials.
 ✗  challenger chose not to retry the request
[root@bastion odo-handson]#
dharmit commented 4 years ago

That looks weird.

  1. Are you using experimental mode - odo preference view
  2. Can you share odo login -u developer -p developer -v9 and odo catalog list components -v9?
  3. What platform (non x86) is this?
sarveshtamba commented 4 years ago

Non x86 platform is ppc64le. Below is output of request commands:-

[root@bastion ~]# odo preference view
PARAMETER             CURRENT_VALUE
UpdateNotification
NamePrefix
Timeout
PushTimeout
[root@bastion ~]# odo login -u developer -p developer -v9
I0528 03:07:48.091718   27038 loader.go:359] Config loaded from file /root/ocp4-workdir/auth/kubeconfig
Connecting to the OpenShift cluster

I0528 03:07:48.092333   27038 round_trippers.go:386] curl -k -v -XHEAD  'https://api.ocp-ppc64le-test-102135.redhat.com:6443/'
I0528 03:07:48.101672   27038 round_trippers.go:405] HEAD https://api.ocp-ppc64le-test-102135.redhat.com:6443/ 403 Forbidden in 9 milliseconds
I0528 03:07:48.101689   27038 round_trippers.go:411] Response Headers:
I0528 03:07:48.101697   27038 round_trippers.go:414]     Audit-Id: eaab0720-d226-4163-b1b2-1fd04b43c61b
I0528 03:07:48.101704   27038 round_trippers.go:414]     Cache-Control: no-cache, private
I0528 03:07:48.101712   27038 round_trippers.go:414]     Content-Type: application/json
I0528 03:07:48.101719   27038 round_trippers.go:414]     X-Content-Type-Options: nosniff
I0528 03:07:48.101726   27038 round_trippers.go:414]     Content-Length: 186
I0528 03:07:48.101733   27038 round_trippers.go:414]     Date: Thu, 28 May 2020 07:07:48 GMT
I0528 03:07:48.101778   27038 round_trippers.go:386] curl -k -v -XGET  -H "X-Csrf-Token: 1" 'https://api.ocp-ppc64le-test-102135.redhat.com:6443/.well-known/oauth-authorization-server'
I0528 03:07:48.102525   27038 round_trippers.go:405] GET https://api.ocp-ppc64le-test-102135.redhat.com:6443/.well-known/oauth-authorization-server 200 OK in 0 milliseconds
I0528 03:07:48.102534   27038 round_trippers.go:411] Response Headers:
I0528 03:07:48.102542   27038 round_trippers.go:414]     Audit-Id: 2e7fc016-a28d-4fa9-ba68-9f4065d4f898
I0528 03:07:48.102550   27038 round_trippers.go:414]     Cache-Control: no-cache, private
I0528 03:07:48.102557   27038 round_trippers.go:414]     Content-Type: application/json
I0528 03:07:48.102564   27038 round_trippers.go:414]     Content-Length: 642
I0528 03:07:48.102571   27038 round_trippers.go:414]     Date: Thu, 28 May 2020 07:07:48 GMT
I0528 03:07:48.102836   27038 round_trippers.go:386] curl -k -v -XGET  -H "X-Csrf-Token: 1" 'https://oauth-openshift.apps.ocp-ppc64le-test-102135.redhat.com/oauth/authorize?client_id=openshift-challenging-client&code_challenge=0B_Kbjm2vnvR4vOPiwhgy_mzrFPy9dwjmNxVsZX9QVQ&code_challenge_method=S256&redirect_uri=https%3A%2F%2Foauth-openshift.apps.ocp-ppc64le-test-102135.redhat.com%2Foauth%2Ftoken%2Fimplicit&response_type=code'
I0528 03:07:48.130384   27038 round_trippers.go:405] GET https://oauth-openshift.apps.ocp-ppc64le-test-102135.redhat.com/oauth/authorize?client_id=openshift-challenging-client&code_challenge=0B_Kbjm2vnvR4vOPiwhgy_mzrFPy9dwjmNxVsZX9QVQ&code_challenge_method=S256&redirect_uri=https%3A%2F%2Foauth-openshift.apps.ocp-ppc64le-test-102135.redhat.com%2Foauth%2Ftoken%2Fimplicit&response_type=code 401 Unauthorized in 27 milliseconds
I0528 03:07:48.130411   27038 round_trippers.go:411] Response Headers:
I0528 03:07:48.130422   27038 round_trippers.go:414]     Referrer-Policy: strict-origin-when-cross-origin
I0528 03:07:48.130430   27038 round_trippers.go:414]     Www-Authenticate: Basic realm="openshift"
I0528 03:07:48.130438   27038 round_trippers.go:414]     X-Dns-Prefetch-Control: off
I0528 03:07:48.130445   27038 round_trippers.go:414]     X-Frame-Options: DENY
I0528 03:07:48.130455   27038 round_trippers.go:414]     Content-Length: 0
I0528 03:07:48.130464   27038 round_trippers.go:414]     Pragma: no-cache
I0528 03:07:48.130473   27038 round_trippers.go:414]     Expires: 0
I0528 03:07:48.130482   27038 round_trippers.go:414]     X-Content-Type-Options: nosniff
I0528 03:07:48.130491   27038 round_trippers.go:414]     X-Xss-Protection: 1; mode=block
I0528 03:07:48.130499   27038 round_trippers.go:414]     Date: Thu, 28 May 2020 07:07:48 GMT
I0528 03:07:48.130508   27038 round_trippers.go:414]     Cache-Control: no-cache, no-store, max-age=0, must-revalidate
I0528 03:07:48.130571   27038 round_trippers.go:386] curl -k -v -XGET  -H "Authorization: Basic ZGV2ZWxvcGVyOmRldmVsb3Blcg==" -H "X-Csrf-Token: 1" 'https://oauth-openshift.apps.ocp-ppc64le-test-102135.redhat.com/oauth/authorize?client_id=openshift-challenging-client&code_challenge=0B_Kbjm2vnvR4vOPiwhgy_mzrFPy9dwjmNxVsZX9QVQ&code_challenge_method=S256&redirect_uri=https%3A%2F%2Foauth-openshift.apps.ocp-ppc64le-test-102135.redhat.com%2Foauth%2Ftoken%2Fimplicit&response_type=code'
I0528 03:07:48.136905   27038 round_trippers.go:405] GET https://oauth-openshift.apps.ocp-ppc64le-test-102135.redhat.com/oauth/authorize?client_id=openshift-challenging-client&code_challenge=0B_Kbjm2vnvR4vOPiwhgy_mzrFPy9dwjmNxVsZX9QVQ&code_challenge_method=S256&redirect_uri=https%3A%2F%2Foauth-openshift.apps.ocp-ppc64le-test-102135.redhat.com%2Foauth%2Ftoken%2Fimplicit&response_type=code 401 Unauthorized in 6 milliseconds
I0528 03:07:48.136926   27038 round_trippers.go:411] Response Headers:
I0528 03:07:48.136939   27038 round_trippers.go:414]     Expires: 0
I0528 03:07:48.136948   27038 round_trippers.go:414]     X-Dns-Prefetch-Control: off
I0528 03:07:48.136955   27038 round_trippers.go:414]     Www-Authenticate: Basic realm="openshift"
I0528 03:07:48.136962   27038 round_trippers.go:414]     X-Content-Type-Options: nosniff
I0528 03:07:48.136970   27038 round_trippers.go:414]     X-Frame-Options: DENY
I0528 03:07:48.136977   27038 round_trippers.go:414]     X-Xss-Protection: 1; mode=block
I0528 03:07:48.136986   27038 round_trippers.go:414]     Date: Thu, 28 May 2020 07:07:48 GMT
I0528 03:07:48.136994   27038 round_trippers.go:414]     Cache-Control: no-cache, no-store, max-age=0, must-revalidate
I0528 03:07:48.137001   27038 round_trippers.go:414]     Pragma: no-cache
I0528 03:07:48.137008   27038 round_trippers.go:414]     Referrer-Policy: strict-origin-when-cross-origin
I0528 03:07:48.137016   27038 round_trippers.go:414]     Content-Length: 0
I0528 03:07:48.137039   27038 basicauth.go:51] already handled basic challenge
Login failed (401 Unauthorized)
Verify you have provided correct credentials.
I0528 03:07:48.137071   27038 cmdutils.go:48] Error:
challenger chose not to retry the request
 ✗  challenger chose not to retry the request
[root@bastion ~]# odo catalog list components -v9
I0528 03:08:39.198827   27048 loader.go:359] Config loaded from file /root/ocp4-workdir/auth/kubeconfig
I0528 03:08:39.201819   27048 round_trippers.go:386] curl -k -v -XGET  -H "Accept: application/json, */*" -H "User-Agent: odo/v0.0.0 (linux/ppc64le) kubernetes/$Format" -H "Authorization: Bearer SkO8Ok7B2c0YBVs7ql9kjupBRL40M6eFgExq2KpzZG4" 'https://api.ocp-ppc64le-test-102135.redhat.com:6443/apis/project.openshift.io/v1/projects/openshift'
I0528 03:08:39.243159   27048 round_trippers.go:405] GET https://api.ocp-ppc64le-test-102135.redhat.com:6443/apis/project.openshift.io/v1/projects/openshift 200 OK in 41 milliseconds
I0528 03:08:39.243194   27048 round_trippers.go:411] Response Headers:
I0528 03:08:39.243203   27048 round_trippers.go:414]     Date: Thu, 28 May 2020 07:08:39 GMT
I0528 03:08:39.243211   27048 round_trippers.go:414]     Content-Length: 496
I0528 03:08:39.243218   27048 round_trippers.go:414]     Audit-Id: b67bfde3-55f2-4b75-9327-fd71a7cb8a5f
I0528 03:08:39.243226   27048 round_trippers.go:414]     Cache-Control: no-cache, private
I0528 03:08:39.243233   27048 round_trippers.go:414]     Cache-Control: no-store
I0528 03:08:39.243240   27048 round_trippers.go:414]     Content-Type: application/json
I0528 03:08:39.245316   27048 request.go:897] Response Body: {"kind":"Project","apiVersion":"project.openshift.io/v1","metadata":{"name":"openshift","selfLink":"/apis/project.openshift.io/v1/projects/openshift","uid":"8f70dc38-a8e2-45e2-a485-88ec06d7c03a","resourceVersion":"8756","creationTimestamp":"2020-05-13T07:11:07Z","annotations":{"openshift.io/sa.scc.mcs":"s0:c22,c9","openshift.io/sa.scc.supplemental-groups":"1000480000/10000","openshift.io/sa.scc.uid-range":"1000480000/10000"}},"spec":{"finalizers":["kubernetes"]},"status":{"phase":"Active"}}
I0528 03:08:39.246586   27048 round_trippers.go:386] curl -k -v -XGET  -H "User-Agent: odo/v0.0.0 (linux/ppc64le) kubernetes/$Format" -H "Authorization: Bearer SkO8Ok7B2c0YBVs7ql9kjupBRL40M6eFgExq2KpzZG4" -H "Accept: application/json, */*" 'https://api.ocp-ppc64le-test-102135.redhat.com:6443/apis/image.openshift.io/v1/namespaces/openshift/imagestreams'
I0528 03:08:39.254602   27048 round_trippers.go:405] GET https://api.ocp-ppc64le-test-102135.redhat.com:6443/apis/image.openshift.io/v1/namespaces/openshift/imagestreams 200 OK in 7 milliseconds
I0528 03:08:39.254617   27048 round_trippers.go:411] Response Headers:
I0528 03:08:39.254629   27048 round_trippers.go:414]     Cache-Control: no-cache, private
I0528 03:08:39.254637   27048 round_trippers.go:414]     Cache-Control: no-store
I0528 03:08:39.254645   27048 round_trippers.go:414]     Content-Type: application/json
I0528 03:08:39.254655   27048 round_trippers.go:414]     Date: Thu, 28 May 2020 07:08:39 GMT
I0528 03:08:39.254664   27048 round_trippers.go:414]     Audit-Id: a381f306-9b78-43d9-9c2d-a9c9ccba9d9a
I0528 03:08:39.255405   27048 request.go:897] Response Body: {"kind":"ImageStreamList","apiVersion":"image.openshift.io/v1","metadata":{"selfLink":"/apis/image.openshift.io/v1/namespaces/openshift/imagestreams","resourceVersion":"10554251"},"items":[{"metadata":{"name":"cli","namespace":"openshift","selfLink":"/apis/image.openshift.io/v1/namespaces/openshift/imagestreams/cli","uid":"fc0e6c4f-ad91-4b0b-b0d3-bf57d832bd9a","resourceVersion":"12339","generation":2,"creationTimestamp":"2020-05-13T07:13:31Z"},"spec":{"lookupPolicy":{"local":false},"tags":[{"name":"latest","annotations":null,"from":{"kind":"DockerImage","name":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:85188d9ccefd6923ce9b4e7cf5b2445739706aa9f642a9cb06d7b4ba82fcf1e6"},"generation":2,"importPolicy":{"scheduled":true},"referencePolicy":{"type":"Source"}}]},"status":{"dockerImageRepository":"image-registry.openshift-image-registry.svc:5000/openshift/cli","publicDockerImageRepository":"default-route-openshift-image-registry.apps.ocp-ppc64le-test-102135.redhat.com/openshift/cli","tags":[{"tag":"latest","items":null,"conditions":[{"type":"ImportSuccess","status":"False","lastTransitionTime":"2020-05-13T07:13:31Z","reason":"Unauthorized","message":"you may not have access to the container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:85188d9ccefd6923ce9b4e7cf5b2445739706aa9f642a9cb06d7b4ba82fcf1e6\"","generation":2}]}]}},{"metadata":{"name":"cli-artifacts","namespace":"openshift","selfLink":"/apis/image.openshift.io/v1/namespaces/openshift/imagestreams/cli-artifacts","uid":"7b2cdd59-197c-4a4b-86ea-bf47046d785a","resourceVersion":"12341","generation":2,"creationTimestamp":"2020-05-13T07:13:31Z"},"spec":{"lookupPolicy":{"local":false},"tags":[{"name":"latest","annotations":null,"from":{"kind":"DockerImage","name":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:29d02a351e3a203e344ac9a835193d3bd6ba6edd770bc33ce963f6718dcf3c8a"},"generation":2,"importPolicy":{"scheduled":true},"referencePolicy":{"type":"Source"}}]},"status":{"dockerImageRepository":"image-registry.openshift-image-registry.svc:5000/openshift/cli-artifacts","publicDockerImageRepository":"default-route-openshift-image-registry.apps.ocp-ppc64le-test-102135.redhat.com/openshift/cli-artifacts","tags":[{"tag":"latest","items":null,"conditions":[{"type":"ImportSuccess","status":"False","lastTransitionTime":"2020-05-13T07:13:31Z","reason":"Unauthorized","message":"you may not have access to the container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:29d02a351e3a203e344ac9a835193d3bd6ba6edd770bc33ce963f6718dcf3c8a\"","generation":2}]}]}},{"metadata":{"name":"installer","namespace":"openshift","selfLink":"/apis/image.openshift.io/v1/namespaces/openshift/imagestreams/installer","uid":"f812bb1d-f82b-47c3-b451-134a4a94ff30","resourceVersion":"12343","generation":2,"creationTimestamp":"2020-05-13T07:13:31Z"},"spec":{"lookupPolicy":{"local":false},"tags":[{"name":"latest","annotations":null,"from":{"kind":"DockerImage","name":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3fe646e65a68528f352eab5179e1c1c64f9b8c55ca2b196e5964c42faa6833e7"},"generation":2,"importPolicy":{"scheduled":true},"referencePolicy":{"type":"Source"}}]},"status":{"dockerImageRepository":"image-registry.openshift-image-registry.svc:5000/openshift/installer","publicDockerImageRepository":"default-route-openshift-image-registry.apps.ocp-ppc64le-test-102135.redhat.com/openshift/installer","tags":[{"tag":"latest","items":null,"conditions":[{"type":"ImportSuccess","status":"False","lastTransitionTime":"2020-05-13T07:13:31Z","reason":"Unauthorized","message":"you may not have access to the container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3fe646e65a68528f352eab5179e1c1c64f9b8c55ca2b196e5964c42faa6833e7\"","generation":2}]}]}},{"metadata":{"name":"installer-artifacts","namespace":"openshift","selfLink":"/apis/image.openshift.io/v1/namespaces/openshift/imagestreams/installer-artifacts","uid":"11d43ad3-6f4f-46d5-8a41-15cd8e89ca23","resourceVersion":"12344","generation":2,"creationTimestamp":"2020-05-13T07:13:31Z"},"spec":{"lookupPolicy":{"local":false},"tags":[{"name":"latest","annotations":null,"from":{"kind":"DockerImage","name":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ad760ebec3bbc755107b39c7f5098f1b4dffdd2f804467dd25f5fe07ea8a9859"},"generation":2,"importPolicy":{"scheduled":true},"referencePolicy":{"type":"Source"}}]},"status":{"dockerImageRepository":"image-registry.openshift-image-registry.svc:5000/openshift/installer-artifacts","publicDockerImageRepository":"default-route-openshift-image-registry.apps.ocp-ppc64le-test-102135.redhat.com/openshift/installer-artifacts","tags":[{"tag":"latest","items":null,"conditions":[{"type":"ImportSuccess","status":"False","lastTransitionTime":"2020-05-13T07:13:31Z","reason":"Unauthorized","message":"you may not have access to the container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ad760ebec3bbc755107b39c7f5098f1b4dffdd2f804467dd25f5fe07ea8a9859\"","generation":2}]}]}},{"metadata":{"name":"must-gather","namespace":"openshift","selfLink":"/apis/image.openshift.io/v1/namespaces/openshift/imagestreams/must-gather","uid":"d9495dc8-f318-405f-9b39-3a69539b520b","resourceVersion":"12347","generation":2,"creationTimestamp":"2020-05-13T07:13:31Z"},"spec":{"lookupPolicy":{"local":false},"tags":[{"name":"latest","annotations":null,"from":{"kind":"DockerImage","name":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:097bdc2123fd0f6e1dc6207fc52410ff29a35fd30de8b6012c877684c1a53c04"},"generation":2,"importPolicy":{"scheduled":true},"referencePolicy":{"type":"Source"}}]},"status":{"dockerImageRepository":"image-registry.openshift-image-registry.svc:5000/openshift/must-gather","publicDockerImageRepository":"default-route-openshift-image-registry.apps.ocp-ppc64le-test-102135.redhat.com/openshift/must-gather","tags":[{"tag":"latest","items":null,"conditions":[{"type":"ImportSuccess","status":"False","lastTransitionTime":"2020-05-13T07:13:31Z","reason":"Unauthorized","message":"you may not have access to the container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:097bdc2123fd0f6e1dc6207fc52410ff29a35fd30de8b6012c877684c1a53c04\"","generation":2}]}]}},{"metadata":{"name":"nodejs","namespace":"openshift","selfLink":"/apis/image.openshift.io/v1/namespaces/openshift/imagestreams/nodejs","uid":"bb902162-eb0b-4a0c-bd89-8156470cbb96","resourceVersion":"9772929","generation":1,"creationTimestamp":"2020-05-27T08:25:18Z","annotations":{"openshift.io/image.dockerRepositoryCheck":"2020-05-27T08:25:18Z"}},"spec":{"lookupPolicy":{"local":false},"tags":[{"name":"latest","annotations":null,"from":{"kind":"DockerImage","name":"registry.redhat.io/rhoar-nodejs/nodejs-10"},"generation":1,"importPolicy":{"insecure":true},"referencePolicy":{"type":"Source"}}]},"status":{"dockerImageRepository":"image-registry.openshift-image-registry.svc:5000/openshift/nodejs","publicDockerImageRepository":"default-route-openshift-image-registry.apps.ocp-ppc64le-test-102135.redhat.com/openshift/nodejs","tags":[{"tag":"latest","items":null,"conditions":[{"type":"ImportSuccess","status":"False","lastTransitionTime":"2020-05-27T08:25:18Z","reason":"InternalError","message":"Internal error occurred: registry.redhat.io/rhoar-nodejs/nodejs-10:latest: Get http://registry.redhat.io/v2/: dial tcp: lookup registry.redhat.io on 172.30.0.10:53: server misbehaving","generation":1}]}]}},{"metadata":{"name":"oauth-proxy","namespace":"openshift","selfLink":"/apis/image.openshift.io/v1/namespaces/openshift/imagestreams/oauth-proxy","uid":"73a0260f-53f8-469b-be57-41e1ffadf813","resourceVersion":"12349","generation":2,"creationTimestamp":"2020-05-13T07:13:31Z"},"spec":{"lookupPolicy":{"local":false},"tags":[{"name":"v4.4","annotations":null,"from":{"kind":"DockerImage","name":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:dc4fa269ae29c954b33a6cdcafcc154784e8bcafae5e5031298ae96fb1ecedd2"},"generation":2,"importPolicy":{"scheduled":true},"referencePolicy":{"type":"Source"}}]},"status":{"dockerImageRepository":"image-registry.openshift-image-registry.svc:5000/openshift/oauth-proxy","publicDockerImageRepository":"default-route-openshift-image-registry.apps.ocp-ppc64le-test-102135.redhat.com/openshift/oauth-proxy","tags":[{"tag":"v4.4","items":null,"conditions":[{"type":"ImportSuccess","status":"False","lastTransitionTime":"2020-05-13T07:13:31Z","reason":"Unauthorized","message":"you may not have access to the container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:dc4fa269ae29c954b33a6cdcafcc154784e8bcafae5e5031298ae96fb1ecedd2\"","generation":2}]}]}},{"metadata":{"name":"openjdk18","namespace":"openshift","selfLink":"/apis/image.openshift.io/v1/namespaces/openshift/imagestreams/openjdk18","uid":"ff014c3f-c6b1-4292-8ee9-4aaf9e0ca348","resourceVersion":"9718189","generation":2,"creationTimestamp":"2020-05-27T06:45:15Z","annotations":{"openshift.io/image.dockerRepositoryCheck":"2020-05-27T06:45:15Z"}},"spec":{"lookupPolicy":{"local":false},"tags":[{"name":"latest","annotations":{"tags":"builder"},"from":{"kind":"DockerImage","name":"registry.access.redhat.com/redhat-openjdk-18/openjdk18-openshift"},"generation":1,"importPolicy":{"insecure":true},"referencePolicy":{"type":"Source"}}]},"status":{"dockerImageRepository":"image-registry.openshift-image-registry.svc:5000/openshift/openjdk18","publicDockerImageRepository":"default-route-openshift-image-registry.apps.ocp-ppc64le-test-102135.redhat.com/openshift/openjdk18","tags":[{"tag":"latest","items":[{"created":"2020-05-27T06:45:15Z","dockerImageReference":"registry.access.redhat.com/redhat-openjdk-18/openjdk18-openshift@sha256:b2efa9bf72d4e81d299605602ef9f046ec49bde8e817c89c0614dbd8a4508395","image":"sha256:b2efa9bf72d4e81d299605602ef9f046ec49bde8e817c89c0614dbd8a4508395","generation":1}]}]}},{"metadata":{"name":"openjdk18-pkvr-app","namespace":"openshift","selfLink":"/apis/image.openshift.io/v1/namespaces/openshift/imagestreams/openjdk18-pkvr-app","uid":"9fb2e59b-b6ba-4836-bc5a-571e087dc2e7","resourceVersion":"9736318","generation":1,"creationTimestamp":"2020-05-27T07:21:37Z","labels":{"app":"app","app.kubernetes.io/instance":"openjdk18-pkvr","app.kubernetes.io/managed-by":"odo" [truncated 5786 chars]
I0528 03:08:39.257599   27048 round_trippers.go:386] curl -k -v -XGET  -H "User-Agent: odo/v0.0.0 (linux/ppc64le) kubernetes/$Format" -H "Authorization: Bearer SkO8Ok7B2c0YBVs7ql9kjupBRL40M6eFgExq2KpzZG4" -H "Accept: application/json, */*" 'https://api.ocp-ppc64le-test-102135.redhat.com:6443/apis/image.openshift.io/v1/namespaces/openshift/imagestreams'
I0528 03:08:39.273488   27048 round_trippers.go:405] GET https://api.ocp-ppc64le-test-102135.redhat.com:6443/apis/image.openshift.io/v1/namespaces/openshift/imagestreams 200 OK in 15 milliseconds
I0528 03:08:39.273500   27048 round_trippers.go:411] Response Headers:
I0528 03:08:39.273511   27048 round_trippers.go:414]     Content-Type: application/json
I0528 03:08:39.273518   27048 round_trippers.go:414]     Date: Thu, 28 May 2020 07:08:39 GMT
I0528 03:08:39.273528   27048 round_trippers.go:414]     Audit-Id: fc90ce59-2496-444f-a7d2-35d67fed0704
I0528 03:08:39.273536   27048 round_trippers.go:414]     Cache-Control: no-cache, private
I0528 03:08:39.273543   27048 round_trippers.go:414]     Cache-Control: no-store
I0528 03:08:39.273811   27048 request.go:897] Response Body: {"kind":"ImageStreamList","apiVersion":"image.openshift.io/v1","metadata":{"selfLink":"/apis/image.openshift.io/v1/namespaces/openshift/imagestreams","resourceVersion":"10554251"},"items":[{"metadata":{"name":"cli","namespace":"openshift","selfLink":"/apis/image.openshift.io/v1/namespaces/openshift/imagestreams/cli","uid":"fc0e6c4f-ad91-4b0b-b0d3-bf57d832bd9a","resourceVersion":"12339","generation":2,"creationTimestamp":"2020-05-13T07:13:31Z"},"spec":{"lookupPolicy":{"local":false},"tags":[{"name":"latest","annotations":null,"from":{"kind":"DockerImage","name":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:85188d9ccefd6923ce9b4e7cf5b2445739706aa9f642a9cb06d7b4ba82fcf1e6"},"generation":2,"importPolicy":{"scheduled":true},"referencePolicy":{"type":"Source"}}]},"status":{"dockerImageRepository":"image-registry.openshift-image-registry.svc:5000/openshift/cli","publicDockerImageRepository":"default-route-openshift-image-registry.apps.ocp-ppc64le-test-102135.redhat.com/openshift/cli","tags":[{"tag":"latest","items":null,"conditions":[{"type":"ImportSuccess","status":"False","lastTransitionTime":"2020-05-13T07:13:31Z","reason":"Unauthorized","message":"you may not have access to the container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:85188d9ccefd6923ce9b4e7cf5b2445739706aa9f642a9cb06d7b4ba82fcf1e6\"","generation":2}]}]}},{"metadata":{"name":"cli-artifacts","namespace":"openshift","selfLink":"/apis/image.openshift.io/v1/namespaces/openshift/imagestreams/cli-artifacts","uid":"7b2cdd59-197c-4a4b-86ea-bf47046d785a","resourceVersion":"12341","generation":2,"creationTimestamp":"2020-05-13T07:13:31Z"},"spec":{"lookupPolicy":{"local":false},"tags":[{"name":"latest","annotations":null,"from":{"kind":"DockerImage","name":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:29d02a351e3a203e344ac9a835193d3bd6ba6edd770bc33ce963f6718dcf3c8a"},"generation":2,"importPolicy":{"scheduled":true},"referencePolicy":{"type":"Source"}}]},"status":{"dockerImageRepository":"image-registry.openshift-image-registry.svc:5000/openshift/cli-artifacts","publicDockerImageRepository":"default-route-openshift-image-registry.apps.ocp-ppc64le-test-102135.redhat.com/openshift/cli-artifacts","tags":[{"tag":"latest","items":null,"conditions":[{"type":"ImportSuccess","status":"False","lastTransitionTime":"2020-05-13T07:13:31Z","reason":"Unauthorized","message":"you may not have access to the container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:29d02a351e3a203e344ac9a835193d3bd6ba6edd770bc33ce963f6718dcf3c8a\"","generation":2}]}]}},{"metadata":{"name":"installer","namespace":"openshift","selfLink":"/apis/image.openshift.io/v1/namespaces/openshift/imagestreams/installer","uid":"f812bb1d-f82b-47c3-b451-134a4a94ff30","resourceVersion":"12343","generation":2,"creationTimestamp":"2020-05-13T07:13:31Z"},"spec":{"lookupPolicy":{"local":false},"tags":[{"name":"latest","annotations":null,"from":{"kind":"DockerImage","name":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3fe646e65a68528f352eab5179e1c1c64f9b8c55ca2b196e5964c42faa6833e7"},"generation":2,"importPolicy":{"scheduled":true},"referencePolicy":{"type":"Source"}}]},"status":{"dockerImageRepository":"image-registry.openshift-image-registry.svc:5000/openshift/installer","publicDockerImageRepository":"default-route-openshift-image-registry.apps.ocp-ppc64le-test-102135.redhat.com/openshift/installer","tags":[{"tag":"latest","items":null,"conditions":[{"type":"ImportSuccess","status":"False","lastTransitionTime":"2020-05-13T07:13:31Z","reason":"Unauthorized","message":"you may not have access to the container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3fe646e65a68528f352eab5179e1c1c64f9b8c55ca2b196e5964c42faa6833e7\"","generation":2}]}]}},{"metadata":{"name":"installer-artifacts","namespace":"openshift","selfLink":"/apis/image.openshift.io/v1/namespaces/openshift/imagestreams/installer-artifacts","uid":"11d43ad3-6f4f-46d5-8a41-15cd8e89ca23","resourceVersion":"12344","generation":2,"creationTimestamp":"2020-05-13T07:13:31Z"},"spec":{"lookupPolicy":{"local":false},"tags":[{"name":"latest","annotations":null,"from":{"kind":"DockerImage","name":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ad760ebec3bbc755107b39c7f5098f1b4dffdd2f804467dd25f5fe07ea8a9859"},"generation":2,"importPolicy":{"scheduled":true},"referencePolicy":{"type":"Source"}}]},"status":{"dockerImageRepository":"image-registry.openshift-image-registry.svc:5000/openshift/installer-artifacts","publicDockerImageRepository":"default-route-openshift-image-registry.apps.ocp-ppc64le-test-102135.redhat.com/openshift/installer-artifacts","tags":[{"tag":"latest","items":null,"conditions":[{"type":"ImportSuccess","status":"False","lastTransitionTime":"2020-05-13T07:13:31Z","reason":"Unauthorized","message":"you may not have access to the container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ad760ebec3bbc755107b39c7f5098f1b4dffdd2f804467dd25f5fe07ea8a9859\"","generation":2}]}]}},{"metadata":{"name":"must-gather","namespace":"openshift","selfLink":"/apis/image.openshift.io/v1/namespaces/openshift/imagestreams/must-gather","uid":"d9495dc8-f318-405f-9b39-3a69539b520b","resourceVersion":"12347","generation":2,"creationTimestamp":"2020-05-13T07:13:31Z"},"spec":{"lookupPolicy":{"local":false},"tags":[{"name":"latest","annotations":null,"from":{"kind":"DockerImage","name":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:097bdc2123fd0f6e1dc6207fc52410ff29a35fd30de8b6012c877684c1a53c04"},"generation":2,"importPolicy":{"scheduled":true},"referencePolicy":{"type":"Source"}}]},"status":{"dockerImageRepository":"image-registry.openshift-image-registry.svc:5000/openshift/must-gather","publicDockerImageRepository":"default-route-openshift-image-registry.apps.ocp-ppc64le-test-102135.redhat.com/openshift/must-gather","tags":[{"tag":"latest","items":null,"conditions":[{"type":"ImportSuccess","status":"False","lastTransitionTime":"2020-05-13T07:13:31Z","reason":"Unauthorized","message":"you may not have access to the container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:097bdc2123fd0f6e1dc6207fc52410ff29a35fd30de8b6012c877684c1a53c04\"","generation":2}]}]}},{"metadata":{"name":"nodejs","namespace":"openshift","selfLink":"/apis/image.openshift.io/v1/namespaces/openshift/imagestreams/nodejs","uid":"bb902162-eb0b-4a0c-bd89-8156470cbb96","resourceVersion":"9772929","generation":1,"creationTimestamp":"2020-05-27T08:25:18Z","annotations":{"openshift.io/image.dockerRepositoryCheck":"2020-05-27T08:25:18Z"}},"spec":{"lookupPolicy":{"local":false},"tags":[{"name":"latest","annotations":null,"from":{"kind":"DockerImage","name":"registry.redhat.io/rhoar-nodejs/nodejs-10"},"generation":1,"importPolicy":{"insecure":true},"referencePolicy":{"type":"Source"}}]},"status":{"dockerImageRepository":"image-registry.openshift-image-registry.svc:5000/openshift/nodejs","publicDockerImageRepository":"default-route-openshift-image-registry.apps.ocp-ppc64le-test-102135.redhat.com/openshift/nodejs","tags":[{"tag":"latest","items":null,"conditions":[{"type":"ImportSuccess","status":"False","lastTransitionTime":"2020-05-27T08:25:18Z","reason":"InternalError","message":"Internal error occurred: registry.redhat.io/rhoar-nodejs/nodejs-10:latest: Get http://registry.redhat.io/v2/: dial tcp: lookup registry.redhat.io on 172.30.0.10:53: server misbehaving","generation":1}]}]}},{"metadata":{"name":"oauth-proxy","namespace":"openshift","selfLink":"/apis/image.openshift.io/v1/namespaces/openshift/imagestreams/oauth-proxy","uid":"73a0260f-53f8-469b-be57-41e1ffadf813","resourceVersion":"12349","generation":2,"creationTimestamp":"2020-05-13T07:13:31Z"},"spec":{"lookupPolicy":{"local":false},"tags":[{"name":"v4.4","annotations":null,"from":{"kind":"DockerImage","name":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:dc4fa269ae29c954b33a6cdcafcc154784e8bcafae5e5031298ae96fb1ecedd2"},"generation":2,"importPolicy":{"scheduled":true},"referencePolicy":{"type":"Source"}}]},"status":{"dockerImageRepository":"image-registry.openshift-image-registry.svc:5000/openshift/oauth-proxy","publicDockerImageRepository":"default-route-openshift-image-registry.apps.ocp-ppc64le-test-102135.redhat.com/openshift/oauth-proxy","tags":[{"tag":"v4.4","items":null,"conditions":[{"type":"ImportSuccess","status":"False","lastTransitionTime":"2020-05-13T07:13:31Z","reason":"Unauthorized","message":"you may not have access to the container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:dc4fa269ae29c954b33a6cdcafcc154784e8bcafae5e5031298ae96fb1ecedd2\"","generation":2}]}]}},{"metadata":{"name":"openjdk18","namespace":"openshift","selfLink":"/apis/image.openshift.io/v1/namespaces/openshift/imagestreams/openjdk18","uid":"ff014c3f-c6b1-4292-8ee9-4aaf9e0ca348","resourceVersion":"9718189","generation":2,"creationTimestamp":"2020-05-27T06:45:15Z","annotations":{"openshift.io/image.dockerRepositoryCheck":"2020-05-27T06:45:15Z"}},"spec":{"lookupPolicy":{"local":false},"tags":[{"name":"latest","annotations":{"tags":"builder"},"from":{"kind":"DockerImage","name":"registry.access.redhat.com/redhat-openjdk-18/openjdk18-openshift"},"generation":1,"importPolicy":{"insecure":true},"referencePolicy":{"type":"Source"}}]},"status":{"dockerImageRepository":"image-registry.openshift-image-registry.svc:5000/openshift/openjdk18","publicDockerImageRepository":"default-route-openshift-image-registry.apps.ocp-ppc64le-test-102135.redhat.com/openshift/openjdk18","tags":[{"tag":"latest","items":[{"created":"2020-05-27T06:45:15Z","dockerImageReference":"registry.access.redhat.com/redhat-openjdk-18/openjdk18-openshift@sha256:b2efa9bf72d4e81d299605602ef9f046ec49bde8e817c89c0614dbd8a4508395","image":"sha256:b2efa9bf72d4e81d299605602ef9f046ec49bde8e817c89c0614dbd8a4508395","generation":1}]}]}},{"metadata":{"name":"openjdk18-pkvr-app","namespace":"openshift","selfLink":"/apis/image.openshift.io/v1/namespaces/openshift/imagestreams/openjdk18-pkvr-app","uid":"9fb2e59b-b6ba-4836-bc5a-571e087dc2e7","resourceVersion":"9736318","generation":1,"creationTimestamp":"2020-05-27T07:21:37Z","labels":{"app":"app","app.kubernetes.io/instance":"openjdk18-pkvr","app.kubernetes.io/managed-by":"odo" [truncated 5786 chars]
I0528 03:08:39.274801   27048 round_trippers.go:386] curl -k -v -XGET  -H "Accept: application/json, */*" -H "User-Agent: odo/v0.0.0 (linux/ppc64le) kubernetes/$Format" -H "Authorization: Bearer SkO8Ok7B2c0YBVs7ql9kjupBRL40M6eFgExq2KpzZG4" 'https://api.ocp-ppc64le-test-102135.redhat.com:6443/apis/image.openshift.io/v1/namespaces/openshift/imagestreamtags'
I0528 03:08:39.281618   27048 round_trippers.go:405] GET https://api.ocp-ppc64le-test-102135.redhat.com:6443/apis/image.openshift.io/v1/namespaces/openshift/imagestreamtags 200 OK in 6 milliseconds
I0528 03:08:39.281657   27048 round_trippers.go:411] Response Headers:
I0528 03:08:39.281669   27048 round_trippers.go:414]     Cache-Control: no-cache, private
I0528 03:08:39.281681   27048 round_trippers.go:414]     Cache-Control: no-store
I0528 03:08:39.281690   27048 round_trippers.go:414]     Content-Type: application/json
I0528 03:08:39.281701   27048 round_trippers.go:414]     Date: Thu, 28 May 2020 07:08:39 GMT
I0528 03:08:39.281708   27048 round_trippers.go:414]     Content-Length: 2753
I0528 03:08:39.281715   27048 round_trippers.go:414]     Audit-Id: aeb7729b-763b-4769-bd7c-e29170c81e7c
I0528 03:08:39.281782   27048 request.go:897] Response Body: {"kind":"ImageStreamTagList","apiVersion":"image.openshift.io/v1","metadata":{"selfLink":"/apis/image.openshift.io/v1/namespaces/openshift/imagestreamtags"},"items":[{"metadata":{"name":"openjdk18:latest","namespace":"openshift","selfLink":"/apis/image.openshift.io/v1/namespaces/openshift/imagestreamtags/openjdk18:latest","uid":"ff014c3f-c6b1-4292-8ee9-4aaf9e0ca348","resourceVersion":"9718189","creationTimestamp":"2020-05-27T06:45:15Z","annotations":{"tags":"builder"}},"tag":{"name":"latest","annotations":{"tags":"builder"},"from":{"kind":"DockerImage","name":"registry.access.redhat.com/redhat-openjdk-18/openjdk18-openshift"},"generation":1,"importPolicy":{"insecure":true},"referencePolicy":{"type":"Source"}},"generation":1,"lookupPolicy":{"local":false},"image":{"metadata":{"name":"sha256:b2efa9bf72d4e81d299605602ef9f046ec49bde8e817c89c0614dbd8a4508395","creationTimestamp":null},"dockerImageReference":"registry.access.redhat.com/redhat-openjdk-18/openjdk18-openshift@sha256:b2efa9bf72d4e81d299605602ef9f046ec49bde8e817c89c0614dbd8a4508395","dockerImageMetadata":{"kind":"DockerImage","apiVersion":"1.0","Id":"","Created":null,"ContainerConfig":{}},"dockerImageMetadataVersion":"1.0","dockerImageLayers":null}},{"metadata":{"name":"release:ruby-25","namespace":"openshift","selfLink":"/apis/image.openshift.io/v1/namespaces/openshift/imagestreamtags/release:ruby-25","uid":"2fd6debc-3a4f-402c-83ca-126186cc5b68","resourceVersion":"10536193","creationTimestamp":"2020-05-26T17:11:24Z"},"tag":{"name":"ruby-25","annotations":null,"from":{"kind":"DockerImage","name":"docker.io/centos/ruby-25-centos7:latest"},"generation":420,"importPolicy":{"scheduled":true},"referencePolicy":{"type":"Source"}},"generation":419,"lookupPolicy":{"local":false},"conditions":[{"type":"ImportSuccess","status":"False","lastTransitionTime":"2020-05-28T06:37:41Z","reason":"InternalError","message":"Internal error occurred: docker.io/centos/ruby-25-centos7:latest: Get https://production.cloudflare.docker.com/registry-v2/docker/registry/v2/blobs/sha256/1a/1ae740842a4455e979ade986f8452f522c3d6263e53f42b3feb82d02a17906a7/data?verify=1590650851-yaGm0B6nUC6GWlr3%2BWHr%2FXqUvfc%3D: dial tcp: lookup production.cloudflare.docker.com on 172.30.0.10:53: read udp 10.128.0.6:54443-\u003e172.30.0.10:53: i/o timeout","generation":420}],"image":{"metadata":{"name":"sha256:8fa118f5960fe9d630e02f8449163d8fd8d4836061c8495197789164ba36e966","creationTimestamp":null},"dockerImageReference":"docker.io/centos/ruby-25-centos7@sha256:8fa118f5960fe9d630e02f8449163d8fd8d4836061c8495197789164ba36e966","dockerImageMetadata":{"kind":"DockerImage","apiVersion":"1.0","Id":"","Created":null,"ContainerConfig":{}},"dockerImageMetadataVersion":"1.0","dockerImageLayers":null}}]}
I0528 03:08:39.283870   27048 round_trippers.go:386] curl -k -v -XGET  -H "User-Agent: odo/v0.0.0 (linux/ppc64le) kubernetes/$Format" -H "Authorization: Bearer SkO8Ok7B2c0YBVs7ql9kjupBRL40M6eFgExq2KpzZG4" -H "Accept: application/json, */*" 'https://api.ocp-ppc64le-test-102135.redhat.com:6443/apis/image.openshift.io/v1/namespaces/openshift/imagestreamtags'
I0528 03:08:39.290719   27048 round_trippers.go:405] GET https://api.ocp-ppc64le-test-102135.redhat.com:6443/apis/image.openshift.io/v1/namespaces/openshift/imagestreamtags 200 OK in 6 milliseconds
I0528 03:08:39.290740   27048 round_trippers.go:411] Response Headers:
I0528 03:08:39.290748   27048 round_trippers.go:414]     Content-Length: 2753
I0528 03:08:39.290756   27048 round_trippers.go:414]     Audit-Id: e9218d17-e3a2-4ada-9b1e-180d4670f46f
I0528 03:08:39.290766   27048 round_trippers.go:414]     Cache-Control: no-cache, private
I0528 03:08:39.290773   27048 round_trippers.go:414]     Cache-Control: no-store
I0528 03:08:39.290781   27048 round_trippers.go:414]     Content-Type: application/json
I0528 03:08:39.290789   27048 round_trippers.go:414]     Date: Thu, 28 May 2020 07:08:39 GMT
I0528 03:08:39.290846   27048 request.go:897] Response Body: {"kind":"ImageStreamTagList","apiVersion":"image.openshift.io/v1","metadata":{"selfLink":"/apis/image.openshift.io/v1/namespaces/openshift/imagestreamtags"},"items":[{"metadata":{"name":"openjdk18:latest","namespace":"openshift","selfLink":"/apis/image.openshift.io/v1/namespaces/openshift/imagestreamtags/openjdk18:latest","uid":"ff014c3f-c6b1-4292-8ee9-4aaf9e0ca348","resourceVersion":"9718189","creationTimestamp":"2020-05-27T06:45:15Z","annotations":{"tags":"builder"}},"tag":{"name":"latest","annotations":{"tags":"builder"},"from":{"kind":"DockerImage","name":"registry.access.redhat.com/redhat-openjdk-18/openjdk18-openshift"},"generation":1,"importPolicy":{"insecure":true},"referencePolicy":{"type":"Source"}},"generation":1,"lookupPolicy":{"local":false},"image":{"metadata":{"name":"sha256:b2efa9bf72d4e81d299605602ef9f046ec49bde8e817c89c0614dbd8a4508395","creationTimestamp":null},"dockerImageReference":"registry.access.redhat.com/redhat-openjdk-18/openjdk18-openshift@sha256:b2efa9bf72d4e81d299605602ef9f046ec49bde8e817c89c0614dbd8a4508395","dockerImageMetadata":{"kind":"DockerImage","apiVersion":"1.0","Id":"","Created":null,"ContainerConfig":{}},"dockerImageMetadataVersion":"1.0","dockerImageLayers":null}},{"metadata":{"name":"release:ruby-25","namespace":"openshift","selfLink":"/apis/image.openshift.io/v1/namespaces/openshift/imagestreamtags/release:ruby-25","uid":"2fd6debc-3a4f-402c-83ca-126186cc5b68","resourceVersion":"10536193","creationTimestamp":"2020-05-26T17:11:24Z"},"tag":{"name":"ruby-25","annotations":null,"from":{"kind":"DockerImage","name":"docker.io/centos/ruby-25-centos7:latest"},"generation":420,"importPolicy":{"scheduled":true},"referencePolicy":{"type":"Source"}},"generation":419,"lookupPolicy":{"local":false},"conditions":[{"type":"ImportSuccess","status":"False","lastTransitionTime":"2020-05-28T06:37:41Z","reason":"InternalError","message":"Internal error occurred: docker.io/centos/ruby-25-centos7:latest: Get https://production.cloudflare.docker.com/registry-v2/docker/registry/v2/blobs/sha256/1a/1ae740842a4455e979ade986f8452f522c3d6263e53f42b3feb82d02a17906a7/data?verify=1590650851-yaGm0B6nUC6GWlr3%2BWHr%2FXqUvfc%3D: dial tcp: lookup production.cloudflare.docker.com on 172.30.0.10:53: read udp 10.128.0.6:54443-\u003e172.30.0.10:53: i/o timeout","generation":420}],"image":{"metadata":{"name":"sha256:8fa118f5960fe9d630e02f8449163d8fd8d4836061c8495197789164ba36e966","creationTimestamp":null},"dockerImageReference":"docker.io/centos/ruby-25-centos7@sha256:8fa118f5960fe9d630e02f8449163d8fd8d4836061c8495197789164ba36e966","dockerImageMetadata":{"kind":"DockerImage","apiVersion":"1.0","Id":"","Created":null,"ContainerConfig":{}},"dockerImageMetadataVersion":"1.0","dockerImageLayers":null}}]}
I0528 03:08:39.291089   27048 catalog.go:361] Found builder image: catalog.ComponentType{TypeMeta:v1.TypeMeta{Kind:"ComponentType", APIVersion:"odo.openshift.io/v1alpha1"}, ObjectMeta:v1.ObjectMeta{Name:"openjdk18", GenerateName:"", Namespace:"openshift", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:v1.Time{Time:time.Time{wall:0x0, ext:0, loc:(*time.Location)(nil)}}, DeletionTimestamp:(*v1.Time)(nil), DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Initializers:(*v1.Initializers)(nil), Finalizers:[]string(nil), ClusterName:""}, Spec:catalog.ComponentSpec{AllTags:[]string{"latest"}, NonHiddenTags:[]string{"latest"}, SupportedTags:[]string(nil), ImageStreamRef:v1.ImageStream{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"openjdk18", GenerateName:"", Namespace:"openshift", SelfLink:"/apis/image.openshift.io/v1/namespaces/openshift/imagestreams/openjdk18", UID:"ff014c3f-c6b1-4292-8ee9-4aaf9e0ca348", ResourceVersion:"9718189", Generation:2, CreationTimestamp:v1.Time{Time:time.Time{wall:0x0, ext:63726158715, loc:(*time.Location)(0x28c1960)}}, DeletionTimestamp:(*v1.Time)(nil), DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string{"openshift.io/image.dockerRepositoryCheck":"2020-05-27T06:45:15Z"}, OwnerReferences:[]v1.OwnerReference(nil), Initializers:(*v1.Initializers)(nil), Finalizers:[]string(nil), ClusterName:""}, Spec:v1.ImageStreamSpec{LookupPolicy:v1.ImageLookupPolicy{Local:false}, DockerImageRepository:"", Tags:[]v1.TagReference{v1.TagReference{Name:"latest", Annotations:map[string]string{"tags":"builder"}, From:(*v1.ObjectReference)(0xc0006f6af0), Reference:false, Generation:(*int64)(0xc000a15210), ImportPolicy:v1.TagImportPolicy{Insecure:true, Scheduled:false}, ReferencePolicy:v1.TagReferencePolicy{Type:"Source"}}}}, Status:v1.ImageStreamStatus{DockerImageRepository:"image-registry.openshift-image-registry.svc:5000/openshift/openjdk18", PublicDockerImageRepository:"default-route-openshift-image-registry.apps.ocp-ppc64le-test-102135.redhat.com/openshift/openjdk18", Tags:[]v1.NamedTagEventList{v1.NamedTagEventList{Tag:"latest", Items:[]v1.TagEvent{v1.TagEvent{Created:v1.Time{Time:time.Time{wall:0x0, ext:63726158715, loc:(*time.Location)(0x28c1960)}}, DockerImageReference:"registry.access.redhat.com/redhat-openjdk-18/openjdk18-openshift@sha256:b2efa9bf72d4e81d299605602ef9f046ec49bde8e817c89c0614dbd8a4508395", Image:"sha256:b2efa9bf72d4e81d299605602ef9f046ec49bde8e817c89c0614dbd8a4508395", Generation:1}}, Conditions:[]v1.TagEventCondition(nil)}}}}}}
I0528 03:08:39.291242   27048 catalog.go:361] Found builder image: catalog.ComponentType{TypeMeta:v1.TypeMeta{Kind:"ComponentType", APIVersion:"odo.openshift.io/v1alpha1"}, ObjectMeta:v1.ObjectMeta{Name:"openjdk18", GenerateName:"", Namespace:"openshift", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:v1.Time{Time:time.Time{wall:0x0, ext:0, loc:(*time.Location)(nil)}}, DeletionTimestamp:(*v1.Time)(nil), DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Initializers:(*v1.Initializers)(nil), Finalizers:[]string(nil), ClusterName:""}, Spec:catalog.ComponentSpec{AllTags:[]string{"latest"}, NonHiddenTags:[]string{"latest"}, SupportedTags:[]string(nil), ImageStreamRef:v1.ImageStream{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"openjdk18", GenerateName:"", Namespace:"openshift", SelfLink:"/apis/image.openshift.io/v1/namespaces/openshift/imagestreams/openjdk18", UID:"ff014c3f-c6b1-4292-8ee9-4aaf9e0ca348", ResourceVersion:"9718189", Generation:2, CreationTimestamp:v1.Time{Time:time.Time{wall:0x0, ext:63726158715, loc:(*time.Location)(0x28c1960)}}, DeletionTimestamp:(*v1.Time)(nil), DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string{"openshift.io/image.dockerRepositoryCheck":"2020-05-27T06:45:15Z"}, OwnerReferences:[]v1.OwnerReference(nil), Initializers:(*v1.Initializers)(nil), Finalizers:[]string(nil), ClusterName:""}, Spec:v1.ImageStreamSpec{LookupPolicy:v1.ImageLookupPolicy{Local:false}, DockerImageRepository:"", Tags:[]v1.TagReference{v1.TagReference{Name:"latest", Annotations:map[string]string{"tags":"builder"}, From:(*v1.ObjectReference)(0xc0006fe850), Reference:false, Generation:(*int64)(0xc000a20890), ImportPolicy:v1.TagImportPolicy{Insecure:true, Scheduled:false}, ReferencePolicy:v1.TagReferencePolicy{Type:"Source"}}}}, Status:v1.ImageStreamStatus{DockerImageRepository:"image-registry.openshift-image-registry.svc:5000/openshift/openjdk18", PublicDockerImageRepository:"default-route-openshift-image-registry.apps.ocp-ppc64le-test-102135.redhat.com/openshift/openjdk18", Tags:[]v1.NamedTagEventList{v1.NamedTagEventList{Tag:"latest", Items:[]v1.TagEvent{v1.TagEvent{Created:v1.Time{Time:time.Time{wall:0x0, ext:63726158715, loc:(*time.Location)(0x28c1960)}}, DockerImageReference:"registry.access.redhat.com/redhat-openjdk-18/openjdk18-openshift@sha256:b2efa9bf72d4e81d299605602ef9f046ec49bde8e817c89c0614dbd8a4508395", Image:"sha256:b2efa9bf72d4e81d299605602ef9f046ec49bde8e817c89c0614dbd8a4508395", Generation:1}}, Conditions:[]v1.TagEventCondition(nil)}}}}}}
Odo Supported OpenShift Components:
NAME          PROJECT       TAGS
openjdk18     openshift     latest
openjdk18     openshift     latest

I0528 03:08:39.291422   27048 odo.go:77] Could not get the latest release information in time. Never mind, exiting gracefully :)
[root@bastion ~]# uname -a
Linux bastion 4.18.0-144.el8.ppc64le #1 SMP Thu Sep 12 14:21:35 UTC 2019 ppc64le ppc64le ppc64le GNU/Linux
[root@bastion ~]# arch
ppc64le
[root@bastion ~]#
sarveshtamba commented 4 years ago

we did this on IBM system z platform, it works so far so good you need prepare those catalog images

something like below

oc import-image openjdk18 \--from=registry.access.redhat.com/redhat-openjdk18/openjdk18-openshift --confirm 

oc annotate istag/openjdk18:latest tags=builder

We tried preparing the catalog images as per below commands.

oc project openshift oc import-image openjdk18 --from=registry.access.redhat.com/redhat-openjdk-18/openjdk18-openshift --confirm --insecure=true oc annotate istag/openjdk18:latest tags=builder odo catalog list components

However not able to list the services after doing odo push.

[cloud-user@shivanij-bastion ~]$ odo push
Validation
 ✓  Checking component [10ms]

Configuration changes
 ✓  Initializing component
 ✓  Creating component [819ms]
 ✓  Triggering build from git [205ms]
 ◒  Waiting for build to finish
 ✓  Waiting for build to finish [2m]
 ✓  Deploying component openjdk18-kkro [33s]

Applying URL changes
 ✓  URLs are synced with the cluster, no changes are required.

Pushing to component openjdk18-kkro of type git
 ✓  Changes successfully pushed to component 

[cloud-user@shivanij-bastion ~]$ odo catalog list services
 ✗  unable to list services because Service Catalog is not enabled in your cluster: unable to get cluster serviceClassExternalName: unable to get cluster service classes: unable to list cluster service classes: the server could not find the requested resource (get clusterserviceclasses.servicecatalog.k8s.io)
[cloud-user@shivanij-bastion ~]$  
jichenjc commented 4 years ago

ok I got same result on my system, sorry I didn't pay attention (I thought it's push command) to the question at beginning

[root@bastion nodejs-ex]# odo catalog list services
 ✗  unable to list services because Service Catalog is not enabled in your cluster: unable to get cluster serviceClassExternalName: unable to get cluster service classes: unable to list cluster service classes: the server could not find the requested resource (get clusterserviceclasses.servicecatalog.k8s.io)
[root@bastion nodejs-ex]# uanme -a
-bash: uanme: command not found
[root@bastion nodejs-ex]# uname -a
Linux bastion 3.10.0-1062.el7.s390x #1 SMP Thu Jul 18 16:27:07 EDT 2019 s390x s390x s390x GNU/Linux
jichenjc commented 4 years ago

I think it's not the odo's responsibility to do so , it might be a CRD not well defined

[root@bastion nodejs-ex]# oc get clusterserviceclasses.servicecatalog.k8s.io
error: the server doesn't have a resource type "clusterserviceclasses"

have no skill in who should (guess some operator in the cluster) need define this but those operators seems not defined by default on non-x86 cluster

dharmit commented 4 years ago

There's a difference between components and services. If you're on a 4.x cluster and would like to run odo catalog list services, there are two things to keep in mind:

  1. If you want to work with Operators provided through Operator Hub, enable the experimental mode odo preference set Experimental true and then run odo catalog list services. More about odo and Operator Hub in this doc.
  2. If you want to work with the Service Catalog, you'll have to install that using this documentation but make sure that you don't have experimental mode enabled when you're trying to execute odo catalog list services or odo service commands.
jichenjc commented 4 years ago

not sure but seems this comes from svc https://github.com/kubernetes-sigs/service-catalog/blob/master/pkg/apis/servicecatalog/v1beta1/types.go#L400

jichenjc commented 4 years ago

@dharmit thanks a lot ,at least the experiment = true work for me

[root@bastion nodejs-ex]# odo preference set Experimental true
Global preference was successfully updated
[root@bastion nodejs-ex]# odo catalog list services
Operators available in the cluster
NAME                          CRDs
mongodb-enterprise.v1.4.5     MongoDB, MongoDBUser, MongoDBOpsManager
mongodb-enterprise.v1.5.1     MongoDB, MongoDBUser, MongoDBOpsManager
mongodb-enterprise.v1.5.2     MongoDB, MongoDBUser, MongoDBOpsManager
sarveshtamba commented 4 years ago

I am getting the below:-

[cloud-user@shivanij-bastion ~]$ odo preference set Experimental true
Global preference was successfully updated
[cloud-user@shivanij-bastion ~]$ odo catalog list services
 ✗  no deployable services/operators found
jichenjc commented 4 years ago

actually this works , you don't have service defined you didn't see previous error unable to list services because Service Catalog is not enabled in your cluster:

so try create a component and push it , may help you I guess? as I only do the create and push, nothing else..

dharmit commented 4 years ago
[root@bastion ~]# odo catalog list components -v9
I0528 03:08:39.198827   27048 loader.go:359] Config loaded from file /root/ocp4-workdir/auth/kubeconfig
openshift@sha256:b2efa9bf72d4e81d299605602ef9f046ec49bde8e817c89c0614dbd8a4508395", Image:"sha256:b2efa9bf72d4e81d299605602ef9f046ec49bde8e817c89c0614dbd8a4508395", Generation:1}}, Conditions:[]v1.TagEventCondition(nil)}}}}}}
Odo Supported OpenShift Components:
NAME          PROJECT       TAGS
openjdk18     openshift     latest
openjdk18     openshift     latest

@sarveshtamba above output indicates that listing the components worked fine without any error. In issue description, you were seeing the error - ✗ unable to retrieve any catalog images from the OpenShift cluster.

But odo login still fails.

Are you sure that you're logging into the same cluster that you earlier logged in using oc? I'd recommend you to provide the server url to the login command. For example, I'm working on a CRC cluster and I login using:

$ odo login https://api.crc.testing:6443 -u developer -p developer

I'm suggesting this because if something caused switch in the context used by oc/kubectl, odo login would try to login to that cluster and it might fail if the credentials are not valid for it.

Beyond that, I agree with what @jichenjc mentioned about an image being tagged as a builder image to show up in odo catalog list components output:

# There are 77 imagestreams in my cluster under the openshift namespace
$ oc get is -n openshift | awk 'NR>1' | wc -l
77

$ odo project get
The current project is: myproject

# But only 12 are tagged as builder images
$ odo catalog list components | awk 'NR>2' | wc -l
12
dharmit commented 4 years ago
[cloud-user@shivanij-bastion ~]$ odo catalog list services
 ✗  no deployable services/operators found

This is because you don't have any operators installed in the current namespace. Try installing an operator using the kubeadmin user through the OpenShift Web Console. You can refer this section in the doc.

sarveshtamba commented 4 years ago

@dharmit here is the service added and listed:-

[cloud-user@shivanij-bastion ~]$ odo service create etcdoperator.v0.9.4 --crd EtcdCluster
Deploying service of type: EtcdCluster
 ✓  Deploying service [89ms]
 ✓  Service 'example' was created

Progress of the provisioning will not be reported and might take a long time
You can see the current status by executing 'odo service list'
Optionally, link etcdoperator.v0.9.4 to your component by running: 'odo link <component-name>'
[cloud-user@shivanij-bastion ~]$ odo service list
NAME        TYPE            AGE
example     EtcdCluster     11s
[cloud-user@shivanij-bastion ~]$ odo catalog list services
Operators available in the cluster
NAME                    CRDs
etcdoperator.v0.9.4     EtcdCluster, EtcdBackup, EtcdRestore

I tried checking the login issue even with correct URL that oc is login to, still facing the same issue for the developer user. Trying to check up more on this

From the above, can we say odo v1.2.1 works fine with OCP4.3 on ppc64le platform, especially the creation and listing of the components and services?

dharmit commented 4 years ago

From the above, can we say odo v1.2.1 works fine with OCP4.3 on ppc64le platform, especially the creation and listing of the components and services?

The service creation and listing is working fine. That too using Operator Hub which is in experimental mode.

As far as components are concerned, in the context of this issue, you're trying to list the ones based on s2i builder images. You're able to list them as well. So, IMO, both your issues are sorted.

As for the login issue, I'm sure that the credentials are skewed. Spinning up a service, the way you have based on my comment, is not possible if you're not logged into the OpenShift cluster. It's likely that you logged in using oc. IMO, same credentials should work just fine when performing login with odo. Meaning, same username & password combination should work for both oc and odo:

$ oc login https://api.crc.testing:6443 -u developer -p developer
Login successful.

You have one project on this server: "myproject"

Using project "myproject".

$ oc logout                                                        
Logged "developer" out on "https://api.crc.testing:6443"

$ odo login https://api.crc.testing:6443 -u developer -p developer 
Connecting to the OpenShift cluster

Login successful.

You have one project on this server: "myproject"

Using project "myproject".
dharmit commented 4 years ago

@sarveshtamba I'd also suggest you to close this issue if the component and service related concerns are addressed. And open a new issue if login is not working. That would help track login issue properly.

sarveshtamba commented 4 years ago

Used the correct user which was used for oc login and was able to login successfully using odo as well.

[cloud-user@shivanij-bastion ~]$ odo login -u kubeadmin
Connecting to the OpenShift cluster

Authentication required for https://api.shivanij.example.com:6443 (openshift)
Username: kubeadmin
Password:
Login successful.

You have access to 57 projects, the list has been suppressed. You can list all projects with 'odo projects'

Using project "default".

Will close this issue.

@dharmit @jichenjc thank you both for all your help. Much appreciated!