-
Notifications
You must be signed in to change notification settings - Fork 243
-
Notifications
You must be signed in to change notification settings - Fork 243
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
New spring devfile does not work on default namespace #4027
Comments
@maysunfaisal please share the devfile you are using, |
@maysunfaisal What storageclasses are being used on both clusters ( Because Kubernetes mounts persistent-volumes as root-owned by default, some storage classes on non-OpenShift Kubernetes distributions have poor support for non-root containers. |
@adisky its the default odo-devfile registry devfile.yaml. The @johnmcollier well this is the cluster-bot clusters. I'm not sure what the storage-class was yesterday but it looks like the devfile is working today! This is my storage-class now:
I've noticed that when the new default devfile.yaml failed yesterday, the previous two container devfile using the hosted image from
Today, the same image is
|
So I've seen this again today and did a bit more research. It works fine for non default namespace and doesn't work well for default namespace. Non default namespace:
Default namespace:
So the official documentation from OCP is to give the root group sufficient permissions for arbitrary user ids - https://docs.openshift.com/container-platform/4.5/openshift_images/create-images.html#images-create-guide-openshift_create-images:
I was doing the same for my previous springboot image hosted on
Thx @johnmcollier for the doc link. This was documented in the google doc for devfile v1 stack authors, which I cant seem to find right now. |
I would also like to point out that the pvc path is not owned by root group but the user group in non default namespace. Whereas in default namespace, everything is owned by root and does not have |
I've opened #4053 because this will be affecting any devfile. |
This was discussed in the odo contributors meeting on Sept 29 and it was decided that we want odo to spit out a warning saying we're running in default namespace and things may not run as expected. |
Issues go stale after 90d of inactivity. Mark the issue as fresh by commenting If this issue is safe to close now please do so with /lifecycle stale |
Stale issues rot after 30d of inactivity. Mark the issue as fresh by commenting If this issue is safe to close now please do so with /lifecycle rotten |
Rotten issues close after 30d of inactivity. Reopen the issue by commenting /close |
@openshift-bot: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/kind bug
What versions of software are you using?
Operating System:
Output of
odo version
:How did you run odo exactly?
odo push
Actual behavior
I manually tried it out inside the container, and looks like the container user does not have sufficient privilege to create dir:
Expected behavior
it should be able to execute mvn
Any logs, error output, etc?
The text was updated successfully, but these errors were encountered: