[release-4.16] OCPBUGS-34979: Updates default security context behavior for catalog source pods#765
Conversation
|
@joelanford: This pull request references Jira Issue OCPBUGS-29729, which is invalid:
Comment The bug has been updated to refer to the pull request using the external bug tracker. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: joelanford The full list of commands accepted by this bot can be found here. The pull request process is described here DetailsNeeds approval from an approver in each of these files:
Approvers can indicate their approval by writing |
|
/retest |
|
/lgtm |
| } | ||
| objs = clientfake.AddSimpleGeneratedNames( | ||
| clientfake.AddSimpleGeneratedName(pod), | ||
| objs = append(objs, |
There was a problem hiding this comment.
AddSimpleGeneratedNames() can go away, this was the only usage.
| factory, client := fakeReconcilerFactory(t, stopc, withNow(now), withK8sObjs(tt.in.cluster.k8sObjs...), withK8sClientOptions(clientfake.WithNameGeneration(t))) | ||
| // a defaultNamespace resource must be present so that the reconciler can determine the | ||
| // security context configuration for the underlying pod | ||
| clusterState := append(tt.in.cluster.k8sObjs, defaultNamespace()) |
There was a problem hiding this comment.
Think this uses the new func and is a bit easier to read and reason about:
| clusterState := append(tt.in.cluster.k8sObjs, defaultNamespace()) | |
| clusterState := baseClusterState()``` |
|
@joelanford: This pull request references Jira Issue OCPBUGS-34979, which is invalid:
Comment The bug has been updated to refer to the pull request using the external bug tracker. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
|
Comments about test changes that might not be desirable for a backport. Other than that /lgtm |
|
/jira refresh |
|
@joelanford: This pull request references Jira Issue OCPBUGS-34979, which is valid. The bug has been moved to the POST state. 7 validation(s) were run on this bug
No GitHub users were found matching the public email listed for the QA contact in Jira (jiazha@redhat.com), skipping review request. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
|
/label backport-risk-assessed |
|
/test e2e-gcp-olm |
|
failed ON_QA test on 4.17 https://issues.redhat.com/browse/OCPBUGS-29729 |
|
/retest |
|
@joelanford can you please rebase to pick up the CI changes. Hopefully then it's green =D |
…source pods (#3206) * Refactor security context configuration in pod reconciler This change updates the logic for setting security contexts within the OLM pod reconciler. Now, it differentiates between 'Restricted' and 'Legacy' security contexts more explicitly. The 'Restricted' security context applies default security settings unless overridden, while the 'Legacy' context clears all security settings. When no security context is configured, it defaults to restricted. Additionally, the related tests have been updated to reflect these changes and ensure correct behavior. Signed-off-by: btofel <btofel@redhat.com> * Add checking of the namespace PSA restrictions Signed-off-by: btofel <btofel@redhat.com> * Fix linter issues Signed-off-by: btofel <btofel@redhat.com> Signed-off-by: Brett Tofel <btofel@redhat.com> * fixes Signed-off-by: Per Goncalves da Silva <pegoncal@redhat.com> --------- Signed-off-by: btofel <btofel@redhat.com> Signed-off-by: Brett Tofel <btofel@redhat.com> Signed-off-by: Per Goncalves da Silva <pegoncal@redhat.com> Co-authored-by: Brett Tofel <btofel@redhat.com> Co-authored-by: Per Goncalves da Silva <pegoncal@redhat.com> Upstream-repository: operator-lifecycle-manager Upstream-commit: 9b2802151528e556d78b5fe55bcb8c89070efe58
bf825f2 to
c1d2466
Compare
|
New changes are detected. LGTM label has been removed. |
|
/retest |
1 similar comment
|
/retest |
|
@joelanford: The following test failed, say
Full PR test history. Your PR dashboard. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
|
I think if you pull in the commit from this closed PR. It should fix the CRDs. I had to pull in only the CRD changes: api v0.26.0 is on go1.22. Not sure if it's how you'd like to downstream. |
|
commit 096fed5 from my PR can be cherry-picked in to help unblock |
|
/close in favor of #788 |
|
/close |
|
@perdasilva: Closed this PR. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
|
@joelanford: This pull request references Jira Issue OCPBUGS-34979. The bug has been updated to no longer refer to the pull request using the external bug tracker. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
Cherry pick of 47978e1
This change updates the logic for setting security contexts within the OLM pod reconciler. Now, it differentiates between 'Restricted' and 'Legacy' security contexts more explicitly. The 'Restricted' security context applies default security settings unless overridden, while the 'Legacy' context clears all security settings. When no security context is configured, it defaults to restricted. Additionally, the related tests have been updated to reflect these changes and ensure correct behavior.
Add checking of the namespace PSA restrictions
Fix linter issues
fixes
Upstream-repository: operator-lifecycle-manager
Upstream-commit: 9b2802151528e556d78b5fe55bcb8c89070efe58