[release-4.16] OCPBUGS-34979: Updates default security context behavior for catalog source pods#788
Conversation
|
@perdasilva: This pull request references Jira Issue OCPBUGS-34979, which is invalid:
Comment The bug has been updated to refer to the pull request using the external bug tracker. DetailsIn response to this: Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
52b1250 to
4f30b02
Compare
|
@perdasilva: This pull request references Jira Issue OCPBUGS-34979. The bug has been updated to no longer refer to the pull request using the external bug tracker. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
|
@perdasilva: This pull request references Jira Issue OCPBUGS-34979, which is invalid:
Comment The bug has been updated to refer to the pull request using the external bug tracker. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
|
/retest |
…source pods (#3206) * Refactor security context configuration in pod reconciler This change updates the logic for setting security contexts within the OLM pod reconciler. Now, it differentiates between 'Restricted' and 'Legacy' security contexts more explicitly. The 'Restricted' security context applies default security settings unless overridden, while the 'Legacy' context clears all security settings. When no security context is configured, it defaults to restricted. Additionally, the related tests have been updated to reflect these changes and ensure correct behavior. Signed-off-by: btofel <btofel@redhat.com> * Add checking of the namespace PSA restrictions Signed-off-by: btofel <btofel@redhat.com> * Fix linter issues Signed-off-by: btofel <btofel@redhat.com> Signed-off-by: Brett Tofel <btofel@redhat.com> * fixes Signed-off-by: Per Goncalves da Silva <pegoncal@redhat.com> --------- Signed-off-by: btofel <btofel@redhat.com> Signed-off-by: Brett Tofel <btofel@redhat.com> Signed-off-by: Per Goncalves da Silva <pegoncal@redhat.com> Co-authored-by: Brett Tofel <btofel@redhat.com> Co-authored-by: Per Goncalves da Silva <pegoncal@redhat.com> Upstream-repository: operator-lifecycle-manager Upstream-commit: 9b2802151528e556d78b5fe55bcb8c89070efe58
…ig (openshift#342) Signed-off-by: Joe Lanford <joe.lanford@gmail.com> Upstream-repository: api Upstream-commit: 5d2d3fbe061b7b4a942747877efa58958fa9889e
4f30b02 to
096fed5
Compare
|
/retest |
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: perdasilva, tmshort The full list of commands accepted by this bot can be found here. The pull request process is described here DetailsNeeds approval from an approver in each of these files:
Approvers can indicate their approval by writing |
|
@perdasilva: This pull request references Jira Issue OCPBUGS-34979. The bug has been updated to no longer refer to the pull request using the external bug tracker. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
|
@perdasilva: This pull request references Jira Issue OCPBUGS-34979, which is invalid:
Comment The bug has been updated to refer to the pull request using the external bug tracker. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
|
/label backport-risk-assessed |
|
Pre-merge test pass, details: https://issues.redhat.com/browse/OCPBUGS-34979 |
|
@perdasilva: This pull request references Jira Issue OCPBUGS-34979, which is valid. 7 validation(s) were run on this bug
No GitHub users were found matching the public email listed for the QA contact in Jira (jiazha@redhat.com), skipping review request. The bug has been updated to refer to the pull request using the external bug tracker. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
|
This isn't a critical bug fix, so I'm holding off until we have a 4.16.0. We can get this into a 4.16.z. |
|
|
||
| More information about PSA can be found here: https://kubernetes.io/docs/concepts/security/pod-security-admission/' | ||
| type: string | ||
| default: legacy |
There was a problem hiding this comment.
Isn't this technically a breaking change? Is this something we should be concerned about?
There was a problem hiding this comment.
Great catch. Kinda, we subbed the default for a probe. We look at the namespace for PSA annotations and make a decision.
There was a problem hiding this comment.
That PR went ahead. It didn't include the API fixes T_T
|
/retest |
|
@perdasilva: all tests passed! Full PR test history. Your PR dashboard. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
|
@perdasilva: Jira Issue OCPBUGS-34979: All pull requests linked via external trackers have merged: Jira Issue OCPBUGS-34979 has been moved to the MODIFIED state. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
|
[ART PR BUILD NOTIFIER] This PR has been included in build operator-lifecycle-manager-container-v4.16.0-202407081937.p0.gabccea9.assembly.stream.el9 for distgit operator-lifecycle-manager. |
Cherry pick of 47978e1
This change updates the logic for setting security contexts within the OLM pod reconciler. Now, it differentiates between 'Restricted' and 'Legacy' security contexts more explicitly. The 'Restricted' security context applies default security settings unless overridden, while the 'Legacy' context clears all security settings. When no security context is configured, it defaults to restricted. Additionally, the related tests have been updated to reflect these changes and ensure correct behavior.
Upstream-repository: operator-lifecycle-manager
Upstream-commit: 9b2802151528e556d78b5fe55bcb8c89070efe58