Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update support for operator deployment on PSA #408

Merged

Conversation

SalDaniele
Copy link
Contributor

PR #371 provided changes to allow the deployment of the operator when PSA is enabled.

https://kubernetes.io/docs/concepts/security/pod-security-admission/

This commit provides minor updates to address comments on the previous PR.

Signed-off-by: Salvatore Daniele [email protected]
Co-authored-by: Sebastian Sch [email protected]

@github-actions
Copy link

Thanks for your PR,
To run vendors CIs use one of:

  • /test-all: To run all tests for all vendors.
  • /test-e2e-all: To run all E2E tests for all vendors.
  • /test-e2e-nvidia-all: To run all E2E tests for NVIDIA vendor.

To skip the vendors CIs use one of:

  • /skip-all: To skip all tests for all vendors.
  • /skip-e2e-all: To skip all E2E tests for all vendors.
  • /skip-e2e-nvidia-all: To skip all E2E tests for NVIDIA vendor.
    Best regards.

hack/deploy-setup.sh Outdated Show resolved Hide resolved
@wizhaoredhat
Copy link
Contributor

/cc @bn222
/cc @SchSeba
/cc @adrianchiris

PTAL

PR k8snetworkplumbingwg#371 provided changes to allow the deployment of the operator when
PSA is enabled.

https://kubernetes.io/docs/concepts/security/pod-security-admission/

This commit provides minor updates to address comments on the previous
PR.

Signed-off-by: Salvatore Daniele <[email protected]>
Co-authored-by: Sebastian Sch <[email protected]>
@SalDaniele SalDaniele force-pushed the update_PSA_support_fix branch from a027cfb to 664b363 Compare February 14, 2023 13:45
@github-actions
Copy link

Thanks for your PR,
To run vendors CIs use one of:

  • /test-all: To run all tests for all vendors.
  • /test-e2e-all: To run all E2E tests for all vendors.
  • /test-e2e-nvidia-all: To run all E2E tests for NVIDIA vendor.

To skip the vendors CIs use one of:

  • /skip-all: To skip all tests for all vendors.
  • /skip-e2e-all: To skip all E2E tests for all vendors.
  • /skip-e2e-nvidia-all: To skip all E2E tests for NVIDIA vendor.
    Best regards.

@wizhaoredhat
Copy link
Contributor

/lgtm

@SchSeba
Copy link
Collaborator

SchSeba commented Feb 19, 2023

Hi @wizhaoredhat this works for OCP without the other label to disable the OCP sync?

@coveralls
Copy link

Pull Request Test Coverage Report for Build 4174425076

  • 0 of 0 changed or added relevant lines in 0 files are covered.
  • 2 unchanged lines in 1 file lost coverage.
  • Overall coverage increased (+0.03%) to 25.29%

Files with Coverage Reduction New Missed Lines %
controllers/sriovibnetwork_controller.go 2 67.33%
Totals Coverage Status
Change from base Build 4126507459: 0.03%
Covered Lines: 1899
Relevant Lines: 7509

💛 - Coveralls

@SalDaniele
Copy link
Contributor Author

SalDaniele commented Feb 21, 2023

Hi @SchSeba when testing on my OCP cluster I did not need to include 'security.openshift.io/scc.podSecurityLabelSync: "false"'

Perhaps this is already disabled for openshift-sriov-network-operator by default [1].

[1] https://cloud.redhat.com/blog/pod-security-admission-in-openshift-4.11#:~:text=Note%20that%20%E2%80%9Copenshift%2D%E2%80%9D%20prefixed%20namespaces%20do%20not%20get%20synchronized%20by%20default

Copy link
Collaborator

@SchSeba SchSeba left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/lgtm

@SchSeba SchSeba merged commit ea0b194 into k8snetworkplumbingwg:master Feb 21, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

6 participants