-
Notifications
You must be signed in to change notification settings - Fork 114
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update support for operator deployment on PSA #408
Update support for operator deployment on PSA #408
Conversation
Thanks for your PR,
To skip the vendors CIs use one of:
|
/cc @bn222 PTAL |
PR k8snetworkplumbingwg#371 provided changes to allow the deployment of the operator when PSA is enabled. https://kubernetes.io/docs/concepts/security/pod-security-admission/ This commit provides minor updates to address comments on the previous PR. Signed-off-by: Salvatore Daniele <[email protected]> Co-authored-by: Sebastian Sch <[email protected]>
a027cfb
to
664b363
Compare
Thanks for your PR,
To skip the vendors CIs use one of:
|
/lgtm |
Hi @wizhaoredhat this works for OCP without the other label to disable the OCP sync? |
Pull Request Test Coverage Report for Build 4174425076
💛 - Coveralls |
Hi @SchSeba when testing on my OCP cluster I did not need to include 'security.openshift.io/scc.podSecurityLabelSync: "false"' Perhaps this is already disabled for openshift-sriov-network-operator by default [1]. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm
PR #371 provided changes to allow the deployment of the operator when PSA is enabled.
https://kubernetes.io/docs/concepts/security/pod-security-admission/
This commit provides minor updates to address comments on the previous PR.
Signed-off-by: Salvatore Daniele [email protected]
Co-authored-by: Sebastian Sch [email protected]