-
Notifications
You must be signed in to change notification settings - Fork 40.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
PodSecurity message/check/fixture cleanups #103558
PodSecurity message/check/fixture cleanups #103558
Conversation
Skipping CI for Draft Pull Request. |
7dd2693
to
0c4ad8d
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
lgtm so far
staging/src/k8s.io/pod-security-admission/policy/check_capabilities_restricted.go
Outdated
Show resolved
Hide resolved
staging/src/k8s.io/pod-security-admission/policy/check_apparmor.go
Outdated
Show resolved
Hide resolved
5b6522c
to
8678f6f
Compare
Make forbidden details more compact Add unit test exercising forbidden message/details Consolidate fixtures
Rename to windowsHostProcess Format reason/details Add unit tests
Updated forbidden reason/details Added unit test to exercise all volume types Consolidated fixtures
Improve message and details Add unit tests Consolidate integration test fixtures
Switch from field paths to container names in messages Add unit tests for messages Consolidate integration test fixtures
Make messages consistent Add unit tests for messages Consolidate integration test fixtures Rename to seccompProfile_baseline
Add documentation and unit tests for messages
rename to seLinuxOptions make message consistent add unit tests for message consolidate integration test fixtures
960a7b2
to
7f9d2ed
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm
badVolumeTypes.Insert("storageos") | ||
default: | ||
badVolumeTypes.Insert("unknown") | ||
} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I suppose we shouldn't depend on PSP code? We might want to move
func GetVolumeFSType(v api.Volume) (policy.FSType, error) { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I don't want to add any new dependencies on that code... looking forward to deleting it in 1.25
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: liggitt, tallclair The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
What type of PR is this?
/kind cleanup
/kind feature
Which issue(s) this PR fixes:
Fixes #103373
Best reviewed commit-by-commit. Alternate commits are updating generated fixtures.
Address the following:
Review pass 1 (#103558 (review)):
checks:
Unreviewed:
checks:
cleanup: drop field path from container visitor
limit warning evaluation/surfacing to requests that are not rejected by an enforce policy
reformat the warning message to read more naturally when admitting pods or pod-controllers
Follow-up:
Does this PR introduce a user-facing change?
/assign @tallclair