Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Default to legacy PSA settings #2906

Merged

Conversation

awgreene
Copy link
Member

Problem: OLM recently introduced a few changes to default to running its workloads in a restricted mode. As a part of these changes, catalogSources built with earlier versions of OPM will not run as expected unless the catalogSource yaml is configured to run in a legacy version. Unfortunately, these legacy catalogs cannot be ran in restricted namespaces, which includes the olm namespace which is used to define global catalogSources.

Solution: Provide users ample time to convert to the new restricted fromat by defaulting to legacy restrictions and reclassify the olm namespace as a baseline privilege namespace.

Signed-off-by: Alexander Greene [email protected]

@openshift-ci openshift-ci bot requested review from anik120 and exdx December 13, 2022 19:14
@openshift-ci
Copy link

openshift-ci bot commented Dec 13, 2022

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: awgreene

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci openshift-ci bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Dec 13, 2022
@awgreene awgreene force-pushed the revert-psa-defaults branch from 302e3d3 to 257133a Compare December 13, 2022 21:35
Comment on lines 9 to 10
pod-security.kubernetes.io/audit: restricted
pod-security.kubernetes.io/warn: restricted
Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@joelanford I think we want these here as well, thoughts?

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

+1

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

+1 we do want these here, but a nit is to have these also be populated from the chart value like the enforce values, to make things easier during downstream. eg if we want different values in downstream, we'll simply change the chart values.

It's a hygiene nit since we can always change the hardcoded value too, but that seems like confusing paper trail potentially.

Comment on lines 22 to 23
pod-security.kubernetes.io/audit: restricted
pod-security.kubernetes.io/warn: restricted
Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@joelanford I think we want these here as well, thoughts? CC @anik120

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

+1

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Same comment as above.

@awgreene awgreene force-pushed the revert-psa-defaults branch 4 times, most recently from 01106ef to 8aa4e29 Compare December 14, 2022 01:35
Signed-off-by: Alexander Greene <[email protected]>
@awgreene awgreene force-pushed the revert-psa-defaults branch 2 times, most recently from 86f8e26 to 245cf67 Compare December 14, 2022 02:56
Problem: OLM recently introduced a few changes to default to running its
workloads in a restricted mode. As a part of these changes,
catalogSources built with earlier versions of OPM will not run as
expected unless the catalogSource yaml is configured to run in a legacy
version. Unfortunately, these legacy catalogs cannot be ran in
restricted namespaces, which includes the `olm` namespace which is used
to define global catalogSources.

Solution: Provide users ample time to convert to the new restricted
fromat by defaulting to legacy restrictions and reclassify the `olm`
namespace as a baseline privilege namespace.

Signed-off-by: Alexander Greene <[email protected]>
@awgreene awgreene force-pushed the revert-psa-defaults branch from 245cf67 to a1fed5b Compare December 14, 2022 13:53
Copy link
Contributor

@anik120 anik120 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Just a couple of nits otherwise lgtm

Comment on lines 9 to 10
pod-security.kubernetes.io/audit: restricted
pod-security.kubernetes.io/warn: restricted
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

+1 we do want these here, but a nit is to have these also be populated from the chart value like the enforce values, to make things easier during downstream. eg if we want different values in downstream, we'll simply change the chart values.

It's a hygiene nit since we can always change the hardcoded value too, but that seems like confusing paper trail potentially.

Comment on lines 22 to 23
pod-security.kubernetes.io/audit: restricted
pod-security.kubernetes.io/warn: restricted
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Same comment as above.

@awgreene awgreene force-pushed the revert-psa-defaults branch from a1fed5b to c1e2a1d Compare December 14, 2022 15:27
@awgreene awgreene force-pushed the revert-psa-defaults branch from c1e2a1d to 18937ae Compare December 14, 2022 18:27
@anik120
Copy link
Contributor

anik120 commented Dec 14, 2022

/lgtm

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. lgtm Indicates that a PR is ready to be merged.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants