-
Notifications
You must be signed in to change notification settings - Fork 41.6k
Apparmor cleanup #131989
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Apparmor cleanup #131989
Conversation
|
This issue is currently awaiting triage. If a SIG or subproject determines this is a relevant issue, they will accept it by applying the The Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
|
/assign @liggitt |
ba78d3b to
587d160
Compare
|
This PR may require API review. If so, when the changes are ready, complete the pre-review checklist and request an API review. Status of requested reviews is tracked in the API Review project. |
|
/lgtm |
|
LGTM label has been added. Git tree hash: 79118bbf786e61ad87208ad4d421bbbec8ee4192
|
587d160 to
6ad8ffb
Compare
| // use of container AppArmor annotation without accompanying field | ||
|
|
||
| isPodTemplate := fieldPath != nil // Pod warnings are emitted through applyAppArmorVersionSkew instead. | ||
| hasAppArmorField := hasPodAppArmorProfile || (c.SecurityContext != nil && c.SecurityContext.AppArmorProfile != nil) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Note to reviewers: we weren't checking that the container annotation matched the pod profile here. Rather than extracting the logic from the pod strategy that does that comparison, I decided to just always emit a warning on pod templates when there is a pod-level field but a container level annotation.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
only warn if the annotation produced a different effective app armor policy for the container... can relocate the helper the pod strategy is using to figure that out to this package if you want
|
Reverted the changes to warn unconditionally on annotation usage. PTAL. |
|
Hello @tallclair |
|
@liggitt would you mind reviewing this? Or should I find someone else for approval? |
6ad8ffb to
01e2c97
Compare
01e2c97 to
5f82919
Compare
|
/lgtm |
|
LGTM label has been added. Git tree hash: 202adeb4e3ce2fc556bbcc8b662a7e8345259249
|
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: liggitt, tallclair, vinayakankugoyal The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
|
The Kubernetes project has merge-blocking tests that are currently too flaky to consistently pass. This bot retests PRs for certain kubernetes repos according to the following rules:
You can:
/retest |
What type of PR is this?
/kind cleanup
/kind api-change
What this PR does / why we need it:
Implement phase 2 of the AppArmor field transition, but continue to suppress annotation warnings when there is a corresponding field. This change is consistent with the way we handle seccomp annotations.
Which issue(s) this PR fixes:
For kubernetes/enhancements#24 (comment)
Does this PR introduce a user-facing change?
Additional documentation e.g., KEPs (Kubernetes Enhancement Proposals), usage docs, etc.:
/sig node
/milestone v1.34
/priority important-longterm