-
Notifications
You must be signed in to change notification settings - Fork 420
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add SecurityContext to reconciled Deployment #862
Conversation
|
Hi @MarcelMue. Thanks for your PR. I'm waiting for a tektoncd member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/ok-to-test |
The following is the coverage report on the affected files.
|
The following is the coverage report on the affected files.
|
The following is the coverage report on the affected files.
|
Sorry for the dumb questions but this is my first time contributing to tekton upstream:
|
Thanks for opening the PR @MarcelMue :)
Yeah I'd agree. We should add a release note to the PR description like in #789
It should take a few mins. Looks like its reporting that its still running after an hour. I'll retrigger the tests (I've seen this happen a few times before)
Yes, that's ok! |
/retest |
c8a4e19
to
eae5212
Compare
The following is the coverage report on the affected files.
|
/approve |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: dibyom The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
@dibyom so… this breaks |
Interesting - can you elaborate to me how it breaks I assumed this was safe because it is on master triggers/config/controller.yaml Lines 78 to 81 in 0a9df14
|
Hey @MarcelMue, more detail in #864, but in a gist, OpenShift needs some "extra rights" to be able to set a given uid to a Pod. By default, OpenShift does use a random uid, and it works just fine for the eventlistener pods. This changes forces to attach to the eventlistener pod a serviceAccount with |
Indeed 😉 This is another small problem that we may have, but when we package Tekton for OpenShift, we do control the payload that we apply and thus we can safely remove that part ( @MarcelMue note that, I am 100% for this change in standard k8s. We just need to find a way to disable this behavior on demand (but having it enabled by default in a standard distribution of tektoncd). |
definitely it broken our triggers in openshift with "unable to validate against any security context constraint: [spec.containers[0].securityContext.runAsUser: Invalid value: 65532: must be in the ranges: [1000750000, 1000759999]]" |
Changes
Adds a SecurityContext to the created Deployment - changes match those suggested here: #781
Submitter Checklist
These are the criteria that every PR should meet, please check them off as you
review them:
- [x] Includes docs (if user facing)See the contribution guide for more details.
Release Notes