Skip to content

fix(helm/sidecar-injector-configmap): run as root#10507

Closed
jaredallard wants to merge 2 commits intoistio:release-1.1from
jaredallard:patch-1
Closed

fix(helm/sidecar-injector-configmap): run as root#10507
jaredallard wants to merge 2 commits intoistio:release-1.1from
jaredallard:patch-1

Conversation

@jaredallard
Copy link
Copy Markdown

@jaredallard jaredallard commented Dec 15, 2018

What this PR does: Fixes the init container to be able to properly apply iptables rules when the parent pod has a securityContext set

Fixes #10358

@googlebot
Copy link
Copy Markdown
Collaborator

Thanks for your pull request. It looks like this may be your first contribution to a Google open source project (if not, look below for help). Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA).

📝 Please visit https://cla.developers.google.com/ to sign.

Once you've signed (or fixed any issues), please reply here (e.g. I signed it!) and we'll verify it.


What to do if you already signed the CLA

Individual signers
Corporate signers

@googlebot googlebot added the cla: no Set by the Google CLA bot to indicate the author of a PR has not signed the Google CLA. label Dec 15, 2018
@istio-testing
Copy link
Copy Markdown
Collaborator

Hi @jaredallard. Thanks for your PR.

I'm waiting for a istio member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@jaredallard
Copy link
Copy Markdown
Author

I signed the CLA

@googlebot
Copy link
Copy Markdown
Collaborator

CLAs look good, thanks!

@googlebot googlebot added cla: yes and removed cla: no Set by the Google CLA bot to indicate the author of a PR has not signed the Google CLA. labels Dec 15, 2018
@stale
Copy link
Copy Markdown

stale bot commented Dec 29, 2018

This pull request has been automatically marked as stale because it has not had activity in the last 2 weeks. It will be closed in 30 days if no further activity occurs. Please feel free to give a status update now, ping for review, or re-open when it's ready. Thank you for your contributions!

@stale stale bot added the stale label Dec 29, 2018
@jaredallard
Copy link
Copy Markdown
Author

Still waiting for a reviewer :(

@stale stale bot removed the stale label Dec 29, 2018
@gyliu513
Copy link
Copy Markdown
Member

/ok-to-test

@istio-testing istio-testing added ok-to-test Set this label allow normal testing to take place for a PR not submitted by an Istio org member. and removed needs-ok-to-test labels Dec 30, 2018
@gyliu513
Copy link
Copy Markdown
Member

@jaredallard , sorry for late response (just come back from vacation), master is frozen, can you please create this PR against the branch of release-1.1?

@linsun
Copy link
Copy Markdown
Member

linsun commented Jan 2, 2019

/hold

need to understand which k8s platform is used

@istio-testing istio-testing added the do-not-merge/hold Block automatic merging of a PR. label Jan 2, 2019
@jaredallard
Copy link
Copy Markdown
Author

@gyliu513 Will do.

@linsun This is not platform specific, since the parent securityContext is modifying the initContainers securityContext.

@stale
Copy link
Copy Markdown

stale bot commented Jan 17, 2019

This pull request has been automatically marked as stale because it has not had activity in the last 2 weeks. It will be closed in 30 days if no further activity occurs. Please feel free to give a status update now, ping for review, or re-open when it's ready. Thank you for your contributions!

@stale stale bot added the stale label Jan 17, 2019
@Bessonov
Copy link
Copy Markdown

Tested it with stable/mariadb and it works. Please, make it public. People waiting for this workaround, until cni is done.

@jaredallard
Copy link
Copy Markdown
Author

@Bessonov I'll try to get this rebased onto release-1.1 by this weekend, apologies for the delay everyone.

@jaredallard jaredallard changed the base branch from master to release-1.1 February 1, 2019 00:33
@jaredallard
Copy link
Copy Markdown
Author

@gyliu513 based on release-1.1 let me know if you need anything else from me.

@jaredallard
Copy link
Copy Markdown
Author

@gyliu513 Can we get some movement on this? Need to stop modifying this myself asap!

@stale stale bot removed the stale label Feb 10, 2019
@Bessonov
Copy link
Copy Markdown

@mandarjog @gyliu513 c'mon guys, this one is pending since 2 months. It's frustrate a ton of people or at least everyone, who want to use non-root images. Every bitnami image for helm (stable/mariadb, stable/mongodb, stable/redisdb, ...) is a non-root image. It costs me a lot of time to figure out why charts are failing with istio.

To hold this PR you produce not only work for you, but for your users and maintainers of non-root images.

@jaredallard
Copy link
Copy Markdown
Author

/cc greghanson

Adding another reviewer, would be nice to get some movement on this.

@stale
Copy link
Copy Markdown

stale bot commented Mar 14, 2019

This pull request has been automatically marked as stale because it has not had activity in the last 2 weeks. It will be closed in 30 days if no further activity occurs. Please feel free to give a status update now, ping for review, or re-open when it's ready. Thank you for your contributions!

@stale stale bot added the stale label Mar 14, 2019
@Bessonov
Copy link
Copy Markdown

@mandarjog @gyliu513 @GregHanson more activity, please.

@stale stale bot removed the stale label Mar 14, 2019
@translucens
Copy link
Copy Markdown

There is a workaround like #10358, however, this PR is essential for GKE Istio addon users because GKE Istio addon does not allow modifying sidecar-injector-configmap manifest by cluster user and they cannot apply its workaround.

@chrisz100
Copy link
Copy Markdown

Same for us, this needs to stop. And it's been months!

@istio-testing istio-testing added the needs-rebase Indicates a PR needs to be rebased before being merged label Mar 28, 2019
@istio-testing istio-testing removed the needs-rebase Indicates a PR needs to be rebased before being merged label Mar 28, 2019
@jaredallard
Copy link
Copy Markdown
Author

jaredallard commented Mar 28, 2019

/meow

EDIT prow hates me

@duderino
Copy link
Copy Markdown

/retest

@ostromart @costinm PTAL

@duderino
Copy link
Copy Markdown

This definitely should not have been left sitting for so long. Sorry. Getting more eyes on it now.

However, the circleci test failures look like they are due to this change. We can't merge a PR that breaks tests

@costinm
Copy link
Copy Markdown
Contributor

costinm commented Apr 10, 2019

Sorry for the delay - the PR looks good, if we can get the tests to pass we should get it in.

/lgtm
/approve

@istio-testing
Copy link
Copy Markdown
Collaborator

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: costinm, jaredallard

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@howardjohn
Copy link
Copy Markdown
Member

To fix the tests, you need to update the expected files. in pilot/pkg/kube/inject/testdata.

And probably rebase your changes since this is from a while ago

@istio-testing
Copy link
Copy Markdown
Collaborator

istio-testing commented Apr 10, 2019

@jaredallard: The following tests failed, say /retest to rerun them all:

Test name Commit Details Rerun command
prow/istio-pilot-multicluster-e2e.sh f33a3dd link /test istio-pilot-multicluster-e2e
prow/istio-unit-tests.sh f33a3dd link /test istio-unit-tests
Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here.

@duderino
Copy link
Copy Markdown

@howardjohn can you take this one? I think it's an important fix, I worry we've stretched everyone's patience too far already, and I bet you could fix the test failures in far less time

@sdake
Copy link
Copy Markdown
Member

sdake commented Apr 10, 2019

@jaredallard apologies for the long lag in your PR review. This issue is in the process of being solved, and I want to thank you for hunting down the correct solution.

Most Istio contributors that can approve PRs are a little overloaded. One thing that helps when your PR is submitted is to use the /assign feature so the reviewer knows your work is ready. If you feel the current reviewer is slacking (Costin is super overloaded;) you can always do a second assign.

This shows up in a dashboard under https://github.com/pulls/assigned and is the primary mechanism by which many PRs are reviewed.

Cheers
-steve

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

do-not-merge/hold Block automatic merging of a PR. ok-to-test Set this label allow normal testing to take place for a PR not submitted by an Istio org member.

Projects

None yet

Development

Successfully merging this pull request may close these issues.