Skip to content

Conversation

@mattmoor
Copy link
Member

🐛 My previous changed missed the new config file that controls how the CRD schema is updated.

You can now clearly see the fields being added to the schemas.

Apologies for the break, I had no clue this was a thing!

/kind bug

Related: #13395

NONE

/cc @evankanderson @psschwei

…dmask.

🐛 My previous changed missed the new config file that controls how the CRD schema is updated.

You can now clearly see the fields being added to the schemas.

Apologies for the break, I had no clue this was a thing!

/kind bug

Related: knative#13395
@knative-prow knative-prow bot added kind/bug Categorizes issue or PR as related to a bug. size/S Denotes a PR that changes 10-29 lines, ignoring generated files. area/test-and-release It flags unit/e2e/conformance/perf test issues for product features labels Oct 16, 2022
- Requests
k8s.io/api/core/v1.SecurityContext:
fieldMask:
- AllowPrivilegeEscalation
Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@evankanderson I didn't realize y'all had added this, so I totally missed it. FYI in case you are adding seccomp stuff, you may need this too (if you were following my bad example! 😂 )

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@markusthoemmes added this, so that we could produce a structural schema for our crds.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It was just after my time. TIL!

@codecov
Copy link

codecov bot commented Oct 16, 2022

Codecov Report

Base: 86.52% // Head: 86.47% // Decreases project coverage by -0.04% ⚠️

Coverage data is based on head (dde3672) compared to base (a18077c).
Patch has no changes to coverable lines.

Additional details and impacted files
@@            Coverage Diff             @@
##             main   #13402      +/-   ##
==========================================
- Coverage   86.52%   86.47%   -0.05%     
==========================================
  Files         196      196              
  Lines       14551    14551              
==========================================
- Hits        12590    12583       -7     
- Misses       1662     1669       +7     
  Partials      299      299              
Impacted Files Coverage Δ
pkg/http/handler/timeout.go 84.76% <0.00%> (-6.63%) ⬇️
pkg/autoscaler/statforwarder/leases.go 73.95% <0.00%> (+1.56%) ⬆️

Help us with your feedback. Take ten seconds to tell us how you rate us. Have a feature suggestion? Share it here.

☔ View full report at Codecov.
📢 Do you have feedback about the report comment? Let us know in this issue.

Copy link
Member

@evankanderson evankanderson left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/lgtm
/approve

@knative-prow knative-prow bot added the lgtm Indicates that a PR is ready to be merged. label Oct 16, 2022
@knative-prow
Copy link

knative-prow bot commented Oct 16, 2022

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: evankanderson, mattmoor

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@knative-prow knative-prow bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Oct 16, 2022
mattmoor added a commit to mattmoor/hakn that referenced this pull request Oct 16, 2022
🐛 I missed a file in my upstream fix, which kept the field from appearing in the CRD schema.

This pulls in that change too.

/kind bug
mattmoor added a commit to mattmoor/hakn that referenced this pull request Oct 16, 2022
🐛 I missed a file in my upstream fix, which kept the field from appearing in the CRD schema.

This pulls in that change too.

/kind bug
@knative-prow knative-prow bot merged commit 555e6ab into knative:main Oct 16, 2022
@mattmoor mattmoor deleted the also-change-schema branch October 17, 2022 01:44
mattmoor added a commit to chainguard-dev/hakn that referenced this pull request Oct 17, 2022
🐛 I missed a file in my upstream fix, which kept the field from appearing in the CRD schema.

This pulls in that change too.

/kind bug
skonto pushed a commit to skonto/serving that referenced this pull request Oct 19, 2022
…dmask. (knative#13402)

🐛 My previous changed missed the new config file that controls how the CRD schema is updated.

You can now clearly see the fields being added to the schemas.

Apologies for the break, I had no clue this was a thing!

/kind bug

Related: knative#13395
skonto pushed a commit to skonto/serving that referenced this pull request Oct 27, 2022
…dmask. (knative#13402)

🐛 My previous changed missed the new config file that controls how the CRD schema is updated.

You can now clearly see the fields being added to the schemas.

Apologies for the break, I had no clue this was a thing!

/kind bug

Related: knative#13395
openshift-merge-robot pushed a commit to openshift/knative-serving that referenced this pull request Oct 27, 2022
…ion (#1282)

* Feature: Let users set `allowPrivilegeEscalation = false` on ksvc. (knative#13395)

:gift: This allows used to specify `allowPrivilegeEscalation` (in particular to false) to ensure that processes cannot escalate privileges.

Kicking the tires on the new GKE security posture dashboard, I noticed that ~all Knative services get flagged for this despite Knative not allowing me to set it to false!

https://cloud.google.com/kubernetes-engine/docs/concepts/about-security-posture-dashboard

/kind bug

* Fix: Add the new `AllowPrivilegeEscalation` field to the *other* fieldmask. (knative#13402)

:bug: My previous changed missed the new config file that controls how the CRD schema is updated.

You can now clearly see the fields being added to the schemas.

Apologies for the break, I had no clue this was a thing!

/kind bug

Related: knative#13395

* add allowPrivilegeEscalation to manifests

Co-authored-by: Matt Moore <mattmoor@chainguard.dev>
skonto pushed a commit to skonto/serving that referenced this pull request Nov 16, 2022
…ion (knative#1282)

* Feature: Let users set `allowPrivilegeEscalation = false` on ksvc. (knative#13395)

:gift: This allows used to specify `allowPrivilegeEscalation` (in particular to false) to ensure that processes cannot escalate privileges.

Kicking the tires on the new GKE security posture dashboard, I noticed that ~all Knative services get flagged for this despite Knative not allowing me to set it to false!

https://cloud.google.com/kubernetes-engine/docs/concepts/about-security-posture-dashboard

/kind bug

* Fix: Add the new `AllowPrivilegeEscalation` field to the *other* fieldmask. (knative#13402)

:bug: My previous changed missed the new config file that controls how the CRD schema is updated.

You can now clearly see the fields being added to the schemas.

Apologies for the break, I had no clue this was a thing!

/kind bug

Related: knative#13395

* add allowPrivilegeEscalation to manifests

Co-authored-by: Matt Moore <mattmoor@chainguard.dev>
openshift-merge-robot pushed a commit to openshift-knative/serving that referenced this pull request Nov 16, 2022
…e` on ksvc. (#18)

* [RELEASE-1.5] [BACKPORT] Feature: Let users set allowPrivilegeEscalation (#1282)

* Feature: Let users set `allowPrivilegeEscalation = false` on ksvc. (knative#13395)

:gift: This allows used to specify `allowPrivilegeEscalation` (in particular to false) to ensure that processes cannot escalate privileges.

Kicking the tires on the new GKE security posture dashboard, I noticed that ~all Knative services get flagged for this despite Knative not allowing me to set it to false!

https://cloud.google.com/kubernetes-engine/docs/concepts/about-security-posture-dashboard

/kind bug

* Fix: Add the new `AllowPrivilegeEscalation` field to the *other* fieldmask. (knative#13402)

:bug: My previous changed missed the new config file that controls how the CRD schema is updated.

You can now clearly see the fields being added to the schemas.

Apologies for the break, I had no clue this was a thing!

/kind bug

Related: knative#13395

* add allowPrivilegeEscalation to manifests

Co-authored-by: Matt Moore <mattmoor@chainguard.dev>

* Add missing allowPrivilegeEscalation patch into 1-serving-crds.yaml (#1301)

* fix download script

Co-authored-by: Matt Moore <mattmoor@chainguard.dev>
Co-authored-by: Kenjiro Nakayama <nakayamakenjiro@gmail.com>
openshift-merge-robot pushed a commit to openshift-knative/serving that referenced this pull request Dec 22, 2022
…e` on ksvc. (#18) (#90)

* [RELEASE-1.5] [BACKPORT] Feature: Let users set allowPrivilegeEscalation (#1282)

* Feature: Let users set `allowPrivilegeEscalation = false` on ksvc. (knative#13395)

:gift: This allows used to specify `allowPrivilegeEscalation` (in particular to false) to ensure that processes cannot escalate privileges.

Kicking the tires on the new GKE security posture dashboard, I noticed that ~all Knative services get flagged for this despite Knative not allowing me to set it to false!

https://cloud.google.com/kubernetes-engine/docs/concepts/about-security-posture-dashboard

/kind bug

* Fix: Add the new `AllowPrivilegeEscalation` field to the *other* fieldmask. (knative#13402)

:bug: My previous changed missed the new config file that controls how the CRD schema is updated.

You can now clearly see the fields being added to the schemas.

Apologies for the break, I had no clue this was a thing!

/kind bug

Related: knative#13395

* add allowPrivilegeEscalation to manifests

Co-authored-by: Matt Moore <mattmoor@chainguard.dev>

* Add missing allowPrivilegeEscalation patch into 1-serving-crds.yaml (#1301)

* fix download script

Co-authored-by: Matt Moore <mattmoor@chainguard.dev>
Co-authored-by: Kenjiro Nakayama <nakayamakenjiro@gmail.com>

Co-authored-by: Stavros Kontopoulos <st.kontopoulos@gmail.com>
Co-authored-by: Matt Moore <mattmoor@chainguard.dev>
Co-authored-by: Kenjiro Nakayama <nakayamakenjiro@gmail.com>
wmfgerrit pushed a commit to wikimedia/operations-docker-images-production-images that referenced this pull request Feb 5, 2025
Bug: T369493
Change-Id: Id1c8febe84e5c207491322a19168cac1359eb411
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

approved Indicates a PR has been approved by an approver from all required OWNERS files. area/test-and-release It flags unit/e2e/conformance/perf test issues for product features kind/bug Categorizes issue or PR as related to a bug. lgtm Indicates that a PR is ready to be merged. size/S Denotes a PR that changes 10-29 lines, ignoring generated files.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants