Skip to content

Adding a new WindowsSecurityOptions struct#77147

Merged
k8s-ci-robot merged 2 commits intokubernetes:masterfrom
wk8:wk8/win_sec_opts
May 2, 2019
Merged

Adding a new WindowsSecurityOptions struct#77147
k8s-ci-robot merged 2 commits intokubernetes:masterfrom
wk8:wk8/win_sec_opts

Conversation

@wk8
Copy link
Copy Markdown
Contributor

@wk8 wk8 commented Apr 26, 2019

What type of PR is this?
/kind api-change

What this PR does / why we need it:
This patch is dding a new WindowsSecurityOptions struct, as outlined in the KEP at
https://github.com/kubernetes/enhancements/blob/master/keps/sig-windows/20190418-windows-security-context.md
and improvements on it at
kubernetes/enhancements#975

For now this struct is left empty, as discussed in the KEP (see above) and as
previously discussed with Jordan Liggitt.

It will allow adding GMSA and options as well as RunAsUserName options; both of which have already been pre-implemented respectively at
#75459
and #73609; and both of which
will need to be re-based to make use of the new struct.

Does this PR introduce a user-facing change?:

NONE

wk8 added 2 commits April 26, 2019 14:19
As outlined in the KEP at
https://github.com/kubernetes/enhancements/blob/master/keps/sig-windows/20190418-windows-security-context.md
and improvements on it at
kubernetes/enhancements#975

For now this struct is left empty, as discussed in the KEP (see above) and as
previously discussed with Jordan Liggitt.

It will allow adding GMSA and options as well as `RunAsUserName` options; both of which have already been pre-implemented respectively at
kubernetes#75459
and kubernetes#73609; and both of which
will need to be re-based to make use of the new struct.

Signed-off-by: Jean Rouge <rougej+github@gmail.com>
Signed-off-by: Jean Rouge <rougej+github@gmail.com>
@k8s-ci-robot k8s-ci-robot added release-note-none Denotes a PR that doesn't merit a release note. kind/api-change Categorizes issue or PR as related to adding, removing, or otherwise changing an API size/S Denotes a PR that changes 10-29 lines, ignoring generated files. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. needs-sig Indicates an issue or PR lacks a `sig/foo` label and requires one. needs-priority Indicates a PR lacks a `priority/foo` label and requires one. labels Apr 26, 2019
@k8s-ci-robot k8s-ci-robot added sig/apps Categorizes an issue or PR as relevant to SIG Apps. and removed needs-sig Indicates an issue or PR lacks a `sig/foo` label and requires one. labels Apr 26, 2019
@wk8
Copy link
Copy Markdown
Contributor Author

wk8 commented Apr 26, 2019

/sig api

@wk8
Copy link
Copy Markdown
Contributor Author

wk8 commented Apr 26, 2019

/assign @liggitt

@wk8
Copy link
Copy Markdown
Contributor Author

wk8 commented Apr 26, 2019

/label api-review

@k8s-ci-robot k8s-ci-robot added the api-review Categorizes an issue or PR as actively needing an API review. label Apr 26, 2019
@wk8
Copy link
Copy Markdown
Contributor Author

wk8 commented Apr 27, 2019

/test pull-kubernetes-bazel-test

@liggitt
Copy link
Copy Markdown
Member

liggitt commented May 2, 2019

there are custom conversion functions for the PodSecurityContext/SecurityContext structs that aren't actually required, but since we have them adding a new field (like this PR does) requires updating them.

I'm dropping the unnecessary custom conversion functions in #77346, which should resolve the unit test failures for this PR

@liggitt
Copy link
Copy Markdown
Member

liggitt commented May 2, 2019

/retest

@liggitt
Copy link
Copy Markdown
Member

liggitt commented May 2, 2019

/priority important-soon
/lgtm
/approve

@k8s-ci-robot k8s-ci-robot added priority/important-soon Must be staffed and worked on either currently, or very soon, ideally in time for the next release. lgtm "Looks good to me", indicates that a PR is ready to be merged. and removed needs-priority Indicates a PR lacks a `priority/foo` label and requires one. labels May 2, 2019
@k8s-ci-robot
Copy link
Copy Markdown
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: liggitt, wk8

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@k8s-ci-robot k8s-ci-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label May 2, 2019
@k8s-ci-robot k8s-ci-robot merged commit 1adaf2c into kubernetes:master May 2, 2019
@ddebroy ddebroy mentioned this pull request May 20, 2019
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

api-review Categorizes an issue or PR as actively needing an API review. approved Indicates a PR has been approved by an approver from all required OWNERS files. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. kind/api-change Categorizes issue or PR as related to adding, removing, or otherwise changing an API lgtm "Looks good to me", indicates that a PR is ready to be merged. priority/important-soon Must be staffed and worked on either currently, or very soon, ideally in time for the next release. release-note-none Denotes a PR that doesn't merit a release note. sig/apps Categorizes an issue or PR as relevant to SIG Apps. size/S Denotes a PR that changes 10-29 lines, ignoring generated files.

Projects

Status: API review completed, 1.15

Development

Successfully merging this pull request may close these issues.

4 participants